Propose a New Steganalysis Method for BPeS which base on Markov model. According to BPeS steganography algorithm destroy the continuity of images, divide the least significant bit plane of images to sub-blocks. Then calculate the complexity of the various blocks to form Markov matrix, and scan the matrix to construct the Markov model, extracting features to classification test. In the experiment use support vector machine (SVM) classifier to train and c1assity.Experimental results show that the method performs well for BPeS steganography algorithm.
In Cloud computing, data and service requests are responded by remote processes calls on huge data server clusters that are not totally trusted. The new computing pattern may cause many potential security threats. This paper explores how to ensure the integrity and correctness of data storage in cloud computing with user's key pair. In this paper, we aim mainly at constructing of a quick data chunk verifying scheme to maintain data in data center by implementing a balance strategy of cloud computing costs, removing the heavy computing load of clients, and applying an automatic data integrity maintenance method. In our scheme, third party auditor (TPA) is kept in the scheme, for the sake of the client, to periodically check the integrity of data blocks stored in data center. Our scheme supports quick public data integrity verification and chunk redundancy strategy. Compared with the existing scheme, it takes the advantage of ocean data support and high performance.Cloud computing is a new computing pattern and Internet-based architecture. This computing pattern can greatly improve user's efficiency and bring down data processing costs. As data is stored on oceans of untreated servers, the most important concern with cloud storage is data correctness and retrievability verification. With the large size of the outsourced files in different locations and the client's constrained bandwidth, computing, and storage capability, it is critical to solve the problem for the client to figure out an efficient scheme that can periodically and automatically checking the correctness of their files without transferring the overall files remotely and accepting computing burden.In order to solve this problem, lots of work has been done in remote storage verification [1][2][3] , data correcting, and remote data management. Ateniese et al [4] proposed the "provable data possession" scheme to ensure the possession of data on distributed untrusted server nodes. The construction uses file's RSA homomorphic tags to check the remotely stored files. Although the scheme offers verifiability with public key, it does not consider how to recover the damaged data and redundancy data transformation. When a user tries to update a file, he has to initiate all the tags once more. In the following scheme of their research, Ateniese et al [5] presented another new version of PDP scheme supporting dynamic data updating. However, data dynamic insertion is not supported in the scheme, and the interactions are easily denied by an adversary. Juels et al [6] described a "proof of retrievability" (PoR) model, in which verifying in view and an error correcting code are applied. Both
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.