Search preferences
Skip to main search results

Search filters

Product Type

  • All Product Types 
  • Books (3)
  • Magazines & Periodicals (No further results match this refinement)
  • Comics (No further results match this refinement)
  • Sheet Music (No further results match this refinement)
  • Art, Prints & Posters (No further results match this refinement)
  • Photographs (No further results match this refinement)
  • Maps (No further results match this refinement)
  • Manuscripts & Paper Collectibles (No further results match this refinement)

Condition

Binding

Collectible Attributes

Language (1)

Price

  • Any Price 
  • Under US$ 25 
  • US$ 25 to US$ 50 (No further results match this refinement)
  • Over US$ 50 (No further results match this refinement)
Custom price range (US$)

Free Shipping

  • Free Shipping to U.S.A. (No further results match this refinement)

Seller Location

  • Wassim Al Chamaa

    Published by GRIN Verlag, 2019

    ISBN 10: 3668933448 ISBN 13: 9783668933446

    Language: English

    Seller: AHA-BUCH GmbH, Einbeck, Germany

    Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

    Contact seller

    US$ 32.25 shipping from Germany to U.S.A.

    Destination, rates & speeds

    Quantity: 1 available

    Add to basket

    Taschenbuch. Condition: Neu. Druck auf Anfrage Neuware - Printed after ordering - Project Report from the year 2018 in the subject Computer Science - Programming, , language: English, abstract: The F5 algorithm proposed by Westfeld is still one of the most known algorithms in the field of DCT-based steganography. It can make a JPEG image a container of a secret message, where no one knows the presence of the message except the sender and the intended receiver. In this programming work, we show how to realize the F5 algorithm via Matlab. We present the block diagrams of embedding and extracting processes and the entire Matlab code of the F5 algorithm.Some Notes about the F5 Matlab code:1- The implementation code works according to the method proposed by Andreas Westfield in his paper:' F5-A Steganographic Algorithm : High Capacity Despite Better Steganalysis '.Huffman coding and decoding are implemented using the Matlab JPEG Toolbox developed by Phil Sallee.2- The two-part Matlab code included in the report, embedding and extracting parts, can be executed in Matlab IDE. The embedding part reads the cover JPEG file and the message file we want to hide, then it creates a Stego JPEG file according to the F5 algorithm. On the other side, The extracting part reads the Stego JPEG file, and then it extracts the hidden message file.3- The F5 code calls the main two functions of Phil Sallee's Matlab Toolbox; JPEG reading and writing. These functions make it easier to access and manipulate the quantized DCT coefficients of a given JPEG file. Using Sallee's Toolbox should accord with the used operating system, whether it is 32 or 64 bits.4- The F5 code contains the function to form the image matrix to show the input and output images. Running this function requires ALL the Sallee's Toolbox to be installed. Otherwise, the user can REMOVE this function from the code since it doesn't affect the main F5 process and thus keep ONLY using the main two function of the Sallee's Toolbox.5- The message file we want to hide can be any file of any kind and whatever its extension. The size of the message file should be appropriate for the size of the used cover JPEG image, so no errors will occur when executed.

  • Wassim Al Chamaa

    Published by GRIN Verlag, 2019

    ISBN 10: 3668933448 ISBN 13: 9783668933446

    Language: English

    Seller: preigu, Osnabrück, Germany

    Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

    Contact seller

    US$ 79.86 shipping from Germany to U.S.A.

    Destination, rates & speeds

    Quantity: 5 available

    Add to basket

    Taschenbuch. Condition: Neu. MATLAB Implementation of the Steganographic Algorithm F5 | Matlab Codes for F5 Algorithm | Wassim Al Chamaa | Taschenbuch | Paperback | 28 S. | Englisch | 2019 | GRIN Verlag | EAN 9783668933446 | Verantwortliche Person für die EU: BoD - Books on Demand, In de Tarpen 42, 22848 Norderstedt, info[at]bod[dot]de | Anbieter: preigu.

  • Wassim Al Chamaa

    Published by GRIN Verlag Jun 2019, 2019

    ISBN 10: 3668933448 ISBN 13: 9783668933446

    Language: English

    Seller: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germany

    Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

    Contact seller

    Print on Demand

    US$ 26.24 shipping from Germany to U.S.A.

    Destination, rates & speeds

    Quantity: 2 available

    Add to basket

    Taschenbuch. Condition: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Project Report from the year 2018 in the subject Computer Science - Programming, , language: English, abstract: The F5 algorithm proposed by Westfeld is still one of the most known algorithms in the field of DCT-based steganography. It can make a JPEG image a container of a secret message, where no one knows the presence of the message except the sender and the intended receiver. In this programming work, we show how to realize the F5 algorithm via Matlab. We present the block diagrams of embedding and extracting processes and the entire Matlab code of the F5 algorithm.Some Notes about the F5 Matlab code:1- The implementation code works according to the method proposed by Andreas Westfield in his paper:' F5-A Steganographic Algorithm : High Capacity Despite Better Steganalysis '.Huffman coding and decoding are implemented using the Matlab JPEG Toolbox developed by Phil Sallee.2- The two-part Matlab code included in the report, embedding and extracting parts, can be executed in Matlab IDE. The embedding part reads the cover JPEG file and the message file we want to hide, then it creates a Stego JPEG file according to the F5 algorithm. On the other side, The extracting part reads the Stego JPEG file, and then it extracts the hidden message file.3- The F5 code calls the main two functions of Phil Sallee's Matlab Toolbox; JPEG reading and writing. These functions make it easier to access and manipulate the quantized DCT coefficients of a given JPEG file. Using Sallee's Toolbox should accord with the used operating system, whether it is 32 or 64 bits.4- The F5 code contains the function to form the image matrix to show the input and output images. Running this function requires ALL the Sallee's Toolbox to be installed. Otherwise, the user can REMOVE this function from the code since it doesn't affect the main F5 process and thus keep ONLY using the main two function of the Sallee's Toolbox.5- The message file we want to hide can be any file of any kind and whatever its extension. The size of the message file should be appropriate for the size of the used cover JPEG image, so no errors will occur when executed. 28 pp. Englisch.