158 results on '"jpeg image"'
Search Results
2. Domain Transformation of Distortion Costs for Efficient JPEG Steganography with Symmetric Embedding.
- Author
-
Pan, Yuanfeng and Ni, Jiangqun
- Subjects
- *
JPEG (Image coding standard) , *COST functions , *CRYPTOGRAPHY , *COST - Abstract
Nowadays, most image steganographic schemes embed secret messages by minimizing a well-designed distortion cost function for the corresponding domain, i.e., the spatial domain for spatial image steganography or the JPEG (Joint Photographic Experts Group) domain for JPEG image steganography. In this paper, we break the boundary between these two types of schemes by establishing a theoretical link between the distortion costs in the spatial domain and those in the JPEG domain and thus propose a scheme for domain transformations of distortion costs for efficient JPEG steganography with symmetric embedding, which can directly convert the spatial distortion cost into its JPEG counterpart. Specifically, by formulating the distortion cost function for JPEG images in the decompressed spatial domain, a closed-form expression for a distortion cost cross-domain transformation is derived theoretically, which precisely characterizes the conversion from the distortion costs obtained by existing spatial steganographic schemes to those applied in JPEG steganography. Experimental results demonstrate that the proposed method outperforms other advanced JPEG steganographic schemes, e.g., JUNIWARD (JPEG steganography with Universal Wavelet Relative Distortion), JMiPOD (JPEG steganography by Minimizing the Power of the Optimal Detector), and DCDT (Distortion Cost Domain Transformation), in resisting the detection of various advanced steganalyzers. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
3. Security Improvements of JPEG Images Using Image De-Identification.
- Author
-
Kang, Ho-Seok, Cha, Seongjun, and Kim, Sung-Ryul
- Subjects
JPEG (Image coding standard) ,IMAGE compression ,SYMMETRIC-key algorithms ,CLOUD computing ,SOCIAL networks - Abstract
Today, as data is easily exposed through various channels, such as storing data in cloud services or exchanging data through a SNS (Social Network Service), related privacy issues are receiving a significant amount of attention. In addition, for data that are more sensitive to personal information, such as medical images, more attention should be paid to privacy protection. De-identification is a common method for privacy protection. Typically, it is a method of deleting or masking individual identifiers and omitting quasi-identifiers such as birth dates. In the case of images, de-identification is performed by mosaic processing or applying various effects. In this paper, we present a method of de-identifying an image by encrypting only some of the data in the JPEG (Joint Photograph Experts Group) image format, one of the most common image compression formats, so that the entire image cannot be recognized. The purpose of this paper is to protect images by encrypting only small parts, and not the entire image. This work is suitable for the fast and safe transmission and verification of high-capacity images. We have shown that images can be de-identified by encrypting data from the DHT (Define Huffman Table) segment among the JPEG header segments. Through experiments, we confirmed that that these images could not be identified after encrypting only a minimal portion, compared to previous studies that encrypted entire images, and the encryption speed and decryption speed were also faster and more effective than the results of previous studies. A model was implemented to de-identify images using AES-256 (Advanced Encryption Standard-256) and symmetric key encryption algorithm in the Huffman tables of JPEG headers, resulting in the ability to render entire images unidentifiable quickly and effectively. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
4. Study on Applications of Reversible Information Hiding Algorithms Based on Discrete Cosine Transform Coefficient and Frequency Band Selection in JPEG Image Encryption.
- Author
-
Yingwei Gao
- Abstract
With the development of digital media, its security has also been emphasized, and reversible data hiding (RDH) algorithms has been widely studied. This paper studied RDH algorithms for JPEG images, designed a method to embed secret information by frequency band selection based on discrete cosine transform (DCT) coefficients, called an improved RDH (IRDH) algorithm, and conducted experiments on the USC-SIPI image set. It was found that the designed RDH algorithm had a higher embedding capacity, with an average embedding capacity of 37 031 bits at quantization factor = 50, as well as a higher peak signal-to-noise ratio (PSNR) value and a lower file size increase (FSI) value, compared with the other methods; the dispersion degree of the data obtained by this algorithm was also low. The results demonstrate the reliability of the IRDH algorithm on JPEG images, which can be extended and applied in practice. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
5. Adaptable privacy protection scheme in JPEG images
- Author
-
Hongxin WEN, Fei HU, Nenghai YU
- Subjects
jpeg image ,privacy protection ,reversible data hiding ,face detection ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
The JPEG format is widely used for its high compression rate in image storage.Privacy protection schemes applied to JPEG images not only need to safeguard the content of the privacy region but also maintain the file size.Furthermore, the region of interest (ROI), which contains private information, often occupies only a portion of the entire JPEG image.Protecting only the ROI can help preserve the file size.In light of this, an adaptable privacy protection scheme for JPEG images was proposed.Privacy regions were identified using methods like face detection within the JPEG images.These regions were then modified using the block-based adaptable reversible modification algorithm presented in this study.Reconstruction information was embedded into the image through reversible data hiding.The application of reversible algorithms in the privacy protection process enabled authorized users to fully restore the protected area.By introducing variable parameters, this scheme allowed for the selection of appropriate parameters to meet different practical requirements and achieve optimal encryption results.Additionally, the complex scenario of multiple overlapping ROIs was discussed and resolved.Experimental evaluations were conducted to investigate the influence of parameters on performance, considering both peak signal-to-noise ratio (PSNR) and file size increment.The results demonstrate that the proposed scheme outperforms existing schemes in terms of privacy protection and file size when suitable parameters are employed.
- Published
- 2024
- Full Text
- View/download PDF
6. 适应性JPEG 图像隐私保护方案.
