Use este identificador para citar ou linkar para este item:
http://bdtd.uftm.edu.br/handle/tede/347
Registro completo de metadados
Campo DC | Valor | Idioma |
---|---|---|
dc.creator | ROMERO, Bruno Alves | - |
dc.creator.ID | 31104805812 | por |
dc.creator.Lattes | http://lattes.cnpq.br/2064055859130745 | por |
dc.contributor.advisor1 | JORGE, David Calhau | - |
dc.contributor.advisor1ID | 82863857649 | por |
dc.contributor.advisor1Lattes | http://lattes.cnpq.br/2966842034513863 | por |
dc.date.accessioned | 2016-08-05T20:14:05Z | - |
dc.date.issued | 2016-02-15 | - |
dc.identifier.citation | ROMERO, Bruno Alves. Comparação de técnicas de esteganografia aplicadas a marca d'água digital. 2016. 67f. Dissertação (Mestrado em Inovação Tecnológica) - Programa de Mestrado Profissional em Inovação Tecnológica, Universidade Federal do Triângulo Mineiro, Uberaba, 2016. | por |
dc.identifier.uri | http://bdtd.uftm.edu.br/handle/tede/347 | - |
dc.description.resumo | Esteganografia vem do grego, significando “a escrita oculta”, e durante séculos as pessoas têm buscado meios de se comunicar de maneira segura. A marca d’água digital faz uso de técnicas de esteganografia para garantir a autenticidade e autoria de uma imagem ou outra mídia digital, por meio de sua incorporação. Entretanto, o uso de marcas d’água em imagens sofre com ataques e características próprias, como a compressão. O presente trabalho visa utilizar distintos algoritmos esteganográficos aplicados e adaptados para trabalhar com marca d’água digital em imagens coloridas. Objetiva-se encontrar o meio mais eficiente para garantir a autenticidade de uma imagem digital, com foco na robustez. Faz-se aqui um estudo de caso submetendo algoritmos variados a situações de ataques diversos, recebendo como resultado a marca d’água previamente incorporada e métricas que permitam avaliar de maneira objetiva e subjetiva o desempenho de cada processo. Os algoritmos foram submetidos a imagens variadas e marcas d’água diversas possibilitando uma visão geral do comportamento dos algoritmos em ambientes diversos. Nenhum dos ataques destruiu a marca d’água sem afetar a qualidade da imagem. Os algoritmos Fusion e DCT AC apresentaram a melhor performance geral, enquanto o formato JPEG se mostrou desafiador para a esteganografia. | por |
dc.description.abstract | Steganography comes from the Greek, meaning, "hidden writing", for centuries, people have pursued ways to communicate securely. The digital watermark makes use of steganography techniques to ensure the authenticity and authorship of a picture or other digital media, through its incorporation. However, the use of watermarks in images suffers with attacks and characteristics by itself, such as compression. This study aims to use different steganographics algorithms applied and adapted to work with digital watermark in color images. The objective is to find the most efficient way to ensure the authenticity of a digital image, focusing on robustness. This work have submitting various algorithms to several attacks and situations, getting as a result the watermark previously incorporated and metrics to evaluate objectively and subjectively the performance of each process. The algorithms were subjected to a variety of different images and watermarks allowing an overview of the each one’s behavior in several environments. None of the attacks was capable to destroy the watermark without affecting image quality. The Fusion and DCT AC algorithms presented the best overall performance, while the JPEG format is a challenge for steganography. | eng |
