Comparação de técnicas de esteganografia aplicadas a marca d'água digital

Detalhes bibliográficos
Ano de defesa: 2016
Autor(a) principal: ROMERO, Bruno Alves lattes
Orientador(a): JORGE, David Calhau lattes
Banca de defesa: Não Informado pela instituição
Tipo de documento: Dissertação
Tipo de acesso: Acesso aberto
Idioma: por
Instituição de defesa: Universidade Federal do Triângulo Mineiro
Programa de Pós-Graduação: Programa de Mestrado Profissional em Inovação Tecnológica
Departamento: Instituto de Ciências Tecnológicas e Exatas - ICTE::Programa de Mestrado Profissional em Inovação Tecnológica
País: Brasil
Palavras-chave em Português:
Palavras-chave em Inglês:
Área do conhecimento CNPq:
Link de acesso: http://bdtd.uftm.edu.br/handle/tede/347
Resumo: Steganography comes from the Greek, meaning, "hidden writing", for centuries, people have pursued ways to communicate securely. The digital watermark makes use of steganography techniques to ensure the authenticity and authorship of a picture or other digital media, through its incorporation. However, the use of watermarks in images suffers with attacks and characteristics by itself, such as compression. This study aims to use different steganographics algorithms applied and adapted to work with digital watermark in color images. The objective is to find the most efficient way to ensure the authenticity of a digital image, focusing on robustness. This work have submitting various algorithms to several attacks and situations, getting as a result the watermark previously incorporated and metrics to evaluate objectively and subjectively the performance of each process. The algorithms were subjected to a variety of different images and watermarks allowing an overview of the each one’s behavior in several environments. None of the attacks was capable to destroy the watermark without affecting image quality. The Fusion and DCT AC algorithms presented the best overall performance, while the JPEG format is a challenge for steganography.
id UFTM_cbae25677be1291146d9225f3784f49a
oai_identifier_str oai:bdtd.uftm.edu.br:tede/347
network_acronym_str UFTM
network_name_str Biblioteca Digital de Teses e Dissertações da UFTM
repository_id_str
spelling JORGE, David Calhauhttp://lattes.cnpq.br/2966842034513863http://lattes.cnpq.br/2064055859130745ROMERO, Bruno Alves2016-08-05T20:14:05Z2016-02-15ROMERO, Bruno Alves. Comparação de técnicas de esteganografia aplicadas a marca d'água digital. 2016. 67f. Dissertação (Mestrado em Inovação Tecnológica) - Programa de Mestrado Profissional em Inovação Tecnológica, Universidade Federal do Triângulo Mineiro, Uberaba, 2016.http://bdtd.uftm.edu.br/handle/tede/347Steganography comes from the Greek, meaning, "hidden writing", for centuries, people have pursued ways to communicate securely. The digital watermark makes use of steganography techniques to ensure the authenticity and authorship of a picture or other digital media, through its incorporation. However, the use of watermarks in images suffers with attacks and characteristics by itself, such as compression. This study aims to use different steganographics algorithms applied and adapted to work with digital watermark in color images. The objective is to find the most efficient way to ensure the authenticity of a digital image, focusing on robustness. This work have submitting various algorithms to several attacks and situations, getting as a result the watermark previously incorporated and metrics to evaluate objectively and subjectively the performance of each process. The algorithms were subjected to a variety of different images and watermarks allowing an overview of the each one’s behavior in several environments. None of the attacks was capable to destroy the watermark without affecting image quality. The Fusion and DCT AC algorithms presented the best overall performance, while the JPEG format is a challenge for steganography.Esteganografia vem do grego, significando “a escrita oculta”, e durante séculos as pessoas têm buscado meios de se comunicar de maneira segura. A marca d’água digital faz uso de técnicas de esteganografia para garantir a autenticidade e autoria de uma imagem ou outra mídia digital, por meio de sua incorporação. Entretanto, o uso de marcas d’água em imagens sofre com ataques e características próprias, como a compressão. O presente trabalho visa utilizar distintos algoritmos esteganográficos aplicados e adaptados para trabalhar com marca d’água digital em imagens coloridas. Objetiva-se