2009
DOI: 10.2478/v10143-009-0018-6
|View full text |Cite
|
Sign up to set email alerts
|

Kutter Steganographical Method's Improvement and Concept of Universal Stegoconstructor

Abstract: Kutter Steganographical Method's Improvement and Concept of Universal Stegoconstructor Information interchange is one of the main processes in human everyday life. This process was simplified due to development of modern technologies, especially computer technologies. But the drawback of such transmission is data exposure. Steganography tries to find possible decisions of this problem. The main difference between steganography and cryptography: malicious person has no any data about information hiding … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0

Year Published

2010
2010
2016
2016

Publication Types

Select...
3

Relationship

2
1

Authors

Journals

citations
Cited by 3 publications
(6 citation statements)
references
References 2 publications
(5 reference statements)
0
6
0
Order By: Relevance
“…A connected concept to the approach defined in Section III is the Universal Stegoconstructor, which is described in detail in [25] and [11]. It allows the customer to receive and the developer to select the most appropriate steganographic method based on the criteria defined.…”
Section: The Universal Stegoconstructormentioning
confidence: 99%
See 1 more Smart Citation
“…A connected concept to the approach defined in Section III is the Universal Stegoconstructor, which is described in detail in [25] and [11]. It allows the customer to receive and the developer to select the most appropriate steganographic method based on the criteria defined.…”
Section: The Universal Stegoconstructormentioning
confidence: 99%
“…The concept of the Universal Stegoconstructor[25] modified with the inputs from the approach introduced in the present research (A, B, C, D).…”
mentioning
confidence: 99%
“…Authors of this paper developed the concept of universal stegoconstructor in their previous work [3], which allows receiving the most appropriate data hiding method for the chosen data carrier based on the given criteria [3]. As watermarking is special kind of data hiding, authors decided to adapt the stegoconstructor for finding/creating optimized watermarking technique.…”
Section: Finding Optimized Watermarking Techniquementioning
confidence: 99%
“…On the 2 nd step the algorithm is applied, which transforms host signal (or data carrier), taking into account format features chosen by the customer, so that methods of theory of signal transmission (TST) could be used comfortably [3], [12]. In this step also limitation list is created, which influences the selection of digital watermarking method in next steps.…”
Section: Finding Optimized Watermarking Techniquementioning
confidence: 99%
See 1 more Smart Citation