Professional Documents
Culture Documents
Seminar Steganography
Seminar Steganography
TRACKING
VEENA AJAYAN
1 Introduction
2 Steganography
3 Steganography Under Various Media
4 Steganography In Sonar
Track-Before-Detect
Mesurement Model
5 Adaptive Steganography
6 Monte Carlo Simulation
7 Results
8 Conclusion
9 References
Sonar can have less environmental harm while still achieving its goal.
SONAR TRACKING
STEGANOGRAPHY IN TEXT
STEGANOGRAPHY IN IMAGES
STEGANOGRAPHY IN AUDIO
LOW-BIT ENCODING
PHASE CODING
TRACK-BEFORE-DETECT
The propagation attenuation and delayed by the round trip time of the
transmitted waveform, Rm(t) (Range), and the filtered noise, vm(t).
Figure: (a) Misaligned. (b) Partially aligned. (c) Aligned. (d) Misaligned sum.
(e) Partially aligned sum. (f) Aligned sum.
Information hiding techniques for audio and image files is least significant
bit (LSB) manipulation.
Figure: The striping pattern of zebras, while effective against its predator and
parasite, do not adapt to the environment, and are easily recognized by humans.
Figure: Octopus can blend into the environment with very high fidelity making it
very difficult for its predators to recognize it.
The parameters of the simulation are the source level (SL) at the
platform and the initial range to the target, Rinit.
tscan = 2Rmax/c.
The root mean square error (RMSE) of the estimated track is smaller
than the specified threshold - a successful target track detection.
Result is using all of the 1 s samples during the t tot observation time