encontrar o meio mais eficiente para garantir a autenticidade de uma imagem digital, com foco na robustez. Faz-se aqui um estudo de caso submetendo algoritmos variados a situações de ataques diversos, recebendo como resultado a marca d’água previamente incorporada e métricas que permitam avaliar de maneira objetiva e subjetiva o desempenho de cada processo. Os algoritmos foram submetidos a imagens variadas e marcas d’água diversas possibilitando uma visão geral do comportamento dos algoritmos em ambientes diversos. Nenhum dos ataques destruiu a marca d’água sem afetar a qualidade da imagem. Os algoritmos Fusion e DCT AC apresentaram a melhor performance geral, enquanto o formato JPEG se mostrou desafiador para a esteganografia.application/pdfhttp://bdtd.uftm.edu.br/retrieve/1739/Dissert%20Bruno%20A%20Romero2.pdf.jpghttp://bdtd.uftm.edu.br/retrieve/1741/Dissert%20Bruno%20A%20Romero3.pdf.jpghttp://bdtd.uftm.edu.br/retrieve/1743/Dissert%20Bruno%20A%20Romero4.pdf.jpghttp://bdtd.uftm.edu.br/retrieve/1745/Dissert%20Bruno%20A%20Romero5.pdf.jpgporUniversidade Federal do Triângulo MineiroPrograma de Mestrado Profissional em Inovação TecnológicaUFTMBrasilInstituto de Ciências Tecnológicas e Exatas - ICTE::Programa de Mestrado Profissional em Inovação TecnológicaAKAR, F.; YALMAN, Y.; VAROL, H. S. Data hiding in digital images using a partial optimization technique based on the classical LSB method. Turk. J. Electr. Eng. Comput. Sci., v. 21, p. 2037-2047, 2013. ISSN 1300-0632. ALTAAY, A. A. J.; BIN SAHIB, S.; ZAMANI, M. An Introduction to Image Steganography Techniques. Advanced Computer Science Applications and Technologies (ACSAT), 2012 International Conference on, 2012, 26-28 Nov. 2012. p.122-126. ATAWNEH, S.; ALMOMANI, A.; SUMARI, P. Steganography in digital images: Common approaches and tools. IETE Technical Review (Institution of Electronics and Telecommunication Engineers, India), v. 30, n. 4, p. 344-358, 2013. ISSN 02564602. CHEDDAD, A. et al. Digital image steganography: Survey and analysis of current methods. Signal Processing, v. 90, n. 3, p. 727-752, 3// 2010. ISSN 0165-1684. Disponível em: < http://www.sciencedirect.com/science/article/pii/S0165168409003648 >. COX, I. J. et al. Digital Watermarking and Steganography. Elsevier Inc., 2008. 587 ISBN 978-0-12-372585-1. DOSHI, R.; JAIN, P.; GUPTA, L. Steganography and Its Applications in Security. International Journal of Modern Engineering Research, v. 2, n. 6, p. 4634-4638, 2012. EL-EMAM, N. N.; AL-ZUBIDY, R. A. S. New steganography algorithm to conceal a large amount of secret message using hybrid adaptive neural networks with modified adaptive genetic algorithm. Journal of Systems and Software, v. 86, n. 6, p. 1465-1481, 2013. ISSN 0164-1212. Disponível em: < http://www.sciencedirect.com/science/article/pii/S0164121212003317 >. ESKICIOGLU, A.; LITWIN, L. Cryptography. IEEE Potentials, v. 20, n. 1, p. 36-38, 2001. ISSN 0278-6648. GONZALEZ, R. C.; WOODS, R. C. Processamento Digital de Imagens. 3 ed. São Paulo: Pearson Education do Brasil, 2010. 624 ISBN 978-85-7605-401-6. HUSIEN, S.; BADI, H. Artificial neural network for steganography. Neural Computing and Applications, 2014. ISSN 09410643. JABER, S. S. et al. SURVEY ON RECENT DIGITAL IMAGE STEGANOGRAPHY TECHNIQUES. Journal of Theoretical & Applied Information Technology, v. 66, n. 3, p. 714-728, 2014. ISSN 19928645. JIAN, Z.; KOCH, E. A generic digital watermarking model. Computers & Graphics, v. 22, n. 4, p. 397-403, 1998. ISSN 0097-8493. Disponível em: < http://www.sciencedirect.com/science/article/pii/S0097849398000296 >. JULIO, E. P.; BRAZIL, W. G.; ALBUQUERQUE, C. V. N. Esteganografia e suas Aplicações. VII Simpósio Brasileiro em Segurança da Informação e de Sistemas Computacionais, 2007. JUNED AHMED, M.; HEMACHANDRAN, K. Study of Image steganography using LSB, DFT and DWT. International Journal of Computers & Technology, Vol 11, Iss 5, Pp 2618-2627 (2013), 2013. ISSN 2277-3061. K.YUGALA. Steganography. International Journal of Engineering Trends and Technology, v. 4, n. 5, p. 1629, 2013. ISSN 22315381. KUMAR, S.; MUTTOO, S. A comparative study of image steganography in wavelet domain. International Journal of Computer Science and Mobile Computing, v. 2, n. 2, p. 91-101, 2013. KUMAR, V.; KUMAR, D. Digital Image Steganography Based on Combination of DCT and DWT. In: DAS, V. e VIJAYKUMAR, R. (Ed.). Information and Communication Technologies: Springer Berlin Heidelberg, v.101, 2010. cap. 102, p.596-601. (Communications in Computer and Information Science). ISBN 978-3-642-15765-3. LUO, X. et al. On F5 Steganography in Images. The Computer Journal, v. 55, n. 4, p. 447-456, 2012. ISSN 0010-4620. LUSSON, F. et al. A novel approach to digital watermarking, exploiting colour spaces. Signal Processing, v. 93, n. 5, p. 1268-1294, 2013. ISSN 01651684. MACRAKIS, K. Ancient imprints: fear and the origins of secret writing. Endeavour, v. 33, n. 1, p. 24-28, 2009. ISSN 0160-9327. Disponível em: < http://www.sciencedirect.com/science/article/pii/S0160932709000052 >. MIANO, J. Compressed image file formats: JPEG, PNG, GIF, XBM, BMP. Massachusetts: ACM Press/Addison-Wesley Publishing Co., 1999. 