- Author
-
文泓鑫, 胡飞, and 俞能海
- Abstract
Copyright of Chinese Journal of Network & Information Security is the property of Beijing Xintong Media Co., Ltd. and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
7. Reversible data hiding in encrypted JPEG image with changing the number of AC codes.
- Author
-
Yuan, Yuan, Hongjie, He, Chen, Fan, and Yuan, Changqi
- Subjects
REVERSIBLE data hiding (Computer science) ,IMAGE compression ,JPEG (Image coding standard) ,HUFFMAN codes - Abstract
A reversible data hiding (RDH) in encrypted JPEG images (JPEG-RDH-EI) with an adaptive encryption key generated by minimum coded units histogram (MCUH) is proposed. However, the marked encrypted images are vulnerable to chosen-plaintext attack (CPA) since the MCUH is unchanged during the encryption and RDH process, which allows the encryption key can be reproduced by the marked encrypted image. To improve the security of marked encrypted images, this paper changes the MCUH in the RDH process by 0-1 conversion (refers to changing the value of coefficients from 0 to 1). To reduce the file growth, this paper explores the condition that the 0-1 conversion without file growth first. Then, a histogram shift scheme with embeddable zero coefficients is designed. The experimental results show that the proposed scheme can enhance the security of marked encrypted images by changing MCUH. In addition, the proposed algorithm has a smaller file growth and higher maximum embedding capacity than the existing histogram shift schemes since it embeds additional data in zero coefficients. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
8. JPEG reversible data hiding method based on optimal DCT frequency embedding
- Author
-
Ziyang ZHOU, Yun TAN, Jiaohua QIN, Xuyu XIANG
- Subjects
jpeg image ,reversible data hiding ,two-dimensional histogram ,average texture complexity ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
Joint photographic experts group (JPEG) images are widely used on the Internet due to their ability to maintain good picture quality while requiring less storage space.Reversible data hiding (RDH) techniques for JPEG images enable the hiding and extraction of secret information while allowing for lossless restoration of the original image.RDH is of great significance in file management and image authentication.However, many existing RDH methods result in a significant increase in the storage space of the encoded image after embedding secret information.For methods based on discrete cosine transform (DCT) coefficient embedding, the key issue that affects the performance of reversible information hiding in JPEG images is how to select the frequency band position.A reversible information hiding method for JPEG images was proposed, based on optimal DCT frequency embedding.The entropy decoded JPEG image was divided into 8×8 non-overlapping DCT blocks.The average texture complexity of each DCT block was calculated and ordered in ascending order.Then the alternating current (AC) in adjacent DCT blocks was paired pairwise.By satisfying the capacity of the information to be embedded, the optimal AC coefficient frequency position set was obtained from the distortion cost function of the AC coefficient frequency.The secret information was embedded according to the designed two-dimensional histogram mapping strategy.Experimental results demonstrate that the proposed method can reduce the expansion of the loaded image file’s storage size compared to existing methods, while maintaining good visual quality of the cover image.
- Published
- 2023
- Full Text
- View/download PDF
9. Domain Transformation of Distortion Costs for Efficient JPEG Steganography with Symmetric Embedding
- Author
-
Yuanfeng Pan and Jiangqun Ni
- Subjects
steganography with symmetric embedding ,JPEG image ,distortion cost function ,domain transformation ,Mathematics ,QA1-939 - Abstract
Nowadays, most image steganographic schemes embed secret messages by minimizing a well-designed distortion cost function for the corresponding domain, i.e., the spatial domain for spatial image steganography or the JPEG (Joint Photographic Experts Group) domain for JPEG image steganography. In this paper, we break the boundary between these two types of schemes by establishing a theoretical link between the distortion costs in the spatial domain and those in the JPEG domain and thus propose a scheme for domain transformations of distortion costs for efficient JPEG steganography with symmetric embedding, which can directly convert the spatial distortion cost into its JPEG counterpart. Specifically, by formulating the distortion cost function for JPEG images in the decompressed spatial domain, a closed-form expression for a distortion cost cross-domain transformation is derived theoretically, which precisely characterizes the conversion from the distortion costs obtained by existing spatial steganographic schemes to those applied in JPEG steganography. Experimental results demonstrate that the proposed method outperforms other advanced JPEG steganographic schemes, e.g., JUNIWARD (JPEG steganography with Universal Wavelet Relative Distortion), JMiPOD (JPEG steganography by Minimizing the Power of the Optimal Detector), and DCDT (Distortion Cost Domain Transformation), in resisting the detection of various advanced steganalyzers.
- Published
- 2024
- Full Text
- View/download PDF
10. 基于最优DCT 频段嵌入的JPEG 图像可逆信息隐藏方法.
- Author
-
周子扬, 谭云, 秦姣华, and 向旭宇
- Abstract
Copyright of Chinese Journal of Network & Information Security is the property of Beijing Xintong Media Co., Ltd. and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2023
- Full Text
- View/download PDF
11. 基于特征选择和图卷积表示的 JPEG 图像隐写者识别.
