Image Processing Oriented to Security Optimization

Authors

  • Ion Ivan Bucharest Academy of Economic Studies
  • Adrian Visoiu Bucharest University of Economic Studies
  • Mihai Doinea Bucharest Academy of Economic Studies

Keywords:

security, watermarking, digital content, image, steganography, algorithm, image filters

Abstract

This paper presents the main aspects of the digital content security. It describes the content of watermarking, presenting the steganography concept. SteganoGraphy application is presented and the algorithm used is analyzed. Optimization techniques are introduces to minimize the risk of discovering the information embedded into digital content by means of invisible watermarking. Techniques of analyzing the digital content results and identify the possible countermeasures for optimizing the steganography algorithm are presented.

Author Biographies

Ion Ivan, Bucharest Academy of Economic Studies

Economic Informatics Department

Adrian Visoiu, Bucharest University of Economic Studies

Economic Informatics Department

Mihai Doinea, Bucharest Academy of Economic Studies

Economic Informatics Department

References

Ingemar J. COX, Matthew MILLER, Jeffrey BLOOM, Jessica FRIDRICH, Ton KALKER – Digital watermarking and steganography, Printing House Morgan Kaufmann, 2008, ISBN 0123725852, 593 pg.

Gregory KIPPER – Investigator's guide to steganography, Printing House CRC Press, 2004, ISBN 0849324335

Peter WAYNER – Disappearing Cryptography: Information Hiding: Steganography & Watermarking, Printing House Morgan Kaufmann, 2008, ISBN 0123744792.

(2009, Sept.) Wikipedia Site. [Online] www.wikipedia.com

Victor Valeriu PATRICIU, Ion BICA, Monica ENE-PIETROSEANU, Justin PRIESCU – Semnaturi electronice si securitate informatica, BIC All Printing House, 2006, ISBN 973-571-564-3.

Downloads

Published

2010-06-30

How to Cite

Ivan, I., Visoiu, A., & Doinea, M. (2010). Image Processing Oriented to Security Optimization. Journal of Mobile, Embedded and Distributed Systems, 2(1), 8-14. Retrieved from http://jmeds.eu/index.php/jmeds/article/view/Image-Processing-Oriented-to-Security-Optimization