264 ISBN 0-201-60443-4. MOHD, B. et al. Hierarchical steganography using novel optimum quantization technique. Signal, Image and Video Processing, London, v. 7, n. 6, p. 1029-1040, 2013. ISSN 1863-1703. MONIKA, G.; JASMINE, J. Image Steganography Using Discrete Cosine Transform (DCT) and Blowfish Algorithm. International Journal of Computer Trends and Technology, v. 11, n. 4, p. 144, 2014. ISSN 2231-2803. MURRAY, J. D.; VANRYPER, W. Encyclopedia of Graphics File Formats: The Complete Reference. O'Reilly Media, 1996. 1152 ISBN 978-1565921610. NAGHAM, H. et al. Image Steganography Techniques: An Overview. International Journal of Computer Science and Security, v. 6, n. 3, p. 168, 2012. ISSN 1985-1553. NISSAR, A.; MIR, A. H. Classification of steganalysis techniques: A study. Digital Signal Processing, v. 20, n. 6, p. 1758-1770, 2010. ISSN 1051-2004. Disponível em: < http://www.sciencedirect.com/science/article/pii/S1051200410000412 >. PEDRINI, H.; SCHWARTZ, W. R. Análise de Imagens Digitais: princípios, algoritmos e aplicações. São Paulo: Thomson Learning, 2008. ISBN 978-85-221-0595-3. PETITCOLAS, F. A. P.; ANDERSON, R. J.; KUHN, M. G. Information hiding - a survey. Proceedings of the IEEE, v. 87, n. 7, p. 1062-1078, 1999. ISSN 00189219. PETITCOLAS, F. A. P.; KATZENBEISSER, S. Information hiding techniques for steganography and digital watermarking. Boston: Artech House, 2000. 220 ISBN 978-1580530354. RAJU, U. S. N.; BHASKAR, U. Secured Data Transmission Using Wavelet Based Steganography and cryptography. International Journal of Engineering Research and Applications, v. 4, n. 2, p. 45-50, 2014. ISSN 2248-9622. RAPHAEL, A.; SUNDARAM, V. Cryptography and Steganography - A Survey. International Journal of Computer Technology and Applications, v. 2, n. 3, p. 626-626, 2011. ROCHA, A.; COSTA, H. A. X.; CHAVES, L. M. Camaleão: um software para segurança digital utilizando esteganografia. REIC - Revista Eletrônica de Iniciação Científica, v. 1, p. 1-11, 2004. ROCHA, A.; GOLDENSTEIN, S. Steganography and steganalysis in digital multimedia: Hype or hallelujah? Revista de Informática Teórica e Aplicada, v. 15, n. 1, p. 83-110, 2008. ISSN 2175-2745. ROELOFS, G. Portable Network Graphics (PNG). 04/05/2015 Disponível em: < http://www.libpng.org/pub/png/ >. Acesso em: 09/08/2015. ROSENBLATT, B. Steganography Revisited: Watermarking Comes In from the Cold. Seybold Report: Analyzing Publishing Technologies, v. 3, n. 5, p. 3, 2003. ISSN 15339211. SANCHEZ, J.; CANTON, M. P. The PC graphics handbook. CRC Press LLC, 2003. ISBN 978-0849316784. SAYOOD, K. Introduction to data compression. San Francisco: Elsevier Inc., 2006. 680 ISBN 978-0-12-620862-7. SHEISI, H.; MESGARIAN, J.; RAHMANI, M. Steganography: Dct Coefficient Replacement Method and Compare With Jsteg Algorithm. International Journal of Computer and Electrical Engineering, v. 4, n. 4, p. 458-462, 2012. SMITH, S. W. The Scientist and Engineer's Guide to Digital Signal Processing. San Diego, CA.: California Technical Publishing, 1999. ISBN 0-9660176-4-1. SOLOMON, C.; BRECKON, T. Fundamentos de Processamento Digital de Imagens: uma abordagem prática com exemplos em Matlab. Rio de Janeiro: LTC, 2013. 289 ISBN 978-85-216-2347-2. TALACKO, P. Ancient idea helps to hide modern messages: INFORMATION TECHNOLOGY: Steganography, an old technique of concealing data, could prove a useful addition to today's arsenal of tools for protecting computer data, saysPaul Talacko. The Financial Times: 20 p. 2000. TOLBA, M. F. et al. High capacity image steganography using wavelet-based fusion. Computers and Communications, 2004. Proceedings. ISCC 2004. Ninth International Symposium on, 2004, 28/06/2004. p.430-435. VAGHELA, M.; GOHIL, M.; YADAV, R. Digital Watermarking: Combining DCT and DWT Techniques. Journal Of Information, Knowledge And Research In Computer Engineering, v. 02, n. 02, p. 467-471, 2012. ISSN 0975-6760. W3TECHS. Usage Statistics of Image File Formats for Websites, May 2016. 