- Author
-
张倩倩, 张祎, 李浩, 马媛媛, and 罗向阳
- Abstract
Copyright of Journal on Communication / Tongxin Xuebao is the property of Journal on Communications Editorial Office and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2023
- Full Text
- View/download PDF
12. A Meta-Heuristic Method for Reassemble Bifragmented Intertwined JPEG Image Files in Digital Forensic Investigation
- Author
-
Rabei Raad Ali, Kamaruddin Malik Bin Mohamad, Salama A. Mostafa, Dilovan Asaad Zebari, Mohammed Ahmed Jubair, and M. Turki-Hadj Alouane
- Subjects
Digital forensic ,JPEG image ,image recovery ,meta-heuristic ,genetic algorithm ,reassemble images ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
Traditional image recovery from corrupted file systems plays a significant role in Digital Forensics investigation. The images are mainly considered objective court evidence. Since the JPEG image format is less structured than other image formats (e.g., BMP, PNG, GIF, and TIFF), its recovery is more challenging. The paper’s main objective is to apply a metaheuristic optimization algorithm with similarity metric to recover Bifragmented intertwined JPEG images. We propose a new method known as Meta-Heuristic Reassemble Images (MHRI) for forensic recovery of Bifragmented intertwined JPEG images in the scan area, where all the fragments are in a linear order. The contribution of this paper lies in the following key components composing the MHRI method: 1) restart marker to remove some strange blocks from the scan area; 2) coherence of Euclidean Distance metric (CoEDm) to detect the fragmentation point of intertwined JPEG image; and 3) genetic Algorithm with cost function to predict if every two blocks are sequenced in the same image that searches for the best reassembly solution among the existing solutions. The MHRI method is implemented using MATLAB and tested using public datasets of 25 JPEG images and private dataset of 6 JPEG images. The MHRI process can fully recover all the Bifragmented intertwined JPEG images and 48.4% of all the JPEG images, which comparably performs better than similar methods.
- Published
- 2023
- Full Text
- View/download PDF
13. Robust data hiding for JPEG images with invertible neural network.
- Author
-
Shang, Fei, Lan, Yuhang, Yang, Jianhua, Li, Enping, and Kang, Xiangui
- Subjects
- *
JPEG (Image coding standard) , *DISCRETE cosine transforms , *HUFFMAN codes , *VIDEO compression - Abstract
JPEG compression will cause severe distortion to the shared compressed image, which brings great challenges to extracting messages correctly from the stego image. To address such challenges, we propose a novel end-to-end robust data hiding scheme for JPEG images. The embedding and extracting secret messages on the quantized discrete cosine transform (DCT) coefficients are implemented by the bi-directional process of the invertible neural network (INN), which can provide intrinsic robustness against lossy JPEG compression. We design a JPEG compression attack module to simulate the JPEG compression process, which helps the network automatically learn how to recover the secret message from JPEG compressed image. Experimental results have demonstrated that our method achieves strong robustness against lossy JPEG compression, and also significantly improves the security compared with the existing data hiding methods on the premise of ensuring image quality and high capacity. For example, the detection error of our method against XuNet has been increased by 3.45% over the existing data hiding methods. • We propose a novel end-to-end robust data hiding scheme for JPEG images. • We design a JPEG compression attack module to simulate the JPEG compression process. • Our method achieves strong robustness against lossy JPEG compression. • Our method significantly improves security under high embedding capacity. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
14. Fast Attack Algorithm for JPEG Image Encryption with Block Position Shuffle
- Author
-
Li, Shanshan, Guo, Yali, Huang, Jiaxin, and Gao, Ruoyun
- Published
- 2023
- Full Text
- View/download PDF
15. Steganalysis of JPEG images using non-linear residuals.
- Author
-
XIA Chao, LIU Yaqi, GUAN Qingxiao, JIN Xin, ZHANG Yanshuo, and XU Shengwei
- Abstract
Most current JPEG steganalytic methods can only extract features from a series of linear residuals. Non-linear filters are not considered in these JPEG steganalytic methods, resulting in single types of residuals. Hence, a JPEG steganalytic method using non-linear residuals was proposed. Firstly, non-linear residuals were generated without a high computational cost by using element-wise minimum and maximum operations across a couple of linear residuals which had been obtained in the current JPEG steganalytic method. Secondly, according to the JPEG phase, the non-linear residual was divided into sub-residuals in which the histogram features were extracted. Thirdly, considering the minimum and maximum operators, the symmetrization method was accordingly designed. Finally, all the symmetrized histogram features were concatenated to form the final feature set. Experimental results indicate that the performance for JPEG steganalysis can be improved effectively by using both the linear and the non-linear residuals. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
16. Efficient JPEG image steganography using pairwise conditional random field model.
- Author
-
Pan, Yuanfeng, Ni, Jiangqun, Liu, Qingliang, Su, Wenkang, and Huang, Jiwu
- Subjects
- *
MARKOV random fields , *RANDOM fields , *JPEG (Image coding standard) , *DISCRETE cosine transforms , *CRYPTOGRAPHY , *RANDOM variables , *DISTRIBUTION (Probability theory) - Abstract
Recent research shows that the security performance of JPEG image steganography can be improved by developing an accurate statistical model to characterize the correlations between Discrete Cosine Transform (DCT) coefficients. In this paper, a novel JPEG steganographic scheme called J-CRF is proposed to characterize the correlations between DCT coefficients using a pairwise Conditional Random Field (CRF) model, in which the correlated DCT coefficient pairs are modeled as bivariate Gaussian random variables. Under the framework of pairwise CRF, the proposed scheme formulates the problem of minimizing the statistical detectability within the Gaussian image model as the minimization of the sum of a series of unary and pairwise potentials, both of which are utilized to measure the local detectability of embedding messages in the DCT coefficient pairs. All the potentials associated with statistical detectability are formalized as the KL divergence between the statistical distributions of the cover and the stego. Experimental results demonstrate that the proposed J-CRF can outperform other SOTA JPEG steganographic schemes, e.g., J-UNIWARD, J-MiPOD, and JEC-RL, in resisting the detection of various advanced steganalyzers. In addition, the performance of J-CRF could be further boosted by reformulating it as the weighted sum of unary and pairwise potentials, called J-CRFW. • Propose a novel JPEG steganographic scheme J-CRF using Conditional Random Field (CRF). • Characterize the correlations between DCT coefficients using pairwise CRF. • Cast the task of JPEG steganography as minimizing the detectability with CRF. • Improve J-CRF by reformulating the sum of potentials in a weighted manner. • Demonstrate superior security performance over other SOTA schemes. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
17. Cross-Domain Using Composing of Selected DCT Coefficients Strategy with Quantization Tables for Reversible Data Hiding in JPEG Image
- Author
-
Huy, Pham Quang, Thanh, Ta Minh, Tai, Le Danh, Van Toan, Pham, Kacprzyk, Janusz, Series Editor, Pal, Nikhil R., Advisory Editor, Bello Perez, Rafael, Advisory Editor, Corchado, Emilio S., Advisory Editor, Hagras, Hani, Advisory Editor, Kóczy, László T., Advisory Editor, Kreinovich, Vladik, Advisory Editor, Lin, Chin-Teng, Advisory Editor, Lu, Jie, Advisory Editor, Melin, Patricia, Advisory Editor, Nedjah, Nadia, Advisory Editor, Nguyen, Ngoc Thanh, Advisory Editor, Wang, Jun, Advisory Editor, Kumar, Raghvendra, editor, Quang, Nguyen Ho, editor, Kumar Solanki, Vijender, editor, Cardona, Manuel, editor, and Pattnaik, Prasant Kumar, editor