dc.format | application/pdf | * |
dc.thumbnail.url | http://bdtd.uftm.edu.br/retrieve/1739/Dissert%20Bruno%20A%20Romero2.pdf.jpg | * |
dc.thumbnail.url | http://bdtd.uftm.edu.br/retrieve/1741/Dissert%20Bruno%20A%20Romero3.pdf.jpg | * |
dc.thumbnail.url | http://bdtd.uftm.edu.br/retrieve/1743/Dissert%20Bruno%20A%20Romero4.pdf.jpg | * |
dc.thumbnail.url | http://bdtd.uftm.edu.br/retrieve/1745/Dissert%20Bruno%20A%20Romero5.pdf.jpg | * |
dc.language | por | por |
dc.publisher | Universidade Federal do Triângulo Mineiro | por |
dc.publisher.department | Instituto de Ciências Tecnológicas e Exatas - ICTE::Programa de Mestrado Profissional em Inovação Tecnológica | por |
dc.publisher.country | Brasil | por |
dc.publisher.initials | UFTM | por |
dc.publisher.program | Programa de Mestrado Profissional em Inovação Tecnológica | por |
dc.relation.references | AKAR, F.; YALMAN, Y.; VAROL, H. S. Data hiding in digital images using a partial optimization technique based on the classical LSB method. Turk. J. Electr. Eng. Comput. Sci., v. 21, p. 2037-2047, 2013. ISSN 1300-0632. ALTAAY, A. A. J.; BIN SAHIB, S.; ZAMANI, M. An Introduction to Image Steganography Techniques. Advanced Computer Science Applications and Technologies (ACSAT), 2012 International Conference on, 2012, 26-28 Nov. 2012. p.122-126. ATAWNEH, S.; ALMOMANI, A.; SUMARI, P. Steganography in digital images: Common approaches and tools. IETE Technical Review (Institution of Electronics and Telecommunication Engineers, India), v. 30, n. 4, p. 344-358, 2013. ISSN 02564602. CHEDDAD, A. et al. Digital image steganography: Survey and analysis of current methods. Signal Processing, v. 90, n. 3, p. 727-752, 3// 2010. ISSN 0165-1684. Disponível em: < http://www.sciencedirect.com/science/article/pii/S0165168409003648 >. COX, I. J. et al. Digital Watermarking and Steganography. Elsevier Inc., 2008. 587 ISBN 978-0-12-372585-1. DOSHI, R.; JAIN, P.; GUPTA, L. Steganography and Its Applications in Security. International Journal of Modern Engineering Research, v. 2, n. 6, p. 4634-4638, 2012. EL-EMAM, N. N.; AL-ZUBIDY, R. A. S. New steganography algorithm to conceal a large amount of secret message using hybrid adaptive neural networks with modified adaptive genetic algorithm. Journal of Systems and Software, v. 86, n. 6, p. 1465-1481, 2013. ISSN 0164-1212. Disponível em: < http://www.sciencedirect.com/science/article/pii/S0164121212003317 >. ESKICIOGLU, A.; LITWIN, L. Cryptography. IEEE Potentials, v. 20, n. 1, p. 36-38, 2001. ISSN 0278-6648. GONZALEZ, R. C.; WOODS, R. C. Processamento Digital de Imagens. 3 ed. São Paulo: Pearson Education do Brasil, 2010. 624 ISBN 978-85-7605-401-6. HUSIEN, S.; BADI, H. Artificial neural network for steganography. Neural Computing and Applications, 2014. ISSN 09410643. JABER, S. S. et al. SURVEY ON RECENT DIGITAL IMAGE STEGANOGRAPHY TECHNIQUES. Journal of Theoretical & Applied Information Technology, v. 66, n. 3, p. 714-728, 2014. ISSN 19928645. JIAN, Z.; KOCH, E. A generic digital watermarking model. Computers & Graphics, v. 22, n. 4, p. 397-403, 1998. ISSN 0097-8493. Disponível em: < http://www.sciencedirect.com/science/article/pii/S0097849398000296 >. JULIO, E. P.; BRAZIL, W. G.; ALBUQUERQUE, C. V. N. Esteganografia e suas Aplicações. VII Simpósio Brasileiro em Segurança da Informação e de Sistemas Computacionais, 2007. JUNED AHMED, M.; HEMACHANDRAN, K. Study of Image steganography using LSB, DFT and DWT. International Journal of Computers & Technology, Vol 11, Iss 5, Pp 2618-2627 (2013), 2013. ISSN 2277-3061. K.YUGALA. Steganography. International Journal of Engineering Trends and