2016. Disponível em: < https://w3techs.com/technologies/overview/image_format/all >. Acesso em: 26/05/2016. WALLACE, G. K. The JPEG still picture compression standard. Commun. ACM, v. 34, n. 4, p. 30-44, 1991. ISSN 0001-0782. WANG, Z. The SSIM Index for Image Quality Assessment. 2014. Disponível em: < https://ece.uwaterloo.ca/~z70wang/research/ssim >. Acesso em: 02/10/2015. ZHOU, W. et al. Image quality assessment: from error visibility to structural similarity. Image Processing, IEEE Transactions on, v. 13, n. 4, p. 600-612, 2004. ISSN 1057-7149. ZIELINSKA, E.; MAZURCZYK, W.; SZCZYPIORSKI, K. Trends in Steganography. Association for Computing Machinery. Communications of the ACM, New York, v. 57, n. 3, p. 86, 2014. ISSN 00010782.http://creativecommons.org/licenses/by-nc-nd/4.0/info:eu-repo/semantics/openAccessEsteganografiaMarca d’agua digitalImagemSteganographyDigital watermarkImageMetodologias e Técnicas da ComputaçãoComparação de técnicas de esteganografia aplicadas a marca d'água digitalinfo:eu-repo/semantics/publishedVersioninfo:eu-repo/semantics/masterThesisreponame:Biblioteca Digital de Teses e Dissertações da UFTMinstname:Universidade Federal do Triangulo Mineiro (UFTM)instacron:UFTMTEXTDissert Bruno A Romero2.pdf.txtDissert Bruno A Romero2.pdf.txtExtracted Texttext/plain48019http://bdtd.uftm.edu.br/bitstream/tede/347/11/Dissert%20Bruno%20A%20Romero2.pdf.txt37f0e43476308dcbeb2d641a201b6678MD511Dissert Bruno A Romero3.pdf.txtDissert Bruno A Romero3.pdf.txtExtracted Texttext/plain9696http://bdtd.uftm.edu.br/bitstream/tede/347/13/Dissert%20Bruno%20A%20Romero3.pdf.txtabab62d69522517a3aabb6e60ce3a793MD513Dissert Bruno A Romero4.pdf.txtDissert Bruno A Romero4.pdf.txtExtracted Texttext/plain14440http://bdtd.uftm.edu.br/bitstream/tede/347/15/Dissert%20Bruno%20A%20Romero4.pdf.txt89e0086a80c82b79c38271d8c6f93f63MD515Dissert Bruno A Romero5.pdf.txtDissert Bruno A Romero5.pdf.txtExtracted Texttext/plain2407http://bdtd.uftm.edu.br/bitstream/tede/347/17/Dissert%20Bruno%20A%20Romero5.pdf.txt450e47c3db3b91f779684436e1302378MD517LICENSElicense.txtlicense.txttext/plain; charset=utf-81976http://bdtd.uftm.edu.br/bitstream/tede/347/1/license.txt1e1650138dd271baea0105346966c99cMD51CC-LICENSElicense_urllicense_urltext/plain; charset=utf-849http://bdtd.uftm.edu.br/bitstream/tede/347/2/license_url4afdbb8c545fd630ea7db775da747b2fMD52license_textlicense_texttext/html; charset=utf-80http://bdtd.uftm.edu.br/bitstream/tede/347/3/license_textd41d8cd98f00b204e9800998ecf8427eMD53license_rdflicense_rdfapplication/rdf+xml; charset=utf-80http://bdtd.uftm.edu.br/bitstream/tede/347/4/license_rdfd41d8cd98f00b204e9800998ecf8427eMD54THUMBNAILDissert Bruno A Romero2.pdf.jpgDissert Bruno A Romero2.pdf.jpgGenerated Thumbnailimage/jpeg2232http://bdtd.uftm.edu.br/bitstream/tede/347/12/Dissert%20Bruno%20A%20Romero2.pdf.jpg5585af29ebe06b2ba98bb5f7eea9c8caMD512Dissert Bruno A Romero3.pdf.jpgDissert Bruno A Romero3.pdf.jpgGenerated Thumbnailimage/jpeg2714http://bdtd.uftm.edu.br/bitstream/tede/347/14/Dissert%20Bruno%20A%20Romero3.pdf.jpg1ae1dabb48b106b3625c44cbaad33262MD514Dissert Bruno A Romero4.pdf.jpgDissert Bruno A Romero4.pdf.jpgGenerated Thumbnailimage/jpeg6531http://bdtd.uftm.edu.br/bitstream/tede/347/16/Dissert%20Bruno%20A%20Romero4.pdf.jpg3f55a90c4e1b280fe25aca781befc761MD516Dissert Bruno A Romero5.pdf.jpgDissert Bruno A Romero5.pdf.jpgGenerated Thumbnailimage/jpeg5050http://bdtd.uftm.edu.br/bitstream/tede/347/18/Dissert%20Bruno%20A%20Romero5.pdf.jpg96c2a6c08813983977641a55fb2a6858MD518ORIGINALDissert Bruno A Romero1.pdfDissert Bruno A Romero1.pdfDissert Bruno A Romero1application/pdf1731602http://bdtd.uftm.edu.br/bitstream/tede/347/5/Dissert%20Bruno%20A%20Romero1.pdffa898e9ddc7c1ce8ad068773e5934b15MD55Dissert Bruno A Romero2.pdfDissert Bruno A Romero2.pdfDissert Bruno A Romero2application/pdf1975934http://bdtd.uftm.edu.br/bitstream/tede/347/6/Dissert%20Bruno%20A%20Romero2.pdf10053a6e70fcc50e5b1f9f879583b90dMD56Dissert Bruno A Romero3.pdfDissert Bruno A Romero3.pdfDissert Bruno A Romero3application/pdf1685265http://bdtd.uftm.edu.br/bitstream/tede/347/7/Dissert%20Bruno%20A%20Romero3.pdff288cf1109214db7657b806245daf54bMD57Dissert Bruno A Romero4.pdfDissert Bruno A Romero4.pdfDissert Bruno A Romero4application/pdf1741868http://bdtd.uftm.edu.br/bitstream/tede/347/8/Dissert%20Bruno%20A%20Romero4.pdfc75486c1cab4dee814885a4120393cc8MD58Dissert Bruno A Romero5.pdfDissert