- Published
- 2021
- Full Text
- View/download PDF
18. IDENTIFYING OPTIMAL MESSAGE EMBEDDING LOCATION IN AUDIO STEGANOGRAPHY USING GENERATIVE ADVERSARIAL NETWORKS.
- Author
-
Hajer, Muatamed and Anbar, Mohammed
- Subjects
GENERATIVE adversarial networks ,MARKOV processes ,DEEP learning ,DATA protection ,ACCESS control - Abstract
Audio steganography (AS) uses the auditory redundancy of the human ear to conceal the hidden message inside the audio track. In recent studies, deep learning-based steganalysis has swiftly revealed AS by extracting high-dimensional stego acoustic features for categorization. There is still an opportunity for improvement in the current audio steganography required for managing communication confidentiality, access control and data protection. The main objective of this research is to improving the data protection by identifying the data embedding location in the audio. Generative Adversarial Network-based Audio Steganography Framework (GAN-ASF) is presented in this study, and it can automatically learn to provide better cover audio for message embedding. The suggested framework’s training architecture comprises a generator, a discriminator, and a steganalyzer learned using deep learning. The Least Significant Bit Matching (LSBM) message embedding technique encrypts the secret message into the steganographic cover audio, which is then forwarded to a trained steganalyzer for misinterpretation as cover audio. After performing the training, stenographic cover audio has been generated for encoding the secret message. Here, Markov model of co-frequency sub images to generate the best cover frequency sub-image to locate an image’s hidden payload. Steganographic cover audio created by GAN-ASF has been tested and found to be of excellent quality for embedding messages. The suggested method’s detection accuracy is lower than that of the most current state-of-the-art deep learning-based steganalysis. This payload placement approach has considerably increased stego locations’ accuracy in low frequencies. The test results GAN-ASF achieves a performance ratio of 94.5 %, accuracy ratio of 96.2 %, an error rate of 15.7 %, SNR 24.3 %, and an efficiency ratio of 94.8 % compared to other methods [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
19. A Novel Feature Selection Model for JPEG Image Steganalysis
- Author
-
Yang, Liran, Zhong, Jing, Zhong, Ping, Xue, Yiming, Wen, Juan, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Woeginger, Gerhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Wang, Hongxia, editor, Zhao, Xianfeng, editor, Shi, Yunqing, editor, Kim, Hyoung Joong, editor, and Piva, Alessandro, editor
- Published
- 2020
- Full Text
- View/download PDF
20. Designing Non-additive Distortions for JPEG Steganography Based on Blocking Artifacts Reduction
- Author
-
Lu, Yubo, Zhai, Liming, Wang, Lina, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Woeginger, Gerhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Wang, Hongxia, editor, Zhao, Xianfeng, editor, Shi, Yunqing, editor, Kim, Hyoung Joong, editor, and Piva, Alessandro, editor
- Published
- 2020
- Full Text
- View/download PDF
21. DBFS: Dragonfly Bayes Fusion System to detect the tampered JPEG image for forensic analysis.
- Author
-
Shelke, Priya M. and Prasad, Rajesh S.
- Abstract
Due to the advancement of a variety of photo editing and image processing software, image forensics analysis has become an important research topic in recent years. Numbers of research works are presented for image forensic analysis. Accordingly, this paper proposes a method named as Dragonfly Bayes Fusion System (DBFS) by integrating the Naive Bayes (NB) classifier and the Dragonfly optimization for detecting the tampered Joint Photographic Experts Group image. Initially, the input image is applied to the existing six forensic tools separately, and the classified binary map is generated. Then, the proposed DBFS fuses these decisions for generating the optimal decision. Here, the NB classifier creates the model by finding the mean and variance of every feature and this model is given as input to the Dragonfly optimization for optimally generating the probabilistic measures. Finally, the posterior probability of each feature is determined with respect to the tampered class, and the original class and the tampered image block is determined. The performance of the proposed system is evaluated with the existing methods, such as fuzzy theory based classification, rule-based classification, average method, and weighted average method for the evaluation metrics accuracy, False Positive Rate (FPR), and True Positive Rate (TPR). The experimental results show that the proposed system outperforms the existing methods by obtaining the maximum accuracy of 0.9519, minimum FPR of 0.0490, and maximum TPR of 0.8720 when compared to the existing methods. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
