TERRORIST organizations, MUNICIPAL services, DATA protection, CRYPTOGRAPHY, DIGITAL images, ALGORITHMS, DIGITAL communications
Abstract
Copyright of Informatics & Mathematical Methods in Simulation / Informatika ta Matematičnì Metodi v Modelûvannì is the property of Odessa Polytechnic University and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
DATA integrity, INFORMATION technology security, FALSIFICATION, DIGITAL images, ALGORITHMS
Abstract
Copyright of Informatics & Mathematical Methods in Simulation / Informatika ta Matematičnì Metodi v Modelûvannì is the property of Odessa Polytechnic University and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
Зоріло, В. В., Лебедєва, О. Ю., and Бохонько, М. В.
Subjects
IMAGE analysis, TEXT messages, DIGITAL images, CRYPTOGRAPHY, ALGORITHMS, HASHING
Abstract
Copyright of Informatics & Mathematical Methods in Simulation / Informatika ta Matematičnì Metodi v Modelûvannì is the property of Odessa Polytechnic University and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
CRYPTOGRAPHY, INFORMATION resources management, DIGITAL images, IMAGE processing, ALGORITHMS
Abstract
This paper is devoted to steganalysis algorithm determining presence a secret message embedded into digital image which is stored in compressed or uncompressed form. The algorithm is based on the analysis of pairs of colors and uses the method of modifying the least significant bit. [ABSTRACT FROM AUTHOR]
Published
2013
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.