Bruno A Romero5.pdfDissert Bruno A Romero5application/pdf1867136http://bdtd.uftm.edu.br/bitstream/tede/347/9/Dissert%20Bruno%20A%20Romero5.pdfe91a3ebfe6595e16f63d090607adb31bMD59Dissert Bruno A Romero6.pdfDissert Bruno A Romero6.pdfDissert Bruno A Romero6application/pdf1448092http://bdtd.uftm.edu.br/bitstream/tede/347/10/Dissert%20Bruno%20A%20Romero6.pdfa794ea48b32b89ad0c2812fab3d2c017MD510tede/3472018-03-23 16:27:55.391oai:bdtd.uftm.edu.br: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Biblioteca Digital de Teses e Dissertaçõeshttp://bdtd.uftm.edu.br/PUBhttp://bdtd.uftm.edu.br/oai/requestbdtd@uftm.edu.br||bdtd@uftm.edu.bropendoar:2018-03-23T19:27:55Biblioteca Digital de Teses e Dissertações da UFTM - Universidade Federal do Triangulo Mineiro (UFTM)false
dc.title.por.fl_str_mv Comparação de técnicas de esteganografia aplicadas a marca d'água digital
title Comparação de técnicas de esteganografia aplicadas a marca d'água digital
spellingShingle Comparação de técnicas de esteganografia aplicadas a marca d'água digital
ROMERO, Bruno Alves
Esteganografia
Marca d’agua digital
Imagem
Steganography
Digital watermark
Image
Metodologias e Técnicas da Computação
title_short Comparação de técnicas de esteganografia aplicadas a marca d'água digital
title_full Comparação de técnicas de esteganografia aplicadas a marca d'água digital
title_fullStr Comparação de técnicas de esteganografia aplicadas a marca d'água digital
title_full_unstemmed Comparação de técnicas de esteganografia aplicadas a marca d'água digital
title_sort Comparação de técnicas de esteganografia aplicadas a marca d'água digital
author ROMERO, Bruno Alves
author_facet ROMERO, Bruno Alves
author_role author
dc.contributor.advisor1.fl_str_mv JORGE, David Calhau
dc.contributor.advisor1Lattes.fl_str_mv http://lattes.cnpq.br/2966842034513863
dc.contributor.authorLattes.fl_str_mv http://lattes.cnpq.br/2064055859130745
dc.contributor.author.fl_str_mv ROMERO, Bruno Alves
contributor_str_mv JORGE, David Calhau
dc.subject.por.fl_str_mv Esteganografia
Marca d’agua digital
Imagem
topic Esteganografia
Marca d’agua digital
Imagem
Steganography
Digital watermark
Image
Metodologias e Técnicas da Computação
dc.subject.eng.fl_str_mv Steganography
Digital watermark
Image
dc.subject.cnpq.fl_str_mv Metodologias e Técnicas da Computação
description Steganography comes from the Greek, meaning, "hidden writing", for centuries, people have pursued ways to communicate securely. The digital watermark makes use of steganography techniques to ensure the authenticity and authorship of a picture or other digital media, through its incorporation. However, the use of watermarks in images suffers with attacks and characteristics by itself, such as compression. This study aims to use different steganographics algorithms applied and adapted to work with digital watermark in color images. The objective is to find the most efficient way to ensure the authenticity of a digital image, focusing on robustness. This work have submitting various algorithms to several attacks and situations, getting as a result the watermark previously incorporated and metrics to evaluate objectively and subjectively the performance of each process. The algorithms were subjected to a variety of different images and watermarks allowing an overview of the each one’s behavior in several environments. None of the attacks was capable to destroy the watermark without affecting image quality. The Fusion and DCT AC algorithms presented the best overall performance, while the JPEG format is a challenge for steganography.
publishDate 2016
dc.date.accessioned.fl_str_mv 2016-08-05T20:14:05Z
dc.date.issued.fl_str_mv 2016-02-15
dc.type.status.fl_str_mv info:eu-repo/semantics/publishedVersion
dc.type.driver.fl_str_mv info:eu-repo/semantics/masterThesis
format masterThesis
status_str publishedVersion
dc.identifier.citation.fl_str_mv ROMERO, Bruno Alves. Comparação de técnicas de esteganografia aplicadas a marca d'água digital. 2016. 67f. Dissertação (Mestrado em Inovação Tecnológica) - Programa de Mestrado Profissional em Inovação Tecnológica, Universidade Federal do Triângulo Mineiro, Uberaba, 2016.
dc.identifier.uri.fl_str_mv http://bdtd.uftm.edu.br/handle/tede/347
identifier_str_mv ROMERO, Bruno Alves. Comparação de técnicas de esteganografia aplicadas a marca d'água digital. 2016. 67f. Dissertação (Mestrado em Inovação Tecnológica) - Programa de Mestrado Profissional em Inovação Tecnológica, Universidade Federal do Triângulo Mineiro, Uberaba, 2016.