22. Robust reversible watermarking of JPEG images.
- Author
-
Liang, Xingyuan and Xiang, Shijun
- Subjects
- *
DIGITAL image watermarking , *ADDITIVE white Gaussian noise , *DISCRETE cosine transforms , *COPYRIGHT , *IMAGE processing - Abstract
Robust reversible watermarking (RRW) is a potential technology for copyright protection and integrity authentication due to its ability in both robustness and reversibility. Currently, there is no detailed report on RRW of JPEG images. In this paper, we propose an RRW algorithm of JPEG images by selecting quantized discrete cosine transform coefficients to construct robust features for watermarking. In the proposed algorithm, a watermark sequence can be embedded into a JPEG image by shifting the histogram of its constructed robust features. For less embedding distortion, smaller file size, and higher structural similarity, an evaluation method has been designed to select those appropriate frequency bands for watermarking. On the receiver side, the watermark can be accurately extracted by reconstructing the robust features, and the original JPEG image can be restored losslessly by performing the inverse operation of the histogram shifting. Experimental results show that the watermark is robust to common image processing operations (e.g., JPEG recompression, JPEG2000 compression, WebP compression, and additive white Gaussian noise), and can effectively resist those attacks from the lossy channels in real life, such as the most popular apps Instagram and WeChat. • Propose a robust reversible watermarking algorithm of JPEG images. • Propose a method to construct robust features in JPEG images. • Design an evaluation method to select appropriate frequency bands for watermarking. • The proposed algorithm achieves reversibility for JPEG images and strong robustness. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
23. JPEG image steganography payload location based on optimal estimation of cover co-frequency sub-image
- Author
-
Jie Wang, Chunfang Yang, Ma Zhu, Xiaofeng Song, Yuan Liu, and Yuemeng Lian
- Subjects
Steganography ,JPEG image ,Payload location ,Cover estimation ,Electronics ,TK7800-8360 - Abstract
Abstract The excellent cover estimation is very important to the payload location of JPEG image steganography. But it is still hard to exactly estimate the quantized DCT coefficients in cover JPEG image. Therefore, this paper proposes a JPEG image steganography payload location method based on optimal estimation of cover co-frequency sub-image, which estimates the cover JPEG image based on the Markov model of co-frequency sub-image. The proposed method combines the coefficients of the same position in each 8 × 8 block in the JPEG image to obtain 64 co-frequency sub-images and then uses the maximum a posterior (MAP) probability algorithm to find the optimal estimations of cover co-frequency sub-images by the Markov model. Then, the residual of each DCT coefficient is obtained by computing the absolute difference between it and the estimated cover version of it, and the average residual over coefficients in the same position of multiple stego images embedded along the same path is used to estimate the stego position. The experimental results show that the proposed payload location method can significantly improve the locating accuracy of the stego positions in low frequencies.
- Published
- 2021
- Full Text
- View/download PDF
24. 基于频率选择扩容的 JPEG 图像可逆信息隐藏技术.
- Author
-
吕皖丽 and 檀胜
- Abstract
Copyright of Journal of South China University of Technology (Natural Science Edition) is the property of South China University of Technology and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2022
- Full Text
- View/download PDF
25. An EMD-based data hiding scheme for JPEG images.
- Author
-
Xie, Xiao-Zhu, Chang, Chin-Chen, and Horng, Ji-Hwei
- Subjects
- *
JPEG (Image coding standard) , *DISCRETE cosine transforms , *ALTERNATING currents - Abstract
As a commonly used image format, JPEG image is popularly used as the carrier for data hiding. After analyzing the virtue of the exploiting-modification-direction (EMD) scheme, which is designed for the spatial domain, this paper reforms its extraction function and applies it to the non-zero alternating current (AC) coefficients of JPEG images. Besides, a block and coefficient selection strategy is utilised to further improve the image quality and suppress the increase of file size. More specifically, the smooth discrete cosine transform (DCT) blocks with fewer zero AC coefficients are preferentially selected to embed data. The experiments indicate that our scheme achieves a high embedding capacity, meanwhile, the stego-image quality keeps good and the file size preserves well, moreover, our scheme is superior to the state-of-the-art scheme. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
26. Efficient Reversible Data Hiding for JPEG Images With Multiple Histograms Modification.
- Author
-
Xiao, Mengyao, Li, Xiaolong, Ma, Bin, Zhang, Xinpeng, and Zhao, Yao
- Subjects
- *
JPEG (Image coding standard) , *GREEDY algorithms , *HISTOGRAMS , *DISCRETE cosine transforms - Abstract
Most current reversible data hiding (RDH) techniques are designed for uncompressed images. However, JPEG images are more commonly used in our daily lives. Up to now, several RDH methods for JPEG images have been proposed, yet few of them investigated the adaptive data embedding as the lack of accurate measurement for the embedding distortion. To realize adaptive embedding and optimize the embedding performance, in this article, a novel RDH scheme for JPEG images based on multiple histogram modification (MHM) and rate-distortion optimization is proposed. Firstly, with selected coefficients, the RDH for JPEG images is generalized into a MHM embedding framework. Then, by estimating the embedding distortion, the rate-distortion model is formulated, so that the expansion bins can be adaptively determined for different histograms and images. Finally, to optimize the embedding performance in real time, a greedy algorithm with low computation complexity is proposed to derive the nearly optimal embedding efficiently. Experiments show that the proposed method can yield better embedding performance compared with state-of-the-art methods in terms of both visual quality and file size preservation. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
27. Classification of JPEG Files by Using Extreme Learning Machine
- Author
-
Ali, Rabei Raad, Mohamad, Kamaruddin Malik, Jamel, Sapiee, Khalid, Shamsul Kamal Ahmad, Kacprzyk, Janusz, Series editor, Pal, Nikhil R., Advisory editor, Bello Perez, Rafael, Advisory editor, Corchado, Emilio S., Advisory editor, Hagras, Hani, Advisory editor, Kóczy, László T., Advisory editor, Kreinovich, Vladik, Advisory editor, Lin, Chin-Teng, Advisory editor, Lu, Jie, Advisory editor, Melin, Patricia, Advisory editor, Nedjah, Nadia, Advisory editor, Nguyen, Ngoc Thanh, Advisory editor, Wang, Jun, Advisory editor, Ghazali, Rozaida, editor, Deris, Mustafa Mat, editor, Nawi, Nazri Mohd, editor, and Abawajy, Jemal H., editor
- Published
- 2018
- Full Text
- View/download PDF
28. Compression Techniques for the JPEG Image Standard by Using Image Compression Algorithm.
- Author
-
BRISAM, AHMED A. and MOSA, QUSAY O.
