trellis code
Recently Published Documents


TOTAL DOCUMENTS

122
(FIVE YEARS 5)

H-INDEX

10
(FIVE YEARS 0)

2021 ◽  
Vol 13 (4) ◽  
pp. 1-15
Author(s):  
Xiushi Cao ◽  
Tanfeng Sun ◽  
Xinghao Jiang ◽  
Yi Dong ◽  
Ke Xu

In this paper, an intra-prediction mode (IPM)-based video steganography with secure strategy was proposed for H.264 video stream. First of all, according to the property of IPM conversion after calibration, a content-adaptive selection strategy was adopted to measure candidate carrier macroblock. Then, a more efficient encoding strategy based on grouped IPM was applied to encode secret message. This encoding strategy aimed to further enhance the security performance by exploiting the deviation feature of calibrated IPM. Finally, syndrome-trellis code was used as the embedding implementation to minimize distortion. Experimental results demonstrate that this article proposed algorithm presents a novel security performance with any existing IPM-based video steganography.


2020 ◽  
Vol 41 ◽  
pp. 101110
Author(s):  
Mohammed A. Tubail ◽  
Ammar M. Abu-Hudrouss ◽  
Mohammed Taha O. El Astal

2018 ◽  
Vol 7 (4) ◽  
pp. 2338
Author(s):  
B. NagaSaiLakshmi ◽  
RajaSekhar. T

Present day electronic circuits are generally affected by the delicate mistakes. To maintain the reliability of the complex systems few techniques have been proposed. For few applications, an algorithmic - based fault tolerance (ABFT) system has attempt to abuse the algorithmic properties to identify and adjust mistakes. One example FFT used. There are various protection schemes to identify and adjust errors in FFTs. It is normal to discover various blocks are working in parallel. Recently; a new method is exploiting to implement a blame tolerance in parallel. In this work, same method is first applicable to parallel FFT and then secured methods are merged that the use of error correction codes (ECCs) and parseval checks are used to detect and correct a single bit fault. Trellis code is applied to parallel FFTs to protect the errors which are used to detect and correct a multibit faults are proposed and evaluated. The 4-point FFT is protected with the input32-bit length .Simulation and Synthesis report for FFT using ECC,SOS,ECC-SOS,Trellis codes are obtained in Xilinx software14.2v.Area,power,delay is analyzed in cadence using 90nm & 180nmTechnology. 


Author(s):  
Valery Korzhik ◽  
Cuong Nguyen ◽  
Ivan Fedyanin ◽  
Guillermo Morales-Luna

There are introduced two new steganalytic methods not depending on the statistics of the cover objects, namely side attacks stegosystems. The first one assumes that the plaintext, encrypted before embedding, is known by the attacker. In this case, the stegosystem’s detection is based on the calculation of mutual information between message and extracted encrypted data. For this calculation, a notion of the k-nearest neighbor distance is applied. The second method is applied to HUGO, one of the most efficient steganographic algorithms. In this case the stegosystem’s detection is based on a verification of the NIST tests to the extracted encrypted messages. Moreover, we show that the problem to find a submatrix of­ the embedding matrix determining a trellis code structure in the HUGO algorithm provides a search of the stegokey of the proposed stegosystem.


2017 ◽  
Vol 66 (11) ◽  
pp. 10542-10545
Author(s):  
Ho Kyoung Lee ◽  
Seo Weon Heo ◽  
Byung Moo Lee

Sign in / Sign up

Export Citation Format

Share Document