url http://bdtd.uftm.edu.br/handle/tede/347
dc.language.iso.fl_str_mv por
language por
dc.relation.references.por.fl_str_mv AKAR, F.; YALMAN, Y.; VAROL, H. S. Data hiding in digital images using a partial optimization technique based on the classical LSB method. Turk. J. Electr. Eng. Comput. Sci., v. 21, p. 2037-2047, 2013. ISSN 1300-0632. ALTAAY, A. A. J.; BIN SAHIB, S.; ZAMANI, M. An Introduction to Image Steganography Techniques. Advanced Computer Science Applications and Technologies (ACSAT), 2012 International Conference on, 2012, 26-28 Nov. 2012. p.122-126. ATAWNEH, S.; ALMOMANI, A.; SUMARI, P. Steganography in digital images: Common approaches and tools. IETE Technical Review (Institution of Electronics and Telecommunication Engineers, India), v. 30, n. 4, p. 344-358, 2013. ISSN 02564602. CHEDDAD, A. et al. Digital image steganography: Survey and analysis of current methods. Signal Processing, v. 90, n. 3, p. 727-752, 3// 2010. ISSN 0165-1684. Disponível em: < http://www.sciencedirect.com/science/article/pii/S0165168409003648 >. COX, I. J. et al. Digital Watermarking and Steganography. Elsevier Inc., 2008. 587 ISBN 978-0-12-372585-1. DOSHI, R.; JAIN, P.; GUPTA, L. Steganography and Its Applications in Security. International Journal of Modern Engineering Research, v. 2, n. 6, p. 4634-4638, 2012. EL-EMAM, N. N.; AL-ZUBIDY, R. A. S. New steganography algorithm to conceal a large amount of secret message using hybrid adaptive neural networks with modified adaptive genetic algorithm. Journal of Systems and Software, v. 86, n. 6, p. 1465-1481, 2013. ISSN 0164-1212. Disponível em: < http://www.sciencedirect.com/science/article/pii/S0164121212003317 >. ESKICIOGLU, A.; LITWIN, L. Cryptography. IEEE Potentials, v. 20, n. 1, p. 36-38, 2001. ISSN 0278-6648. GONZALEZ, R. C.; WOODS, R. C. Processamento Digital de Imagens. 3 ed. São Paulo: Pearson Education do Brasil, 2010. 624 ISBN 978-85-7605-401-6. HUSIEN, S.; BADI, H. Artificial neural network for steganography. Neural Computing and Applications, 2014. ISSN 09410643. JABER, S. S. et al. SURVEY ON RECENT DIGITAL IMAGE STEGANOGRAPHY TECHNIQUES. Journal of Theoretical & Applied Information Technology, v. 66, n. 3, p. 714-728, 2014. ISSN 19928645. JIAN, Z.; KOCH, E. A generic digital watermarking model. Computers & Graphics, v. 22, n. 4, p. 397-403, 1998. ISSN 0097-8493. Disponível em: < http://www.sciencedirect.com/science/article/pii/S0097849398000296 >. JULIO, E. P.; BRAZIL, W. G.; ALBUQUERQUE, C. V. N. Esteganografia e suas Aplicações. VII Simpósio Brasileiro em Segurança da Informação e de Sistemas Computacionais, 2007. JUNED AHMED, M.; HEMACHANDRAN, K. Study of Image steganography using LSB, DFT and DWT. International Journal of Computers & Technology, Vol 11, Iss 5, Pp 2618-2627 (2013), 2013. ISSN 2277-3061. K.YUGALA. Steganography. International Journal of Engineering Trends and Technology, v. 4, n. 5, p. 1629, 2013. ISSN 22315381. KUMAR, S.; MUTTOO, S. A comparative study of image steganography in wavelet domain. International Journal of Computer Science and Mobile Computing, v. 2, n. 2, p. 91-101, 2013. KUMAR, V.; KUMAR, D. Digital Image Steganography Based on Combination of DCT and DWT. In: DAS, V. e VIJAYKUMAR, R. (Ed.). Information and Communication Technologies: Springer Berlin Heidelberg, v.101, 2010. cap. 102, p.596-601. (Communications in Computer and Information Science). ISBN 978-3-642-15765-3. LUO, X. et al. On F5 Steganography in Images. The Computer Journal, v. 55, n. 4, p. 447-456, 2012. ISSN 0010-4620. LUSSON, F. et al. A novel approach to digital watermarking, exploiting colour spaces. Signal Processing, v. 93, n. 5, p. 1268-1294, 2013. ISSN 01651684. MACRAKIS, K. Ancient imprints: fear and the origins of secret writing. Endeavour, v. 33, n. 1, p. 24-28, 2009. ISSN 0160-9327. Disponível em: < http://www.sciencedirect.com/science/article/pii/S0160932709000052 >. MIANO, J. Compressed image file formats: JPEG, PNG, GIF, XBM, BMP. Massachusetts: ACM Press/Addison-Wesley Publishing Co., 1999. 264 ISBN 0-201-60443-4. MOHD, B. et al. Hierarchical steganography using novel optimum quantization technique. Signal, Image and Video Processing, London, v. 7, n. 6, p. 1029-1040, 2013. ISSN 1863-1703. MONIKA, G.; JASMINE, J. Image Steganography Using Discrete Cosine Transform (DCT) and Blowfish Algorithm. International Journal of Computer Trends and Technology, v. 11, n. 4, p. 144, 2014. ISSN 2231-2803. MURRAY, J. D.; VANRYPER, W. Encyclopedia of Graphics File Formats: The Complete Reference. O'Reilly Media, 1996. 