- Subjects
DISCRETE cosine transforms ,JPEG (Image coding standard) ,IMAGE compression standards ,IMAGE transmission ,IMAGE compression - Abstract
Because of the raising needs for transmitting images in computer, mobile milieus, the study in the area of compressing image maximized considerably. Compressing image plays a critical part in processing digital images. The essential concept of compressing data is to decrease the data correlation. Through employing Discrete Cosine Transform (DCT), the data in time field could be transmuted into the field of frequency. Due to the reduced sensitivity of human sight in higher frequency, I is possible to compress data of the image or video by overturning its high frequency constituents nonetheless do no alteration to the eye. When pictures move like in video, the data in three-dimnsional space includes spatial plane and time axis. Hence, beside decreasing spatial correlation, time correlation is needed to be decreased. A process is presented named Motion Estimation (ME). Moreover, we can substitute the image by a Motion Vector (MV) to decrease time correlation. Thus, the improvement of effective methods for image compression becomes essential. Through the study, we similarly present JPEG standard and MPEG standard that are reputed image and video compression standard, correspondingly. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
29. Reversible data hiding of JPEG images based on block sorting and segmented embedding.
- Author
-
Mao, Ningxiong, He, Hongjie, Chen, Fan, Bellavista, Paolo, and Yang, Yaolin
- Subjects
REVERSIBLE data hiding (Computer science) ,JPEG (Image coding standard) ,HUFFMAN codes ,DISCRETE cosine transforms ,ALTERNATING currents ,SUM of squares ,CLASSIFICATION algorithms - Abstract
• Novel block sorting method. In this paper, the smoothness of the block is evaluated by using the number of zeros in the EOB and the sum of squares of the differences between the DC (Direct current, DC) coefficients of the block and the four neighborhoods of the context. • Segmented data embedding. The sequence of blocks is divided into three segments. The first and second segments expand peak points (−1, 1) and (−1, 0) to embed data, respectively. The blocks in the third segment are kept unchanged. • Dynamic allocation solution method. The approximate optimal segmentation of the DCT block sequence can be quickly solved by the dynamic allocation solution method. This method reduces the solution space by setting the dynamic allocation step size. Existing JPEG image reversible data hiding (RDH) schemes based on quantized DCT (Discrete cosine transform) modification usually use non-zero or zero AC (Alternating current) coefficients as peak points for data embedding. However, this approach tends to limit the embedding capacity or result in significant file size growth. This paper proposed an RDH scheme for JPEG images based on DCT block sorting and segmented embedding. This scheme can take into account the dual advantages of having a non-zero or zero AC coefficient as the peak point, so it has both high embedding capacity and low file growth, and good visual quality. Firstly, a new DCT block sorting method is designed, the smoothness of the block is estimated by the number of zero coefficients in the EOB (End of Block) and the fluctuation of the DC coefficient in the block, and the zero coefficients in the EOB in the block have not embedded data. Then, the sorted DCT block sequence is divided into three segments, the peak points of the front two segments are (−1, 1) and (−1, 0) respectively, and the third segment may be empty but it always remains unchanged. Finally, the dynamic allocation method is used to quickly solve the optimal segmentation point to achieve the optimal embedding performance. The experimental results show that the overall performance of this scheme is better than the existing state-of-the-art algorithms. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
30. Enhancing Security for JPEG Image Against Mosaic Attack Using Inter-Block Shuffle Encryption
- Author
-
Shanshan Li, Ruolan Ma, and Hongli Zhang
- Subjects
JPEG image ,inter-block shuffle ,image encryption attack ,chosen-plain-text attack ,mosaic appearance ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
Inter-block shuffle has been proved to be able to enhance the security for JPEG image encryption. However, it does not change the numbers of non-zero coefficients in 8*8 blocks. This leads to information leakage. In this paper, the defects of inter-block shuffle are analyzed. An attack scheme is developed based on a combined application of chosen-plain-text attack and non-zero quantized coefficients counting attack. It is verified that the main content of the original image could be reconstructed without the knowledge of encryption algorithm details and keys. The attack results are visualized to be mosaic appearance images. An improvement of the attack is also provided, which is called a fast mosaic attack. In the improved attack, the chosen images are designed to have distinguished numbers of non-zero quantized DCT coefficients in different blocks. The designed images remarkably accelerate the attack processing. The fast mosaic attack generates the same results as the original scheme with the much smaller time cost.
- Published
- 2019
- Full Text
- View/download PDF
31. An Adaptive Reversible Data Hiding Scheme for JPEG Images
- Author
-
Yin, Jiaxin, Wang, Rui, Guo, Yuanfang, Liu, Feng, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Weikum, Gerhard, Series editor, Shi, Yun Qing, editor, Kim, Hyoung Joong, editor, Perez-Gonzalez, Fernando, editor, and Liu, Feng, editor
