jpeg images
Recently Published Documents


TOTAL DOCUMENTS

431
(FIVE YEARS 98)

H-INDEX

27
(FIVE YEARS 4)

2021 ◽  
Vol 2021 ◽  
pp. 1-15
Author(s):  
Haocheng Fu ◽  
Xianfeng Zhao ◽  
Xiaolei He

With the development of the Internet, social network platforms (SNPs) have become the most common channel for image sharing. As a result, transmitting stego images in the public channels gives steganographers the best opportunity to transmit secret messages with behavioral security preserved. However, the SNPs typically compress uploaded images and damage the weak signal of steganography. In this study, a robust JPEG steganographic scheme based on robustness measurement and cover block selection (CBSRS) is proposed. We first design a deep learning-based model to fit the blockwise change rate of coefficients after JPEG recompression. Then, a cover block selection strategy is proposed to improve the robustness by optimizing the joint distortion function of transmission costs and classic costs. Moreover, by embedding indicator of cover block selection in chrominance channels of JPEG images, a shareable cover construction scheme is designed to solve the problem of auxiliary information transmission. The experimental results show that our proposed framework improves robustness while maintaining statistical security. Comparing with state-of-the-art methods, the framework achieves better performance under given recompression channels.


Author(s):  
Jinwei Wang ◽  
Wei Huang ◽  
Xiangyang Luo ◽  
Yun-Qing Shi ◽  
Sunil Kr. Jha

Due to the popularity of JPEG format images in recent years, JPEG images will inevitably involve image editing operation. Thus, some tramped images will leave tracks of Non-aligned double JPEG ( NA-DJPEG ) compression. By detecting the presence of NA-DJPEG compression, one can verify whether a given JPEG image has been tampered with. However, only few methods can identify NA-DJPEG compressed images in the case that the primary quality factor is greater than the secondary quality factor. To address this challenging task, this article proposes a novel feature extraction scheme based optimized pixel difference ( OPD ), which is a new measure for blocking artifacts. Firstly, three color channels (RGB) of a reconstructed image generated by decompressing a given JPEG color image are mapped into spherical coordinates to calculate amplitude and two angles (azimuth and zenith). Then, 16 histograms of OPD along the horizontal and vertical directions are calculated in the amplitude and two angles, respectively. Finally, a set of features formed by arranging the bin values of these histograms is used for binary classification. Experiments demonstrate the effectiveness of the proposed method, and the results show that it significantly outperforms the existing typical methods in the mentioned task.


2021 ◽  
Vol 55 (5) ◽  
pp. 444-453
Author(s):  
D. R. Denslin Brabin ◽  
Sriramulu Bojjagani ◽  
D.R. Denslin Braja

2021 ◽  
Author(s):  
Wanli Lv ◽  
Hongnian Guo ◽  
Yang Du ◽  
Jinmin Hu ◽  
Zhaoxia Yin

2021 ◽  
Vol 12 (1) ◽  
Author(s):  
Kyle J. Tomek ◽  
Kevin Volkel ◽  
Elaine W. Indermaur ◽  
James M. Tuck ◽  
Albert J. Keung

AbstractDNA holds significant promise as a data storage medium due to its density, longevity, and resource and energy conservation. These advantages arise from the inherent biomolecular structure of DNA which differentiates it from conventional storage media. The unique molecular architecture of DNA storage also prompts important discussions on how data should be organized, accessed, and manipulated and what practical functionalities may be possible. Here we leverage thermodynamic tuning of biomolecular interactions to implement useful data access and organizational features. Specific sets of environmental conditions including distinct DNA concentrations and temperatures were screened for their ability to switchably access either all DNA strands encoding full image files from a GB-sized background database or subsets of those strands encoding low resolution, File Preview, versions. We demonstrate File Preview with four JPEG images and provide an argument for the substantial and practical economic benefit of this generalizable strategy to organize data.


Author(s):  
Prof. Asma Shaikh ◽  
Ms. Rasika Kotavadekar ◽  
Ms. Sanjita Sawant ◽  
Ms. Sayali Landge

The biggest invention of 21st century is the social media. It is biggest platform which is using to share data, files and documents. Even it is using to share thoughts, ideas and feelings using different tools and techniques. People are hyper connected with each other and they are continuously sharing the information. For criminals, deploying malware in such scenario is very easy and propagating malware through JPEG images and QR Code is one of the best and most advanced method. Using steganography techniques, criminals embedded the malicious codes with legitimate or innocent looking images. This malicious content is just few line of codes which exploit the vulnerability of application. It give remote access of this system to the attacker which can do criminal act. In this framework, our primary purpose is to find the presence of any code or data in image. After it, the major section of this framework based upon the finding of code and its adverse effects. This framework shows the corresponding solution to the malicious code presence in JPEG images and QR code which are spreading through online social networking sites.


Author(s):  
Hrishikesh Korane ◽  
Anish Pratap Singh ◽  
Chandra Prakash Mirdul ◽  
Shivraj Thokale

A new grayscale-based block scrambling image encryption scheme is presented to enhance the security of Encryption-then-Compression (EtC) systems, which are used to securely transmit images through an untrusted channel provider. The proposed scheme enables the use of a smaller block size and a larger number of blocks than the new encryption scheme. Images encrypted using the proposed scheme include less color information due to the use of grayscale images even when the original image has three color channels. These features enhance security against various attacks, such as jigsaw puzzle solver and brute-force attacks. Moreover, it allows the use of color sub-sampling, which can improve the compression performance, although the encrypted images have no color information. In an experiment, encrypted images were uploaded to and then downloaded from Social networking sites, and the results demonstrated that the proposed scheme is effective for EtC systems, while maintaining a high compression performance using advanced compression algorithms.


Sign in / Sign up

Export Citation Format

Share Document