Kutter Steganographical Method's Improvement and Concept of Universal Stegoconstructor Information interchange is one of the main processes in human everyday life. This process was simplified due to development of modern technologies, especially computer technologies. But the drawback of such transmission is data exposure. Steganography tries to find possible decisions of this problem. The main difference between steganography and cryptography: malicious person has no any data about information hiding in first case. That's mean he doesn't think about possible valuable information in message. This paper contains information about the conception of digital steganography's development as protection method of the confidential information. Classification of the basic scopes is given, and the problems facing to the given science are explained. Some aspects of steganography were examined in the context of the theory of signal transmission. The properties of possible universal stegomethod's constructor are determined on the basis of required transmission's reliability. The way, which increases the probability of a bit correct detecting in Kutter method till 70%, is offered as improvement of data embedding procedure. Disadvantages of the original steganographical Kutter method's were commented at the same time. Results of experiments are presented as numerous histograms.
Geographic Information Systems (GIS) perform the computational processing of geographic data and store the geometry and the attributes of data that are geo-referenced, that is, situated on the earth surface and represented in a cartographic projection. Integral part of GIS functionality is an opportunity to make a complex analysis, which is able to integrate geo-referenced imagery as data layers or themes and link them to other data sets producing geospatial renderings of data. Based on Service-Oriented Architecture (SOA) GIS expose its capabilities as Web services with purpose to create a flexible and extensible GIS that can quickly respond to changing and future organizational needs. In that case client’s application sends specially formed requests to the GIS services and ensures visual processing of responses. But the drawback is the count of such requests, because imaginary data and data needed for analysis are received sequentially (not simultaneously). The purpose of this paper is to present the solution of decreasing the amount of geo-requests, enabling extensions to existing GIS visual analysis tools and bringing into GIS SOA synchronization mechanism designed on principles of concatenated steganography. This ensures that various geospatial data streams will be kept, transmitted and analytically processed together using concatenated steganography, strongly taking into account mutual relations between these streams.
The interest in the digital steganography grows together with the rise of amounts of multimedia data exchanged over the Internet. This growth provides steganography with new possibilities and opportunities for data hiding. The information hiding in audio streams is considered especially promising due to audio data popularity and possibilities to hide data within audio signals. There are many data hiding methods. The steganography is used to process audio streams, and the new methods are constantly emerging. These methods have different applications and targets, features and properties. This paper presents the Unified Evaluation System (UES) for evaluation, comparison and classification of audio steganography methods proposed by the authors. UES is a set of calculation principles, which are especially combined for audio steganographic methods. The system's outcomes provide conclusions in order to determine advantages/disadvantages of the methods and to define the audio steganography methods as the most suitable for each particular case.
-Information interchange is one of the main processes in our everyday life. This process was simplified due to development of modern technologies, especially computer technologies. But the drawback of such transfer is the simplification of copyrights infringement. Steganography is modern science with old historical roots, its goal is during transmission to hide secret information. This science has some trends; in this case digital steganography is the most actual trend. One of digital steganography's research branches tries to find possible solutions of this problem. As a result of given researches the technologies of watermarks and fingerprints appeared. This paper contains information about the conception of digital steganography's development as protection method of the intellectual property. The basic scope of watermarking is classified, and the problem of selection of appropriate steganographic copyrights methods is designated. Eventually the universal constructor presented in the previous research is extended and adapted to resolve problem mentioned.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.