Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Vladimir Banoci is active.

Publication


Featured researches published by Vladimir Banoci.


international conference radioelektronika | 2011

A novel method of image steganography in DWT domain

Vladimir Banoci; Gabriel Bugar; Dusan Levicky

In this paper, we present a novel steganographic method for embedding of secret data in still grayscale image. In order to provide large capacity of the secret data while maintaining good visual quality of stego-image, the embedding process is performed in transform domain of Discrete Wavelet transform (DWT) by modifying of transform coefficients in an appropriate manner. In addition, the proposed method do not require original image for successful extraction of the secret information. The experimental results show that the proposed method provides good capacity and excellent image quality.


international conference radioelektronika | 2009

Steganography systems by using CDMA techniques

Vladimir Banoci; Gabriel Bugar; Dusan Levicky

In this paper, we present a novel method called Code Book in steganography system based on CDMA (Code Division Multiple Access) techniques having regard to perceptibility of stego-image. These techniques and their variations are widely used in radio telecommunication systems. As it will be shown later, aptly imposed features of CDMA techniques are in consonance with imperatives claimed upon steganography systems.


international symposium elmar | 2014

A novel approach for image steganalysis

Gabriel Bugar; Vladimir Banoci; Martin Broda; Dusan Levicky

Since JPEG images have been widely used in our daily life, the steganalysis for JPEG images becomes very important and significant. The Article addresses steganalysis in static images based on DCT transformed region, able to recognize the most popular steganography algorithms occurring on the Internet. We propose a new steganalysis method, where statistical properties of the image are explored, regardless the embedding procedure employed. The feature set used for classification of images consists of 285 statistical features. Experimental results show that in comparing with the universal steganalysis method for JPEG stego images, our method improves detection of widely used steganographic method in detection process, which provides observable differences in investigation performance.


international conference radioelektronika | 2010

Information hiding using pseudo-random number sequences with error correction

Vladimir Banoci; Gabriel Bugar; Dusan Levicky

In this paper, we present a novel method of steganography system based on CDMA (Code Division Multiple Access) approach having regard to perceptibility of stego-image. Also additional extraction algorithms were designed due to enhancing of secret message decomposition. As it will be shown later, aptly imposed features of CDMA techniques are in consonance with imperatives claimed upon steganography systems.


international symposium elmar | 2014

Edwards curve addition and doubling formula analysis for effective parallel decomposition

Patrik Gallo; Dusan Levicky; Gabriel Bugar; Vladimir Banoci

The Elliptic Curve Cryptosystem is an emerging alternative for traditional Public-Key Cryptosystem like RSA, DSA and DH. It provides the highest strength-per-bit of any cryptosystem known today with smaller key sizes resulting in faster computations, lower power consumption and memory. It also provides a methodology for obtaining high-speed, efficient and scalable implementation of protocols for authentication. The objective is to give the reader an overview on efficient addition and doubling formulas of Edwards curves together with analysis and effective parallel decomposition of these formulas. Practical analysis is provided with implementation consideration.


international symposium elmar | 2014

Robust spread spectrum watermarking system in video

Vladimir Banoci; Gabriel Bugar; Martin Broda; Dusan Levicky

In this paper we propose robust watermarking schema for video files based on spread spectrum theory. The main concept relies on utilization of time as temporal dimension for spreading of watermark bits that are assigned to video frames. The second level spreading that is impartial to first level, uses different set of PN sequences within the video frames what allows to utilize multiple watermarking methods designed for still images simultaneously. Two dimensional spread spectrum watermarking framework allows acquiring a high level of robustness with desired imperceptibility of hidden watermark. Two independent embedding methods LSB and DCT were tested during embedding as representative techniques of different embedding domain. The presented results show that proposed watermarking schema is able to withstand intentional attacks. The proposed system is robust and adaptive to recent and newly developed embedding technique, which could provide a requisite of robustness and protection against copyright infringement.


international conference radioelektronika | 2012

Histogram secure steganography system in JPEG file based on modulus function

Vladimir Banoci; Gabriel Bugar; Dusan Levicky; Zita Klenovicova


international conference radioelektronika | 2013

Performance evaluation of feature-based steganalysis in steganography

Daniel Majercak; Vladimir Banoci; Martin Broda; Gabriel Bugar; Dusan Levicky


Archive | 2014

Universal Image Steganalytic Method

Vladimir Banoci; Dusan Levicky; Martin Broda; Gabriel Bugar


Proceedings ELMAR-2012 | 2012

A novel JPEG steganography method secure against histogram steganalysis

Dusan Levicky; Gabriel Bugar; Vladimir Banoci

Collaboration


Dive into the Vladimir Banoci's collaboration.

Top Co-Authors

Avatar

Dusan Levicky

Technical University of Košice

View shared research outputs
Top Co-Authors

Avatar

Gabriel Bugar

Technical University of Košice

View shared research outputs
Top Co-Authors

Avatar

Martin Broda

Technical University of Košice

View shared research outputs
Top Co-Authors

Avatar

Denis Dupak

Technical University of Košice

View shared research outputs
Top Co-Authors

Avatar

Patrik Gallo

Technical University of Košice

View shared research outputs
Top Co-Authors

Avatar

Z. Klenovicova

Technical University of Košice

View shared research outputs
Top Co-Authors

Avatar

Zita Klenovicova

Technical University of Košice

View shared research outputs
Researchain Logo
Decentralizing Knowledge