- Published
- 2017
- Full Text
- View/download PDF
32. Discovering Adobe Publish Online
- Author
-
Padova, Ted and Padova, Ted
- Published
- 2017
- Full Text
- View/download PDF
33. Optimizing and Publishing Animate CC Projects
- Author
-
Green, Tom, Labrecque, Joseph, GREEN, TOM, and Labrecque, Joseph
- Published
- 2017
- Full Text
- View/download PDF
34. JPEG image steganography payload location based on optimal estimation of cover co-frequency sub-image.
- Author
-
Wang, Jie, Yang, Chunfang, Zhu, Ma, Song, Xiaofeng, Liu, Yuan, and Lian, Yuemeng
- Subjects
- *
JPEG (Image coding standard) , *CRYPTOGRAPHY , *MARKOV processes , *IMAGE - Abstract
The excellent cover estimation is very important to the payload location of JPEG image steganography. But it is still hard to exactly estimate the quantized DCT coefficients in cover JPEG image. Therefore, this paper proposes a JPEG image steganography payload location method based on optimal estimation of cover co-frequency sub-image, which estimates the cover JPEG image based on the Markov model of co-frequency sub-image. The proposed method combines the coefficients of the same position in each 8 × 8 block in the JPEG image to obtain 64 co-frequency sub-images and then uses the maximum a posterior (MAP) probability algorithm to find the optimal estimations of cover co-frequency sub-images by the Markov model. Then, the residual of each DCT coefficient is obtained by computing the absolute difference between it and the estimated cover version of it, and the average residual over coefficients in the same position of multiple stego images embedded along the same path is used to estimate the stego position. The experimental results show that the proposed payload location method can significantly improve the locating accuracy of the stego positions in low frequencies. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
35. Dual-JPEG-image reversible data hiding.
- Author
-
Yao, Heng, Mao, Fanyu, Qin, Chuan, and Tang, Zhenjun
- Subjects
- *
DISCRETE cosine transforms , *IMAGE compression , *JPEG (Image coding standard) , *ELECTRONIC authentication - Abstract
• The strategy for dual-JPEG-image RDH is proposed for the first time in this study. • The dual strategy is introduced to deal with low correlation of DCT coefficients. • The range for embeddable coefficients is extended. • The number of embedding bits per coefficient is increased. • The number and order of embedding bits are arranged by combining two distortions. Because of the widespread popularity of JPEG image compression format, reversible data hiding (RDH) for JPEG images has practical application value with increasing research attention. This paper proposes a dual-image RDH method based on a modification of the discrete cosine transform (DCT) coefficients. Because of the limited embedding capacity, a dual-image strategy is introduced and improved according to the characteristics of JPEG. In our method, all nonzero DCT coefficients are embedded without the additional distortion caused by invalid modifications, and the spatial distortion caused by the modification of DCT coefficients with different frequencies varies. A dynamic allocation method is proposed to arrange the embedding capacity reasonably to achieve less distortion. The nonzero DCT coefficients can be embedded flexibly with different bits of secret data to significantly improve the embedding capacity. As far as we know, this is the first work to achieve RDH in JPEG images in a dual-image manner. Furthermore, we also apply the proposed method to the reversible authentication of JPEG images. Experimental results demonstrate the efficacy of the proposed method with high embedding capacity and satisfactory visual quality while suppressing file size expansion. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
36. Reversible Data Hiding in JPEG Images Based on Negative Influence Models.
- Author
-
He, Junhui, Chen, Junxi, and Tang, Shaohua
- Abstract
Reversible data hiding (RDH) can be used to imperceptibly embed data into images in a reversible manner. Many RDH schemes have been developed for uncompressed images. However, JPEG compressed images are more widely used in our daily lives. The existing RDH techniques for JPEG images may cause significant distortion or a large increase in the file size of marked images. In this paper, a novel RDH scheme for JPEG images is proposed. First, the negative influence models of data embedding, including image visual distortion model and file size change model, are mathematically established. Then, a negative index for each frequency is defined as the weighted sum of the normalized average image visual distortion and the normalized average file size change per 1-bit hidden data, and the frequencies with small negative indices will be used for data embedding with a high priority. The weighting factor can be adjusted according to the user’s preference for less image distortion or smaller file size. Lastly, secret data is embedded into non-zero quantized AC coefficients of the selected frequencies in ascending order of zero-run length. Extensive experiments conducted on typical images and a well-known image database show that the presented negative influence models are effective, and the proposed RDH scheme based on the models can achieve low image distortion and small increase in the file size of marked images. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
37. Improving the Detection Rate of Forgery JPEG Images based on Combining Histogram Features and Discrete Wavelet Transform (DWT) with the use of Support-Vector Machine.
- Author
-
Mohammadi, Azam and Navabifar, Farhad
- Subjects
- *
DISCRETE wavelet transforms , *IMAGE compression , *FORGERY , *JPEG (Image coding standard) , *ELECTRONIC money , *HISTOGRAMS - Abstract
Manipulating digital images is not often a difficult task due to the rapid development of software and image manipulation techniques. Hence, there is no need for professional skills or training. When used as an artistic tool, it is completely harmless, but when these images can be presented in judicial system as evidence or for the creation of political associations, as well as, using them in legal documents, electronic money circulation or press; in these cases, the distinction between an original image and a forgery image is very important. In order to solve the problem in this research using a Discrete Wavelet Transform (DWT), which is performed by decomposing a signal into smaller and smaller details, as well as, the use of periodic patterns in the histogram generated by double compression with different coefficients, significant improvements were made in terms of reducing computations and increasing the detection rate of forging areas. Many of the proposed methods for detecting image forgery use a feature extraction model from a valid and manipulated dataset and then classify them using machine learning with the aim of optimizing the accuracy. In this research, following the extraction of features in the proposed method, using the SVM classification identifies image forgery and then identifies the forging area after it detects the falsification or originality of the image. The results of this study indicate 97.98% accuracy in the Columbia database and 98.1% in the IFS-TC database. [ABSTRACT FROM AUTHOR]