1152 ISBN 978-1565921610. NAGHAM, H. et al. Image Steganography Techniques: An Overview. International Journal of Computer Science and Security, v. 6, n. 3, p. 168, 2012. ISSN 1985-1553. NISSAR, A.; MIR, A. H. Classification of steganalysis techniques: A study. Digital Signal Processing, v. 20, n. 6, p. 1758-1770, 2010. ISSN 1051-2004. Disponível em: < http://www.sciencedirect.com/science/article/pii/S1051200410000412 >. PEDRINI, H.; SCHWARTZ, W. R. Análise de Imagens Digitais: princípios, algoritmos e aplicações. São Paulo: Thomson Learning, 2008. ISBN 978-85-221-0595-3. PETITCOLAS, F. A. P.; ANDERSON, R. J.; KUHN, M. G. Information hiding - a survey. Proceedings of the IEEE, v. 87, n. 7, p. 1062-1078, 1999. ISSN 00189219. PETITCOLAS, F. A. P.; KATZENBEISSER, S. Information hiding techniques for steganography and digital watermarking. Boston: Artech House, 2000. 220 ISBN 978-1580530354. RAJU, U. S. N.; BHASKAR, U. Secured Data Transmission Using Wavelet Based Steganography and cryptography. International Journal of Engineering Research and Applications, v. 4, n. 2, p. 45-50, 2014. ISSN 2248-9622. RAPHAEL, A.; SUNDARAM, V. Cryptography and Steganography - A Survey. International Journal of Computer Technology and Applications, v. 2, n. 3, p. 626-626, 2011. ROCHA, A.; COSTA, H. A. X.; CHAVES, L. M. Camaleão: um software para segurança digital utilizando esteganografia. REIC - Revista Eletrônica de Iniciação Científica, v. 1, p. 1-11, 2004. ROCHA, A.; GOLDENSTEIN, S. Steganography and steganalysis in digital multimedia: Hype or hallelujah? Revista de Informática Teórica e Aplicada, v. 15, n. 1, p. 83-110, 2008. ISSN 2175-2745. ROELOFS, G. Portable Network Graphics (PNG). 04/05/2015 Disponível em: < http://www.libpng.org/pub/png/ >. Acesso em: 09/08/2015. ROSENBLATT, B. Steganography Revisited: Watermarking Comes In from the Cold. Seybold Report: Analyzing Publishing Technologies, v. 3, n. 5, p. 3, 2003. ISSN 15339211. SANCHEZ, J.; CANTON, M. P. The PC graphics handbook. CRC Press LLC, 2003. ISBN 978-0849316784. SAYOOD, K. Introduction to data compression. San Francisco: Elsevier Inc., 2006. 680 ISBN 978-0-12-620862-7. SHEISI, H.; MESGARIAN, J.; RAHMANI, M. Steganography: Dct Coefficient Replacement Method and Compare With Jsteg Algorithm. International Journal of Computer and Electrical Engineering, v. 4, n. 4, p. 458-462, 2012. SMITH, S. W. The Scientist and Engineer's Guide to Digital Signal Processing. San Diego, CA.: California Technical Publishing, 1999. ISBN 0-9660176-4-1. SOLOMON, C.; BRECKON, T. Fundamentos de Processamento Digital de Imagens: uma abordagem prática com exemplos em Matlab. Rio de Janeiro: LTC, 2013. 289 ISBN 978-85-216-2347-2. TALACKO, P. Ancient idea helps to hide modern messages: INFORMATION TECHNOLOGY: Steganography, an old technique of concealing data, could prove a useful addition to today's arsenal of tools for protecting computer data, saysPaul Talacko. The Financial Times: 20 p. 2000. TOLBA, M. F. et al. High capacity image steganography using wavelet-based fusion. Computers and Communications, 2004. Proceedings. ISCC 2004. Ninth International Symposium on, 2004, 28/06/2004. p.430-435. VAGHELA, M.; GOHIL, M.; YADAV, R. Digital Watermarking: Combining DCT and DWT Techniques. Journal Of Information, Knowledge And Research In Computer Engineering, v. 02, n. 02, p. 467-471, 2012. ISSN 0975-6760. W3TECHS. Usage Statistics of Image File Formats for Websites, May 2016. 2016. Disponível em: < https://w3techs.com/technologies/overview/image_format/all >. Acesso em: 26/05/2016. WALLACE, G. K. The JPEG still picture compression standard. Commun. ACM, v. 34, n. 4, p. 30-44, 1991. ISSN 0001-0782. WANG, Z. The SSIM Index for Image Quality Assessment. 2014. Disponível em: < https://ece.uwaterloo.ca/~z70wang/research/ssim >. Acesso em: 02/10/2015. ZHOU, W. et al. Image quality assessment: from error visibility to structural similarity. Image Processing, IEEE Transactions on, v. 13, n. 4, p. 600-612, 2004. ISSN 1057-7149. ZIELINSKA, E.; MAZURCZYK, W.; SZCZYPIORSKI, K. Trends in Steganography. Association for Computing Machinery. Communications of the ACM, New York, v. 57, n. 3, p. 86, 2014. ISSN 00010782.
