Vladimir Banoci
Technical University of Košice
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Vladimir Banoci.
international conference radioelektronika | 2011
Vladimir Banoci; Gabriel Bugar; Dusan Levicky
In this paper, we present a novel steganographic method for embedding of secret data in still grayscale image. In order to provide large capacity of the secret data while maintaining good visual quality of stego-image, the embedding process is performed in transform domain of Discrete Wavelet transform (DWT) by modifying of transform coefficients in an appropriate manner. In addition, the proposed method do not require original image for successful extraction of the secret information. The experimental results show that the proposed method provides good capacity and excellent image quality.
international conference radioelektronika | 2009
Vladimir Banoci; Gabriel Bugar; Dusan Levicky
In this paper, we present a novel method called Code Book in steganography system based on CDMA (Code Division Multiple Access) techniques having regard to perceptibility of stego-image. These techniques and their variations are widely used in radio telecommunication systems. As it will be shown later, aptly imposed features of CDMA techniques are in consonance with imperatives claimed upon steganography systems.
international symposium elmar | 2014
Gabriel Bugar; Vladimir Banoci; Martin Broda; Dusan Levicky
Since JPEG images have been widely used in our daily life, the steganalysis for JPEG images becomes very important and significant. The Article addresses steganalysis in static images based on DCT transformed region, able to recognize the most popular steganography algorithms occurring on the Internet. We propose a new steganalysis method, where statistical properties of the image are explored, regardless the embedding procedure employed. The feature set used for classification of images consists of 285 statistical features. Experimental results show that in comparing with the universal steganalysis method for JPEG stego images, our method improves detection of widely used steganographic method in detection process, which provides observable differences in investigation performance.
international conference radioelektronika | 2010
Vladimir Banoci; Gabriel Bugar; Dusan Levicky
In this paper, we present a novel method of steganography system based on CDMA (Code Division Multiple Access) approach having regard to perceptibility of stego-image. Also additional extraction algorithms were designed due to enhancing of secret message decomposition. As it will be shown later, aptly imposed features of CDMA techniques are in consonance with imperatives claimed upon steganography systems.
international symposium elmar | 2014
Patrik Gallo; Dusan Levicky; Gabriel Bugar; Vladimir Banoci
The Elliptic Curve Cryptosystem is an emerging alternative for traditional Public-Key Cryptosystem like RSA, DSA and DH. It provides the highest strength-per-bit of any cryptosystem known today with smaller key sizes resulting in faster computations, lower power consumption and memory. It also provides a methodology for obtaining high-speed, efficient and scalable implementation of protocols for authentication. The objective is to give the reader an overview on efficient addition and doubling formulas of Edwards curves together with analysis and effective parallel decomposition of these formulas. Practical analysis is provided with implementation consideration.
international symposium elmar | 2014
Vladimir Banoci; Gabriel Bugar; Martin Broda; Dusan Levicky
In this paper we propose robust watermarking schema for video files based on spread spectrum theory. The main concept relies on utilization of time as temporal dimension for spreading of watermark bits that are assigned to video frames. The second level spreading that is impartial to first level, uses different set of PN sequences within the video frames what allows to utilize multiple watermarking methods designed for still images simultaneously. Two dimensional spread spectrum watermarking framework allows acquiring a high level of robustness with desired imperceptibility of hidden watermark. Two independent embedding methods LSB and DCT were tested during embedding as representative techniques of different embedding domain. The presented results show that proposed watermarking schema is able to withstand intentional attacks. The proposed system is robust and adaptive to recent and newly developed embedding technique, which could provide a requisite of robustness and protection against copyright infringement.
international conference radioelektronika | 2012
Vladimir Banoci; Gabriel Bugar; Dusan Levicky; Zita Klenovicova
international conference radioelektronika | 2013
Daniel Majercak; Vladimir Banoci; Martin Broda; Gabriel Bugar; Dusan Levicky
Archive | 2014
Vladimir Banoci; Dusan Levicky; Martin Broda; Gabriel Bugar
Proceedings ELMAR-2012 | 2012
Dusan Levicky; Gabriel Bugar; Vladimir Banoci