-
1
Extending commutative diagram cryptanalysis to slide, boomerang, rectangle and square attacks
Published 2007“…It was also left as an open problem to extend the framework to incorporate more attacks namely the slide, boomerang, amplified boomerang/rectangle and Square attacks. In this paper, we show how to model these attacks with the CD framework. …”
Article -
2
Adaptive image steganography based on optimal embedding and robust against chi-square attack
Published 2011“…The algorithm is also robust against Chi-square attack.…”
Get full text
Article -
3
Deteksi Steganografi Berbasis Least Significant Bit (LSB) Dengan Menggunakan Analisis Statistik
Published 2013-06-01“…Deteksi dilakukan dengan teknik Chi-square attack. Pada teknik ini dibandingkan distribusi frekuensi yang diharapkan secara teori dengan beberapa distribusi sampel yang diamati pada stego-image. …”
Get full text
Article -
4
DETEKSI STEGANOGRAFI BERBASIS LEAST SIGNIFICANT BIT (LSB) DENGAN MENGGUNAKAN ANALISIS STATISTIK
Published 2011“…Deteksi dilakukan dengan teknik Chi-square attack. Pada teknik ini dibandingkan distribusi frekuensi yang diharapkan secara teori dengan beberapa distribusi sampel yang diamati pada stego-image. …”
Get full text
Article -
5
A new colour image steganography using LSB approach with halftoning determination embedding position
Published 2014“…The experimental results have revealed that the method yielded very high imperceptibilty with Peak Signal-to-Noise Ratio averaged at 67dB, and was able to withstand against the Chi-square attack…”
Thesis -
6
Reducing vulnerability of modified LSB algorithm to a chosen statistic attacks
Published 2014-12-01“…There are several types of attacks that can detect the fact of conducting cover communication — chi-square attack and RS. This paper presents modification of the LSB algorithm which introduces fewer changes to carrier than the original LSB algorithm. …”
Get full text
Article -
7
New Steganography System Based on Huffman Coding and Fibonacci Decomposition
Published 2018-05-01“…Finally, three kinds of evaluation are applied such as PSNR, chi-square attack, and HVS attack. …”
Get full text
Article -
8
A new colour image steganography using LSB approach with halftoning determination embedding position
Published 2014“…The Least Significant Bit (LSB) insertion is a well-established method for embedding the secret message that is known for its superiority in terms of imperceptibility; however, it suffers from robustness against Chi-square attack. In this study, a new colour image steganography technique is proposed using the LSB insertion coupled with a halftone image, which is used to determine embed- ding pixels. …”
Article -
9
Medical image steganographic algorithm via modified LSB method and chaotic map
Published 2021-09-01“…The stego image displays acceptable result when comparing with the host image. Also, the chi‐square attack test is performed and the stego image can resist it. …”
Get full text
Article -
10
A gray-scale image steganography techmique using fibonacci 12-bitplane decomposition and LSB approach
Published 2013“…By applying Fibonacci decomposition to the cover image, better results have been achieved in terms of Peak Signal to Noise Ratio(PSNR) which indicates the ability of embed more secret size with maintaining the quality of stego-image, also the security and robustness has been evaluated by applying chi-square attack, the result for this attacks show that Fibonacci LSB method is withstanding for such attack.…”
Get full text
Thesis -
11
A Framework for Robust Deep Learning Models Against Adversarial Attacks Based on a Protection Layer Approach
Published 2024-01-01“…Evasion attacks are employed to create AEs to evade and mislead the classifier by generating malicious samples during the test phase of DL models i.e., CNN and DNN, using the Fast Gradient Sign Method (FGSM), Basic Iterative Method (BIM), Projected Gradient Descent (PGD), and Square Attack (SA). A protection layer is developed as a detection mechanism placed before the DNN classifier to identify and exclude AEs. …”
Get full text
Article -
12
A new KD-3D-CA block cipher with dynamic S boxes based on 3D cellular automata
Published 2019“…However, the fixed key expansion is vulnerable to square attack. On the other hand, the round key expansion algorithms are relatively simple. …”
Get full text
Thesis -
13
A New RSA Variant Based on Elliptic Curves
Published 2023-07-01“…We study the security of the new scheme and show that it is immune to factorization attacks, discrete-logarithm-problem attacks, sum-of-two-squares attacks, sum-of-four-squares attacks, isomorphism attacks, and homomorphism attacks. …”
Get full text
Article -
14
Steganography based on utilizing more surrounding pixels
Published 2010“…Furthermore, the method is proved to be robust against one of the common attacks to stego-images known as Chi-squared attack.…”
Get full text
Thesis -
15
Double layer steganography technique using DNA sequences and images
Published 2023-05-01“…The results show that the proposed mechanism is resistant to histogram and chi-square attacks. The maximum mean value observed was 0.05, which means the histograms of the original and stego images are nearly identical, and the stego image does not raise any suspicion regarding the existence of secret information. …”
Get full text
Article -
16
Capacity-Raising Reversible Data Hiding Using Empirical Plus–Minus One in Dual Images
Published 2023-04-01“…The proposed method can also withstand security attacks such as RS, pixel value difference, entropy, and chi-square attacks. The proposed method is also undetectable under visual attack analyses such as the difference histogram, pixel difference histogram, and visual inspection. …”
Get full text
Article