DERIVE TRANSMISSION SPECTRUM OF LATENT DATA USING DIGITAL INTELLIGENCE

Main Article Content

Divya Tej
M Jai Ram

Abstract

We consider the issue of removing indiscriminately information implanted over a wide band in a range (change) area of an advanced medium (picture, sound, video). We build up a novel multicarrier / signature iterative summed up slightest squares (M-IGLS) center technique to look for obscure information covered up in has by means of multi carrier spread-range implanting. Neither the first host nor the installing bearers are accepted accessible. Test examines on pictures demonstrate that the created calculation can accomplish recuperation likelihood of blunder near what might be achieved with known inserting transporters and host auto correlation network.

Downloads

Download data is not yet available.

Article Details

Section
Articles

References

F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, “Information hiding:A survey,†Proc. IEEE (Special Issue on Identification and Protection of Multimedia Information), vol. 87,July 1999, IEEE, pp. 1062-1078, .

I. J. Cox, M. L. Miller, and J. A. Bloom, Digital Watermarking. San I. J. Cox, M. L. Miller, and J. A. Bloom, Digital Watermarking. San

J. Fridrich, Steganography in Digital Media, Principles, Algorithms, andApplications. Combridge, UK: CombridgeUniveristy Press, 2010. : CombridgeUniveristy Press, 2010.

Y. Wang and P. Moulin, “Perfectly secure steganography : Capacity, error exponents, and code constructions,†IEEE Trans. Inform. Theory, vol. 54, June 2008, pp. 2706-2722.

S. Lyu and H. Farid, “Steganalysis using higher-order i mage statistics,†IEEE Trans. Inform. Forensics and Security, vol. 1, Mar.2006, pp. 111-119.

D. G. Manolakis, V. K. Ingle, and S. M. Kogon. Statistical and adaptive signal processing: Spectral estimation, signal modeling, adaptive filtering and array processing . Boston, MA: McGraw-Hill, 2000.

P. Bas and F. Cayre, “Achieving subspace or key security for WOA using natural or circular watermarking,†in Proc. ACM Multimedia andSecurity Workshop, Geneva, Switzerland, Sept. 2006.

M. Gkizeli, D. A. Pados, S. N. Batalama, and M. J. Medley, “Blind iterative recovery of spread-spectrum teganographic messages,†in Proc.IEEE Intern. Conf. Image Proc. (ICIP), Genova, Italy, Sept. 2005, vol.2, pp. 11-14.