Steganography with Public-Key Cryptography for Videoconference
XXX CNMAC - Set/2007
Fábio Borges de Oliveira
Steganography with Public-Key Cryptography for Videoconference – p.1/26
Steganography with Public-Key Cryptography for Videoconference XXX - - PowerPoint PPT Presentation
Steganography with Public-Key Cryptography for Videoconference XXX CNMAC - Set/2007 Fbio Borges de Oliveira Steganography with Public-Key Cryptography for Videoconference p.1/26 Steganography Source: Steganography: Steganography with
Fábio Borges de Oliveira
Steganography with Public-Key Cryptography for Videoconference – p.1/26
Steganography with Public-Key Cryptography for Videoconference – p.2/26
Steganography with Public-Key Cryptography for Videoconference – p.3/26
Steganography with Public-Key Cryptography for Videoconference – p.4/26
Steganography with Public-Key Cryptography for Videoconference – p.5/26
Steganography with Public-Key Cryptography for Videoconference – p.6/26
Steganography with Public-Key Cryptography for Videoconference – p.7/26
Steganography with Public-Key Cryptography for Videoconference – p.8/26
Steganography with Public-Key Cryptography for Videoconference – p.9/26
Steganography with Public-Key Cryptography for Videoconference – p.10/26
Steganography with Public-Key Cryptography for Videoconference – p.11/26
Steganography with Public-Key Cryptography for Videoconference – p.11/26
Steganography with Public-Key Cryptography for Videoconference – p.11/26
Steganography with Public-Key Cryptography for Videoconference – p.11/26
Steganography with Public-Key Cryptography for Videoconference – p.11/26
Steganography with Public-Key Cryptography for Videoconference – p.11/26
Steganography with Public-Key Cryptography for Videoconference – p.11/26
Steganography with Public-Key Cryptography for Videoconference – p.11/26
Steganography with Public-Key Cryptography for Videoconference – p.11/26
Steganography with Public-Key Cryptography for Videoconference – p.12/26
Steganography
B l
k 8 x 8
JPEG Entropy Encoder Quantizer DCT Dequantizer Inverse DCT Entropy Decoder
Image
Input Output
Steganography with Public-Key Cryptography for Videoconference – p.13/26
7
7
√ 2 for k = 0,
Steganography with Public-Key Cryptography for Videoconference – p.14/26
Steganography with Public-Key Cryptography for Videoconference – p.15/26
200 200 200 200 200 200 200 200 200 200 200 200 200 200 200 200 200 200 200 200 200 200 200 200 200 200 200 200 200 200 200 200 200 200 200 200 200 200 200 200
Steganography with Public-Key Cryptography for Videoconference – p.16/26
Steganography with Public-Key Cryptography for Videoconference – p.17/26
Steganography with Public-Key Cryptography for Videoconference – p.18/26
Steganography with Public-Key Cryptography for Videoconference – p.19/26
Steganography with Public-Key Cryptography for Videoconference – p.20/26
Steganography with Public-Key Cryptography for Videoconference – p.21/26
Steganography with Public-Key Cryptography for Videoconference – p.22/26
Steganography with Public-Key Cryptography for Videoconference – p.23/26
Steganography with Public-Key Cryptography for Videoconference – p.24/26
Steganography with Public-Key Cryptography for Videoconference – p.25/26
Fábio Borges de Oliveira
Steganography with Public-Key Cryptography for Videoconference – p.26/26