13.07.2015 Views

WWW/Internet - Portal do Software Público Brasileiro

WWW/Internet - Portal do Software Público Brasileiro

WWW/Internet - Portal do Software Público Brasileiro

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

ISBN: 978-972-8939-25-0 © 2010 IADISFigure 9. The Generated (256x256) ImageFigure 10. Energy spectrum of the generated image byapplying FFTThe amount of information of the generated cover image is calculated as :{ Entropy value} =3.6733 bits/ pixel.6. CONCLUSIONConstructing a ran<strong>do</strong>m image proved to be a good hiding media, where:1. Ran<strong>do</strong>m image is a suitable media for the image that is intended to be Cover image, because it has nospecific meaning. The reason behind this is that ran<strong>do</strong>m image <strong>do</strong>es not raise the suspensions of theattackers.2. An image that is highly detailed can be produced by complicating the grammar. The product image ismore suitable for embedding secret message.3. The Consideration of the characteristics of the embedded image allows us to recognize the informationcontained in the image. A suitable cover image is needed to hide the embedded image; the present studya<strong>do</strong>pts ran<strong>do</strong>m image generation method considering an embedded image.4. New functions can be added to the grammar rules to generate and expand wide range of images that areappropriate for embedding.REFERENCES1. Roos Anderson (ed.), 1996. Information hiding, Lecture Notes in computer science, vol. 1174, Springer.2. Ross J. Anderson and Fabien A. Petitcolas, 1998. On the limits of Steganography, IEEE Journal on Selected areas incommunications 16, no. 4.3. N.F.Johnson, 1998. Steganography , http://www.jjtc.com/steg<strong>do</strong>c, George Mason University.4.D. Kahn, 1996. The history of steganography”, 1 st Information Hiding Workshop, Lecture Notes in ComputerScience, R. Anderson, ed., vol. 1174, pp. 1–5, Springer-Verlag.5. Moni Naor, Amos fiat and Benny Chor, 1994. Tracing traitors , advances in cryptology : CRYPTO ‘ 94 (Tvo G.Desmedt,ed.), Lecture notes in computert science, vol. 839.6. British Pfitzmann and Matthias Schunter, 1996. Asymmetric fingerprinting, advances in cryptology; EUROCRYPT ’96(Ueli Maurer, ed.) ,Lecture notes in computert science, vol. 1233.7. V.J . Rayward –Simth , 1984 . A first course in formal language theory.8. Alfred V.Aho, Ravi, Sethi, and Jeffrey D.Ulman, 1986.Compilers: Principles, Techniques, and Tools, Addison-Wesley.360

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!