Showing 1 - 16 results of 16 for search '"Square attack"', query time: 0.36s Refine Results
  1. 1

    Extending commutative diagram cryptanalysis to slide, boomerang, rectangle and square attacks by Chung Raphael, Wei Phan

    Published 2007
    “…It was also left as an open problem to extend the framework to incorporate more attacks namely the slide, boomerang, amplified boomerang/rectangle and Square attacks. In this paper, we show how to model these attacks with the CD framework. …”
    Article
  2. 2

    Adaptive image steganography based on optimal embedding and robust against chi-square attack by Zanganeh, Omid, Ibrahim, Subariah

    Published 2011
    “…The algorithm is also robust against Chi-square attack.…”
    Get full text
    Article
  3. 3

    Deteksi Steganografi Berbasis Least Significant Bit (LSB) Dengan Menggunakan Analisis Statistik by Nur Rokhman, Juwita Maharanti

    Published 2013-06-01
    “…Deteksi dilakukan dengan teknik Chi-square attack. Pada teknik ini dibandingkan distribusi frekuensi yang diharapkan secara teori dengan beberapa distribusi sampel yang diamati pada stego-image. …”
    Get full text
    Article
  4. 4

    DETEKSI STEGANOGRAFI BERBASIS LEAST SIGNIFICANT BIT (LSB) DENGAN MENGGUNAKAN ANALISIS STATISTIK by Rokhman, Nur, Maharanti, juwita

    Published 2011
    “…Deteksi dilakukan dengan teknik Chi-square attack. Pada teknik ini dibandingkan distribusi frekuensi yang diharapkan secara teori dengan beberapa distribusi sampel yang diamati pada stego-image. …”
    Get full text
    Article
  5. 5

    A new colour image steganography using LSB approach with halftoning determination embedding position by Hassan, Reband Jamil

    Published 2014
    “…The experimental results have revealed that the method yielded very high imperceptibilty with Peak Signal-to-Noise Ratio averaged at 67dB, and was able to withstand against the Chi-square attack…”
    Thesis
  6. 6

    Reducing vulnerability of modified LSB algorithm to a chosen statistic attacks by Kamil Kaczyński

    Published 2014-12-01
    “…There are several types of attacks that can detect the fact of conducting cover communication — chi-square attack and RS. This paper presents modification of the LSB algorithm which introduces fewer changes to carrier than the original LSB algorithm. …”
    Get full text
    Article
  7. 7

    New Steganography System Based on Huffman Coding and Fibonacci Decomposition by Fadheela Sabri Abu-Almash

    Published 2018-05-01
    “…Finally, three kinds of evaluation are applied such as PSNR, chi-square attack, and HVS attack.             …”
    Get full text
    Article
  8. 8

    A new colour image steganography using LSB approach with halftoning determination embedding position by Hassan, Reband Jamil, Sulong, Ghazali

    Published 2014
    “…The Least Significant Bit (LSB) insertion is a well-established method for embedding the secret message that is known for its superiority in terms of imperceptibility; however, it suffers from robustness against Chi-square attack. In this study, a new colour image steganography technique is proposed using the LSB insertion coupled with a halftone image, which is used to determine embed- ding pixels. …”
    Article
  9. 9

    Medical image steganographic algorithm via modified LSB method and chaotic map by A. A. Karawia

    Published 2021-09-01
    “…The stego image displays acceptable result when comparing with the host image. Also, the chi‐square attack test is performed and the stego image can resist it. …”
    Get full text
    Article
  10. 10

    A gray-scale image steganography techmique using fibonacci 12-bitplane decomposition and LSB approach by Hamood, Sabah Fadhel

    Published 2013
    “…By applying Fibonacci decomposition to the cover image, better results have been achieved in terms of Peak Signal to Noise Ratio(PSNR) which indicates the ability of embed more secret size with maintaining the quality of stego-image, also the security and robustness has been evaluated by applying chi-square attack, the result for this attacks show that Fibonacci LSB method is withstanding for such attack.…”
    Get full text
    Thesis
  11. 11

    A Framework for Robust Deep Learning Models Against Adversarial Attacks Based on a Protection Layer Approach by Mohammed Nasser Al-Andoli, Shing Chiang Tan, Kok Swee Sim, Pey Yun Goh, Chee Peng Lim

    Published 2024-01-01
    “…Evasion attacks are employed to create AEs to evade and mislead the classifier by generating malicious samples during the test phase of DL models i.e., CNN and DNN, using the Fast Gradient Sign Method (FGSM), Basic Iterative Method (BIM), Projected Gradient Descent (PGD), and Square Attack (SA). A protection layer is developed as a detection mechanism placed before the DNN classifier to identify and exclude AEs. …”
    Get full text
    Article
  12. 12

    A new KD-3D-CA block cipher with dynamic S boxes based on 3D cellular automata by Hamdi, Ayman Majid

    Published 2019
    “…However, the fixed key expansion is vulnerable to square attack. On the other hand, the round key expansion algorithms are relatively simple. …”
    Get full text
    Thesis
  13. 13

    A New RSA Variant Based on Elliptic Curves by Maher Boudabra, Abderrahmane Nitaj

    Published 2023-07-01
    “…We study the security of the new scheme and show that it is immune to factorization attacks, discrete-logarithm-problem attacks, sum-of-two-squares attacks, sum-of-four-squares attacks, isomorphism attacks, and homomorphism attacks. …”
    Get full text
    Article
  14. 14

    Steganography based on utilizing more surrounding pixels by Afrakhteh, Masoud

    Published 2010
    “…Furthermore, the method is proved to be robust against one of the common attacks to stego-images known as Chi-squared attack.…”
    Get full text
    Thesis
  15. 15

    Double layer steganography technique using DNA sequences and images by Asia Othman Aljahdali, Omnia Abdullah Al-Harbi

    Published 2023-05-01
    “…The results show that the proposed mechanism is resistant to histogram and chi-square attacks. The maximum mean value observed was 0.05, which means the histograms of the original and stego images are nearly identical, and the stego image does not raise any suspicion regarding the existence of secret information. …”
    Get full text
    Article
  16. 16

    Capacity-Raising Reversible Data Hiding Using Empirical Plus–Minus One in Dual Images by Cheng-Ta Huang, Chi-Yao Weng, Njabulo Sinethemba Shongwe

    Published 2023-04-01
    “…The proposed method can also withstand security attacks such as RS, pixel value difference, entropy, and chi-square attacks. The proposed method is also undetectable under visual attack analyses such as the difference histogram, pixel difference histogram, and visual inspection. …”
    Get full text
    Article