Loading...
Search for: perceptual-transparency
0.006 seconds

    High capacity Persian/Arabic text steganography

    , Article Journal of Applied Sciences ; Volume 8, Issue 22 , 2008 , Pages 4173-4179 ; 18125654 (ISSN) Shirali Shahreza, M ; Shirali Shahreza, S ; Sharif University of Technology
    2008
    Abstract
    One of the methods introduced for establishing hidden communication is steganography. Steganography is the art of hiding information in a cover media without attracting attention. Text documents are one of the common cover media used for steganography in past. Steganography in text is more difficult than other media because there is a little redundant information in text documents. In this study, we propose a high capacity text steganography method. Our method can hide about 400 bits in each kilobyte of text. In Persian and Arabic, each letter can have four different shapes regarding to its position in the word. In this method this feature of Persian and Arabic languages is used for... 

    Persian/arabic unicode text steganography

    , Article 4th International Symposium on Information Assurance and Security, IAS 2008, Napoli, 8 September 2008 through 10 September 2008 ; 2008 , Pages 62-66 ; 9780769533247 (ISBN) Shirali Shahreza, M ; Shirali Shahreza, S ; Sharif University of Technology
    2008
    Abstract
    Sending information secretly and communicating covertly have been of great interest for ages. On the other hand, text documents have been widely used and consequently various methods for hiding information in texts (Text Steganography) have been developed so far. In this paper a new method is proposed to hide information in digital Persian and Arabic Unicode texts. In Persian and Arabic, each letter can have four different shapes regarding to its position in the word. In this method by using this feature of Persian and Arabic languages and the way which documents are saved in the Unicode Standard, the information is hidden in Unicode text documents. This method has a good hiding capacity... 

    An improved version of persian/arabic text steganography using "La" word

    , Article Proceedings of IEEE 2008 6th National Conference on Telecommunication Technologies and IEEE 2008 2nd Malaysia Conference on Photonics, NCTT-MCP 2008, 26 August 2008 through 28 August 2008, Putrajaya ; 2008 , Pages 372-376 ; 9781424422159 (ISBN) Shirali Shahreza, M ; Shirali Shahreza, M. H ; Sharif University of Technology
    2008
    Abstract
    By expanding communication, in some cases there is a need for hidden communication. Steganography is one of the methods used for hidden exchange of information. Steganography is a method to hide the information under a cover media such as image or text. One of the text steganography methods for Persian and Arabic texts is "La" steganography method. But that method increases the file size and changes the apparent of the text. In this paper a method for solving these problems is proposed. In Persian and Arabic, each letter can have four different shapes regarding to its position in the word. In this method by using this feature of Persian and Arabic languages and the way which documents are... 

    A contourlet-based image watermarking scheme with high resistance to removal and geometrical attacks

    , Article Eurasip Journal on Advances in Signal Processing ; Volume 2010 , June , 2010 ; 16876172 (ISSN) Khalighi, S ; Tirdad, P ; Rabiee, H. R ; Sharif University of Technology
    2010
    Abstract
    We propose a new nonblind multiresolution watermarking method for still images based on the contourlet transform (CT). In our approach, the watermark is a grayscale image which is embedded into the highest frequency subband of the host image in its contourlet domain. We demonstrate that in comparison to other methods, this method enables us to embed more amounts of data into the directional subbands of the host image without degrading its perceptibility. The experimental results show robustness against several common watermarking attacks such as compression, adding noise, filtering, and geometrical transformations. Since the proposed approach can embed considerable payload, while providing...