dc.rights.driver.fl_str_mv http://creativecommons.org/licenses/by-nc-nd/4.0/
info:eu-repo/semantics/openAccess
rights_invalid_str_mv http://creativecommons.org/licenses/by-nc-nd/4.0/
eu_rights_str_mv openAccess
dc.format.none.fl_str_mv application/pdf
dc.publisher.none.fl_str_mv Universidade Federal do Triângulo Mineiro
dc.publisher.program.fl_str_mv Programa de Mestrado Profissional em Inovação Tecnológica
dc.publisher.initials.fl_str_mv UFTM
dc.publisher.country.fl_str_mv Brasil
dc.publisher.department.fl_str_mv Instituto de Ciências Tecnológicas e Exatas - ICTE::Programa de Mestrado Profissional em Inovação Tecnológica
publisher.none.fl_str_mv Universidade Federal do Triângulo Mineiro
dc.source.none.fl_str_mv reponame:Biblioteca Digital de Teses e Dissertações da UFTM
instname:Universidade Federal do Triangulo Mineiro (UFTM)
instacron:UFTM
instname_str Universidade Federal do Triangulo Mineiro (UFTM)
instacron_str UFTM
institution UFTM
reponame_str Biblioteca Digital de Teses e Dissertações da UFTM
collection Biblioteca Digital de Teses e Dissertações da UFTM
bitstream.url.fl_str_mv http://bdtd.uftm.edu.br/bitstream/tede/347/11/Dissert%20Bruno%20A%20Romero2.pdf.txt
http://bdtd.uftm.edu.br/bitstream/tede/347/13/Dissert%20Bruno%20A%20Romero3.pdf.txt
http://bdtd.uftm.edu.br/bitstream/tede/347/15/Dissert%20Bruno%20A%20Romero4.pdf.txt
http://bdtd.uftm.edu.br/bitstream/tede/347/17/Dissert%20Bruno%20A%20Romero5.pdf.txt
http://bdtd.uftm.edu.br/bitstream/tede/347/1/license.txt
http://bdtd.uftm.edu.br/bitstream/tede/347/2/license_url
http://bdtd.uftm.edu.br/bitstream/tede/347/3/license_text
http://bdtd.uftm.edu.br/bitstream/tede/347/4/license_rdf
http://bdtd.uftm.edu.br/bitstream/tede/347/12/Dissert%20Bruno%20A%20Romero2.pdf.jpg
http://bdtd.uftm.edu.br/bitstream/tede/347/14/Dissert%20Bruno%20A%20Romero3.pdf.jpg
http://bdtd.uftm.edu.br/bitstream/tede/347/16/Dissert%20Bruno%20A%20Romero4.pdf.jpg
http://bdtd.uftm.edu.br/bitstream/tede/347/18/Dissert%20Bruno%20A%20Romero5.pdf.jpg
http://bdtd.uftm.edu.br/bitstream/tede/347/5/Dissert%20Bruno%20A%20Romero1.pdf
http://bdtd.uftm.edu.br/bitstream/tede/347/6/Dissert%20Bruno%20A%20Romero2.pdf
http://bdtd.uftm.edu.br/bitstream/tede/347/7/Dissert%20Bruno%20A%20Romero3.pdf
http://bdtd.uftm.edu.br/bitstream/tede/347/8/Dissert%20Bruno%20A%20Romero4.pdf
http://bdtd.uftm.edu.br/bitstream/tede/347/9/Dissert%20Bruno%20A%20Romero5.pdf
http://bdtd.uftm.edu.br/bitstream/tede/347/10/Dissert%20Bruno%20A%20Romero6.pdf
bitstream.checksum.fl_str_mv 37f0e43476308dcbeb2d641a201b6678
abab62d69522517a3aabb6e60ce3a793
89e0086a80c82b79c38271d8c6f93f63
450e47c3db3b91f779684436e1302378
1e1650138dd271baea0105346966c99c
4afdbb8c545fd630ea7db775da747b2f
d41d8cd98f00b204e9800998ecf8427e
d41d8cd98f00b204e9800998ecf8427e
5585af29ebe06b2ba98bb5f7eea9c8ca
1ae1dabb48b106b3625c44cbaad33262
3f55a90c4e1b280fe25aca781befc761
96c2a6c08813983977641a55fb2a6858
fa898e9ddc7c1ce8ad068773e5934b15
10053a6e70fcc50e5b1f9f879583b90d
f288cf1109214db7657b806245daf54b
c75486c1cab4dee814885a4120393cc8
e91a3ebfe6595e16f63d090607adb31b
a794ea48b32b89ad0c2812fab3d2c017
bitstream.checksumAlgorithm.fl_str_mv MD5
MD5
MD5
MD5
MD5
MD5
MD5
MD5
MD5
MD5
MD5
MD5
MD5
MD5
MD5
MD5
MD5
MD5
repository.name.fl_str_mv Biblioteca Digital de Teses e Dissertações da UFTM - Universidade Federal do Triangulo Mineiro (UFTM)
repository.mail.fl_str_mv bdtd@uftm.edu.br||bdtd@uftm.edu.br
_version_ 1854401111623991296