Technology, v. 4, n. 5, p. 1629, 2013. ISSN 22315381. KUMAR, S.; MUTTOO, S. A comparative study of image steganography in wavelet domain. International Journal of Computer Science and Mobile Computing, v. 2, n. 2, p. 91-101, 2013. KUMAR, V.; KUMAR, D. Digital Image Steganography Based on Combination of DCT and DWT. In: DAS, V. e VIJAYKUMAR, R. (Ed.). Information and Communication Technologies: Springer Berlin Heidelberg, v.101, 2010. cap. 102, p.596-601. (Communications in Computer and Information Science). ISBN 978-3-642-15765-3. LUO, X. et al. On F5 Steganography in Images. The Computer Journal, v. 55, n. 4, p. 447-456, 2012. ISSN 0010-4620. LUSSON, F. et al. A novel approach to digital watermarking, exploiting colour spaces. Signal Processing, v. 93, n. 5, p. 1268-1294, 2013. ISSN 01651684. MACRAKIS, K. Ancient imprints: fear and the origins of secret writing. Endeavour, v. 33, n. 1, p. 24-28, 2009. ISSN 0160-9327. Disponível em: < http://www.sciencedirect.com/science/article/pii/S0160932709000052 >. MIANO, J. Compressed image file formats: JPEG, PNG, GIF, XBM, BMP. Massachusetts: ACM Press/Addison-Wesley Publishing Co., 1999. 264 ISBN 0-201-60443-4. MOHD, B. et al. Hierarchical steganography using novel optimum quantization technique. Signal, Image and Video Processing, London, v. 7, n. 6, p. 1029-1040, 2013. ISSN 1863-1703. MONIKA, G.; JASMINE, J. Image Steganography Using Discrete Cosine Transform (DCT) and Blowfish Algorithm. International Journal of Computer Trends and Technology, v. 11, n. 4, p. 144, 2014. ISSN 2231-2803. MURRAY, J. D.; VANRYPER, W. Encyclopedia of Graphics File Formats: The Complete Reference. O'Reilly Media, 1996. 1152 ISBN 978-1565921610. NAGHAM, H. et al. Image Steganography Techniques: An Overview. International Journal of Computer Science and Security, v. 6, n. 3, p. 168, 2012. ISSN 1985-1553. NISSAR, A.; MIR, A. H. Classification of steganalysis techniques: A study. Digital Signal Processing, v. 20, n. 6, p. 1758-1770, 2010. ISSN 1051-2004. Disponível em: < http://www.sciencedirect.com/science/article/pii/S1051200410000412 >. PEDRINI, H.; SCHWARTZ, W. R. Análise de Imagens Digitais: princípios, algoritmos e aplicações. São Paulo: Thomson Learning, 2008. ISBN 978-85-221-0595-3. PETITCOLAS, F. A. P.; ANDERSON, R. J.; KUHN, M. G. Information hiding - a survey. Proceedings of the IEEE, v. 87, n. 7, p. 1062-1078, 1999. ISSN 00189219. PETITCOLAS, F. A. P.; KATZENBEISSER, S. Information hiding techniques for steganography and digital watermarking. Boston: Artech House, 2000. 220 ISBN 978-1580530354. RAJU, U. S. N.; BHASKAR, U. Secured Data Transmission Using Wavelet Based Steganography and cryptography. International Journal of Engineering Research and Applications, v. 4, n. 2, p. 45-50, 2014. ISSN 2248-9622. RAPHAEL, A.; SUNDARAM, V. Cryptography and Steganography - A Survey. International Journal of Computer Technology and Applications, v. 2, n. 3, p. 626-626, 2011. ROCHA, A.; COSTA, H. A. X.; CHAVES, L. M. Camaleão: um software para segurança digital utilizando esteganografia. REIC - Revista Eletrônica de Iniciação Científica, v. 1, p. 1-11, 2004. ROCHA, A.; GOLDENSTEIN, S. Steganography and steganalysis in digital multimedia: Hype or hallelujah? Revista de Informática Teórica e Aplicada, v. 15, n. 1, p. 83-110, 2008. ISSN 2175-2745. ROELOFS, G. Portable Network Graphics (PNG). 04/05/2015 Disponível em: < http://www.libpng.org/pub/png/ >. Acesso em: 09/08/2015. ROSENBLATT, B. Steganography Revisited: Watermarking Comes In from the Cold. Seybold Report: Analyzing Publishing Technologies, v. 3, n. 5, p. 3, 2003. ISSN 15339211. SANCHEZ, J.; CANTON, M. P. The PC graphics handbook. CRC Press LLC, 2003. ISBN 978-0849316784. SAYOOD, K. Introduction to data compression. San Francisco: Elsevier Inc., 2006. 