Submitted by: Submitted by kerrjoni
Views: 230
Words: 10765
Pages: 44
Category: Science and Technology
Date Submitted: 09/10/2013 06:25 AM
JOMO KENYATTA UNIVERSITY
OF
AGRICULTURE AND TECHNOLOGY
INSTITUTE OF COMPUTER SCIENCE AND INFORMATION TECHNOLOGY
BSc COMPUTER TECHNOLOGY
Literature Review
On
DIGITAL IMAGE CRYPTOSYSTEM WITH ADAPTIVE STEGANOGRAPHY
NAME : JOHN NJENGA
REG NO : CS 282-0782/2009
SUPERVISORS:
DR. OKEYO
MR. J WAINAINA
DECLARATION
I declare that all materials presented here are my own original work, or fully and specifically acknowledged wherever adapted from other sources. The work has not been submitted previously, in whole or in part, to qualify for any academic award. The content of the thesis is the result of work which has been carried out since the official approval of my proposal.
Contents
DECLARATION 2
LIST OF FIGURES 5
LIST OF TABLES 5
ABBREVIATIONS AND SYMBOLS 5
ABSTRACT 6
CHAPTER 1 7
INTRODUCTION 7
1.1 BACKGROUND 8
A Steganographic Framework 8
1.2 STATEMENT OF THE PROBLEM 9
1.3 OBJECTIVES OF THE STUDY 11
1.4.1 Specific Objectives 11
CHAPTER TWO 12
2.0 LITERATURE REVIEW 12
2.1 Spatial Domain 12
2.2 Transform Domain 14
2.3 EXISTING ATTACKS 15
2.3.1 Steganalysis 15
2.4.1.2 Blind Attacks 18
2.3 STATISTICAL RESTORATION 20
Introduction 20
2.3.1 Embedding by Pixel 21
Algorithm Pixel Swap Embedding 22
2.3.1.1 Security Analysis 23
2.3.1.2 New Statistical Restoration Scheme 23
2.4 Mathematical Formulation of Proposed scheme 25
2.4.2 Restoration with Minimum Restoration 27
2.4.3 Security Analysis 28
2.4.3.1 Analysis 28
2.5 Spatial Desynchronization 28
2.5.1 Introduction 29
2.5.2 Calibration Attack 30
2.6 Counter Measures to Blind Steganalysis 30
2.6.1 Spatial Block Desynchronization 32
2.7 The Proposed Algorithm 33
2.8 CONCLUSION AND FUTURE DIRECTIONS 38
2.8.1 Conclusion 38
2.8.2 Future Directions 39
2.9 PROJECT SCHEDULE 40
3.0 RESEARCH BUDGET 41
REFERENCES 42
LIST OF FIGURES
Figure 1.1, Trade-off between embedding capacity, Undetectability and robustness in data hiding 10
Figure 2.1: A generalized steganographic framework 10
Figure 3: Private...