- Published
- 2019
38. The Game Loop
- Author
-
Pitt, Christopher and Pitt, Christopher
- Published
- 2016
- Full Text
- View/download PDF
39. Game Application: MathSearch
- Author
-
Zambon, Giulio and Zambon, Giulio
- Published
- 2016
- Full Text
- View/download PDF
40. Reversible data hiding for JPEG images based on block difference model and Laplacian distribution estimation.
- Author
-
Tang, Wei, Yao, Heng, Le, Yanfen, and Qin, Chuan
- Subjects
- *
REVERSIBLE data hiding (Computer science) , *JPEG (Image coding standard) , *IMAGE compression , *HUFFMAN codes , *ALTERNATING currents , *BLOCK designs - Abstract
• Design a block difference model to select similar DCT blocks by combining the metrics of texture, location, and template matching. • Number of similar DCT blocks involved in Laplacian distribution estimation is selected adaptively. • Block difference threshold and the distance threshold are set further to improve the accuracy of AC coefficient distribution estimation. [Display omitted] Reversible data hiding (RDH) for JPEG images has attracted extensive attentions in recent years. As far, a number of related schemes have been proposed, which enhance the embedding performance by improving the strategies such as frequency selection and block sorting to choose appropriate embedding coefficients with the histogram shifting mechanism. Nevertheless, the existing methods do not fully consider the characteristics of DCT coefficients and lack accurate measurement on the embedding distortion. To address the above problems, we propose an improved general framework of RDH for JPEG images based on the Laplacian distribution model. The block difference model is first established for the alternating current (AC) coefficients fitting. Subsequently, the scale parameter is calculated to estimate the embedding efficiency of each AC coefficient, and the coefficients with high embedding efficiency are preferentially selected for embedding. Furthermore, the proposed framework can be combined with other JPEG RDH methods based on quantized DCT coefficient modification. Experimental results demonstrate that better performance in terms of both visual quality and file size preservation can be achieved with the proposed scheme compared with the state-of-the-art RDH schemes for JPEG images. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
41. Image Data
- Author
-
Arnold, Taylor, Tilton, Lauren, DeFanti, Thomas, Series editor, Grafton, Anthony, Series editor, Levy, Thomas E., Series editor, Manovich, Lev, Series editor, Rockwood, Alyn, Series editor, Arnold, Taylor, and Tilton, Lauren
- Published
- 2015
- Full Text
- View/download PDF
42. Image Manipulation on Facebook for Forensics Evidence
- Author
-
Moltisanti, Marco, Paratore, Antonino, Battiato, Sebastiano, Saravo, Luigi, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Weikum, Gerhard, Series editor, Murino, Vittorio, editor, and Puppo, Enrico, editor
- Published
- 2015
- Full Text
- View/download PDF
43. Exposing Image Tampering with the Same Quantization Matrix
- Author
-
Liu, Qingzhong, Sung, Andrew H., Chen, Zhongxue, Chen, Lei, Baughman, Aaron K., editor, Gao, Jiang, editor, Pan, Jia-Yu, editor, and Petrushin, Valery A., editor
- Published
- 2015
- Full Text
- View/download PDF
44. Working with Graphics
- Author
-
White, Robert and White, Robert
- Published
- 2015
- Full Text
- View/download PDF
45. A Novel Method for Detecting Double Compressed Facebook JPEG Images
- Author
-
NG, Allan, Pan, Lei, Xiang, Yang, Junqueira Barbosa, Simone Diniz, Series editor, Chen, Phoebe, Series editor, Cuzzocrea, Alfredo, Series editor, Du, Xiaoyong, Series editor, Filipe, Joaquim, Series editor, Kara, Orhun, Series editor, Kotenko, Igor, Series editor, Sivalingam, Krishna M., Series editor, Ślęzak, Dominik, Series editor, Washio, Takashi, Series editor, Yang, Xiaokang, Series editor, Batten, Lynn, editor, Li, Gang, editor, Niu, Wenjia, editor, and Warren, Matthew, editor
- Published
- 2014
- Full Text
- View/download PDF
46. Carving Linearly JPEG Images Using Unique Hex Patterns (UHP)
- Author
-
Abdullah, Nurul Azma, Ibrahim, Rosziati, Mohamad, Kamaruddin Malik, Hamid, Norhamreeza Abdul, Herawan, Tutut, editor, Deris, Mustafa Mat, editor, and Abawajy, Jemal, editor
- Published
- 2014
- Full Text
- View/download PDF
47. Image Compression Standards
- Author
-
Li, Ze-Nian, Drew, Mark S., Liu, Jiangchuan, Gries, David, Series editor, Schneider, Fred B., Series editor, Li, Ze-Nian, Drew, Mark S., and Liu, Jiangchuan
- Published
- 2014
- Full Text
- View/download PDF
48. Adding Images to Blog Entries
- Author
-
Hansen, Thomas Blom, Lengstorf, Jason, Hansen, Thomas Blom, and Lengstorf, Jason
- Published
- 2014
- Full Text
- View/download PDF
49. 基于熵编码的JPEG压缩域脆弱图像水印算法.
- Author
-
李 晨, 喻 枭, and 田丽华
- Abstract
In order to solve the problem of embedding capacity, imperceptibility, real-time and tampering localization in JPEG image watermarking algorithm, this paper proposed a JPEG watermarking algorithm based on entropy coding. Firstly, the algo¬rithm located the process of JPEG entropy coding to embed the watermarking, which could avoid the forward and reverse quantization operations and ensured that during embedding image changes was small and had good real-time performance. Se¬condly, according to the principle that some hits in the entropy coding process do not participate in the Huffman coding, the algorithm chose appropriate coefficient to embed watermark. This algorithm embedded watermarking information into the least significant hits of these coefficients to avoid the coding error caused by the modification of the Huffman coding coefficient, which should further enhance the imperceptibility of the algorithm. Experimental results show that the algorithm not only has a large embedded capacity and good imperceptibility, hut also has high fragility and can accurately locate malicious tampering. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
50. SECURE TRANSMISSION OF DATA USING IMAGE STEGANOGRAPHY.
- Author
-
Chandra, Sourabh and Paira, Smita
- Published
- 2019
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.