680 ISBN 978-0-12-620862-7. SHEISI, H.; MESGARIAN, J.; RAHMANI, M. Steganography: Dct Coefficient Replacement Method and Compare With Jsteg Algorithm. International Journal of Computer and Electrical Engineering, v. 4, n. 4, p. 458-462, 2012. SMITH, S. W. The Scientist and Engineer's Guide to Digital Signal Processing. San Diego, CA.: California Technical Publishing, 1999. ISBN 0-9660176-4-1. SOLOMON, C.; BRECKON, T. Fundamentos de Processamento Digital de Imagens: uma abordagem prática com exemplos em Matlab. Rio de Janeiro: LTC, 2013. 289 ISBN 978-85-216-2347-2. TALACKO, P. Ancient idea helps to hide modern messages: INFORMATION TECHNOLOGY: Steganography, an old technique of concealing data, could prove a useful addition to today's arsenal of tools for protecting computer data, saysPaul Talacko. The Financial Times: 20 p. 2000. TOLBA, M. F. et al. High capacity image steganography using wavelet-based fusion. Computers and Communications, 2004. Proceedings. ISCC 2004. Ninth International Symposium on, 2004, 28/06/2004. p.430-435. VAGHELA, M.; GOHIL, M.; YADAV, R. Digital Watermarking: Combining DCT and DWT Techniques. Journal Of Information, Knowledge And Research In Computer Engineering, v. 02, n. 02, p. 467-471, 2012. ISSN 0975-6760. W3TECHS. Usage Statistics of Image File Formats for Websites, May 2016. 2016. Disponível em: < https://w3techs.com/technologies/overview/image_format/all >. Acesso em: 26/05/2016. WALLACE, G. K. The JPEG still picture compression standard. Commun. ACM, v. 34, n. 4, p. 30-44, 1991. ISSN 0001-0782. WANG, Z. The SSIM Index for Image Quality Assessment. 2014. Disponível em: < https://ece.uwaterloo.ca/~z70wang/research/ssim >. Acesso em: 02/10/2015. ZHOU, W. et al. Image quality assessment: from error visibility to structural similarity. Image Processing, IEEE Transactions on, v. 13, n. 4, p. 600-612, 2004. ISSN 1057-7149. ZIELINSKA, E.; MAZURCZYK, W.; SZCZYPIORSKI, K. Trends in Steganography. Association for Computing Machinery. Communications of the ACM, New York, v. 57, n. 3, p. 86, 2014. ISSN 00010782. | por |
dc.rights | Acesso Aberto | por |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/4.0/ | - |
dc.subject | Esteganografia | por |
dc.subject | Marca d’agua digital | por |
dc.subject | Imagem | por |
dc.subject | Steganography | eng |
dc.subject | Digital watermark | eng |
dc.subject | Image | eng |
dc.subject.cnpq | Metodologias e Técnicas da Computação | por |
dc.title | Comparação de técnicas de esteganografia aplicadas a marca d'água digital | por |
dc.type | Dissertação | por |
Aparece nas coleções: | Programa de Mestrado Profissional em Inovações e Tecnologias |
Arquivos associados a este item:
Arquivo | Descrição | Tamanho | Formato | |
---|---|---|---|---|
Dissert Bruno A Romero1.pdf | Dissert Bruno A Romero1 | 1,69 MB | Adobe PDF | Visualizar/Abrir |
Dissert Bruno A Romero2.pdf | Dissert Bruno A Romero2 | 1,93 MB | Adobe PDF | ![]() Visualizar/Abrir |
Dissert Bruno A Romero3.pdf | Dissert Bruno A Romero3 | 1,65 MB | Adobe PDF | ![]() Visualizar/Abrir |
Dissert Bruno A Romero4.pdf | Dissert Bruno A Romero4 | 1,7 MB | Adobe PDF | ![]() Visualizar/Abrir |
Dissert Bruno A Romero5.pdf | Dissert Bruno A Romero5 | 1,82 MB | Adobe PDF | ![]() Visualizar/Abrir |
Dissert Bruno A Romero6.pdf | Dissert Bruno A Romero6 | 1,41 MB | Adobe PDF | Visualizar/Abrir |
Este item está licenciada sob uma Licença Creative Commons