IT-Zeitschriften, Fachbücher, eBooks, digitale Magazine und vieles mehr - direkt im heise shop online kaufen
Warenkorb Ihr Warenkorb ist noch leer.

  •  
     
12,99 €*

MATLAB Implementation of the Steganographic Algorithm F5

Matlab Codes for F5 Algorithm
eBook

Bewerten Sie dieses Produkt als Erster

Project Report from the year 2018 in the subject Computer Science - Programming, , language: English, abstract: The F5 algorithm proposed by Westfeld is still one of the most known algorithms in the field of DCT-based steganography. It can make a JPEG image a container of a secret message, where no one knows the presence of the message except ...
Sofortige Lieferung
Autor: Wassim Al Chamaa
Anbieter: Grin Verlag
Sprache: Englisch
EAN: 9783668933439
Veröffentlicht: 07.05.2019
Format: PDF
Schutz: nichts
Project Report from the year 2018 in the subject Computer Science - Programming, , language: English, abstract: The F5 algorithm proposed by Westfeld is still one of the most known algorithms in the field of DCT-based steganography. It can make a JPEG image a container of a secret message, where no one knows the presence of the message except the sender and the intended receiver. In this programming work, we show how to realize the F5 algorithm via Matlab. We will present the block diagrams of embedding and extracting processes and the entire Matlab codes of the F5 algorithm. Some NOTES about the included F5 Matlab program :1- The implementation program works according to the method proposed by Andreas Westfield in his paper : " F5—A Steganographic Algorithm : High Capacity Despite Better Steganalysis ". Huffman coding and decoding are implemented using the Matlab JPEG Toolbox developed by Phil Sallee.2- The two-part Matlab codes included in the report, embedding and extracting parts, can be executed in Matlab IDE. The embedding part reads the cover JPEG file and the message file we want to hide, then it creates a Stego JPEG file according to the F5 algorithm. In the other side, The extracting part reads the Stego JPEG file, and then it extracts the hidden message file.3- The program uses the main two functions of Phil Sallee's Matlab JPEG Toolbox. The functions of Sallee make it easier to access and manipulate the quantized DCT coefficients of a given JPEG file. Using Sallee's Toolbox should accord with the used operating system, whether it is 32 or 64 bits.4- The message file we want to hide can be any file of any kind and whatever its extension. The size of the message file should be appropriate for the size of the used cover JPEG image, so no errors will occur when executed.
Um bewerten zu können, melden Sie sich bitte an

  •