Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

F5 steganography algorithm

Posted on 2004-08-02
9
Medium Priority
?
4,900 Views
Last Modified: 2008-01-09
I need to detect how much the difference in an image (JPEG only) after I insert a steganography in it. I'm using F5 algorithm to insert the steganography. Now I want determine the image quality.
Can anyone explain me the error detection method using Root Mean Square (RMS)?
0
Comment
Question by:drakuli
  • 5
  • 2
  • 2
9 Comments
 
LVL 4

Expert Comment

by:exploitedj
ID: 11706898
To find RMS error,you take the point by point difference between the original image and the filtered image, square each value, compute the mean, then take the square root. Then you have your rms error value.
0
 
LVL 3

Expert Comment

by:fatlad
ID: 11720485
Interesting article on wht RMSE and MSE are not very good! http://white.stanford.edu/html/teo/pdm/pdm.html
0
 
LVL 1

Author Comment

by:drakuli
ID: 11733504
Guys, can you be more specific?

I'm totally blind about this topic...

>> exploitedj >>> square each value
   value of what????
0
When ransomware hits your clients, what do you do?

MSPs: Endpoint security isn’t enough to prevent ransomware.
As the impact and severity of crypto ransomware attacks has grown, Webroot has fought back, not just by building a next-gen endpoint solution capable of preventing ransomware attacks but also by being a thought leader.

 
LVL 4

Accepted Solution

by:
exploitedj earned 1000 total points
ID: 11744329
You have two images, the original and a filtered one, you want to diff the two images. Square the value of each pixel after diffing to get your error values. Get a mean value of these squared errors. Root the value of the mean of squared errors.
You can use Bdiff to get the binary diff
0
 
LVL 1

Author Comment

by:drakuli
ID: 11791231
Ok. Please wait a moment. I'm still confused. I'll make a response again later...
0
 
LVL 1

Author Comment

by:drakuli
ID: 11909839
guys, can you please tell me how to get a sample code for this?
0
 
LVL 1

Author Comment

by:drakuli
ID: 12004403
Well, since it seemed that no one interested to further answer my question, I'll close this question in 4 days.
0
 
LVL 3

Assisted Solution

by:fatlad
fatlad earned 1000 total points
ID: 12004526
0
 
LVL 1

Author Comment

by:drakuli
ID: 12013114
Thanx for everyone here. Exploitedj gave me the logic and fatlad gave me the sample code. So I think both of you deserve the points. Thanx guys.
0

Featured Post

Ready for your healthcare security check-up?

In the past few years, healthcare organizations have become a prime target for advanced attacks. Does your organization have what it needs to defend itself? Schedule your healthcare security check-up today and download our free Healthcare Security Resource Kit today!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

With the evolution of technology, we have finally reached a point where it is possible to have home automation features like having your thermostat turn up and door lock itself when you leave, as well as a complete home security system. This is a st…
Let's take a look into the basics of ransomware—how it spreads, how it can hurt us, and why a disaster recovery plan is important.
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…

926 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question