CHAPTER 3. Digital Carriers of Steganography

Size: px
Start display at page:

Download "CHAPTER 3. Digital Carriers of Steganography"

Transcription

1 CHAPTER 3 Digital Carriers of Steganography 3.1 Introduction It has been observed that all digital file formats can be used as digital carrier for steganography, but the formats those are with a high degree of redundancy are more suitable since the redundant bits can be replaced with secret information without the embedded information being perceivable. The redundant bits of an object are those bits that can thus be altered without the alternation being detected easily (Anderson and Petitcolas, 1998). Image, Text, Audio, Video and Network Protocol often have redundant data present in their binary representation and comply with the requirement of steganography. Thus, these file formats can be used as carrier of steganographic data as shown in figure 3.1. Steganography Text Protocol Audio Image Video Figure 3.1: Main categories of file formats used for steganography Each of these file format categories uses different techniques for hiding information based on the unique characteristics of the file format and the redundancy created in the digital representation of the file (Morkel et al., 2005). 28

2 3.2 Text Steganography In text based steganography data hiding takes place by introducing changes in the structure of the document without making a notable change in the concerned output. Text steganography is the art or process of hiding one text into another text for the purpose of secure communication so that the unauthorized user cannot get trace of the secret message. Text steganography methods are basically classified into three types which consist of subparts as shown in figure 3.2. Figure 3.2: Classification of Text Steganography techniques Format based Format based methods used physical text formatting of text as a place in which to hide information. They do not change any word or sentence, so it does not harm the value of the cover-text (Bhattacharyya et al., 2010). Format Based Method is of four types Line shifting method: In the line shifting method, the lines of the text are vertically shifted to some degree and information is hidden by creating a unique shape of the text (Shirali-Shahreza and Shirali-Shahreza, 2010). In a typical implementation, a line is moved up or down, while the line immediately above or below (or both) are left unmoved (Banerjee et al., 2011). The unmoved adjacent lines serve as reference locations in the decoding process. Though the human eye is particularly adapted at noticing deviations from uniformity, each vertical line can be shifted 1/300 inch up or 29

3 down and such changes less go unnoticed by human eye (Memon et al., 2008).. Word shifting method: In word shifting method, the horizontal alignment of some words are shifted by changing distances between words to embed information in the text and is acceptable for text where the distance between words is varied (Bhattacharyya et al., 2010). Readers accept a wide variation in text setting within a line and each horizontal words can be shifted 1/150 inch and such changes less go unnoticed by human eye (Brassil et al., 1999). In such process, a word is altered left or right, while the words immediately adjacent are left unmoved and these words serve as reference locations in the extracting process. Feature coding: In feature coding method, some of the features of the text are chosen and altered depending on the message to be inserted (Bhattacharyya et al., 2010). Such feature alterations can be a change to a character s height or its position within a given font relative to other characters. In such case document will have the same content and some character features are left unchanged to facilitate decoding process (Brassil et al., 1999). Feature coding method also involves the alterations of vertical lines of the individual characters and the length of those lines may be modified in a way that is imperceptible to the ordinary readers (Memon et al., 2008). White/null /open space: In the open spaces method, extra white/null spaces are added into the text of the cover message for hiding the secret message (Bhattacharyya et al., 2010). These whitespaces can be placed at the end of each line, at the end of each paragraph or sentence or between the words (Memon et al., 2008). This method can be implemented on any arbitrary text and does not raise attention of the reader (Bender et al., 1996). Although a little amount of data can be hidden in a document, this method can be applied to almost all kinds of text without revealing the existence of the hidden data (Banerjee et al., 2011). 30

4 3.2.2 Random and statistical generation methods Random and statistical generation methods are used to generate cover-text automatically according to the statistical properties of language (Bhattacharyya et al., 2010). This method use example grammars to produce cover-text in a certain natural language and is based on character sequences and words sequences. A probabilistic context-free grammar (PCFG) is used to generate word sequences by starting with the root node and recursively applying randomly chosen rules. The sentences are constructed according to the secret message to be hidden in it. The quality of the generated stego-message depends directly on the quality of the grammars used (Bhattacharyya et al., 2010). Another approach to character generation is to take the statistical properties of wordlength and letter frequency in order to create words (without lexical value) which will appear to have the same statistical properties as actual words in a given language (Shirali-Shahreza and Shirali-Shahreza, 2010). The hiding of information within word sequences, the actual dictionary items can be used to encode one or more bits of information per word using a codebook of mappings between lexical items and bit sequences, or words themselves can encode the hidden information (Banerjee et al., 2011) Linguistic method The final category is linguistic method which specifically considers the linguistic properties of generated and modified text, frequently uses linguistic structure as a place for hidden messages (Bennett, 2004). Linguistic steganography is defined as a technique of data hiding that embeds the secret message within texts based on some linguistic knowledge (Bhattacharyya et al., 2010). They are basically of two types: Semantic method: In the semantic method, the synonyms of certain words are used for hiding information in the text (Bhattacharyya et al., 2010). The synonym substitution may represent a single or multiple bit combination for the secret information. The semantic transformation method is the most sophisticated approach for linguistic steganography and perhaps impractical given the current state-of the- art for NLP technology (Bennett, 2004). 31

5 Syntactic method: In this approach the syntactic structure of the text is used to embed the secret message into text file. Syntactic method is a linguistic steganography method where some punctuation signs like comma (,) and fullstop (.) are placed in proper places in the document to embed data (Bhattacharyya et al., 2010; Memon et al., 2008). Syntactic method is based on the fact that a given sentence may be represented into various syntactic structures without any essential change in meaning. Syntactic methods include changing the diction and structure of text without significantly altering the meaning (Bender et al., 1996). 3.3 Network steganography Network steganography allows users to communicate secretly by embedding information within other messages and network control protocols used by common applications. This is possible because inserting hidden data into a chosen carrier remains unnoticeable for users not involved in steganographic communication (Handel and Sandford, 1996). Data hiding within network protocols were based on the discovery of covert channels and embedding took place in TCP/IP packets also in application layer protocols (Mazurczyk and Lubacz, 2010). Hidden communication network steganography utilizes network protocols and/or relationships between them as a secret message carrier. Handel and Sandford, (1996) described the existence of hidden channels within standard design of network protocols. The OSI model is a standard network model that is used for almost all the networks. In the OSI layers there are some places where secret information may be hidden. Some of the Network Steganography methods are as follows: Steganophony: Voice over IP (VoIP) is a real-time service, which enables users to make phone calls through data networks that use an IP protocol (Mazurczyk et al., 2011). A steganographic technique applied to VoIP traffic steganophony that involves information hiding techniques in any layer of the TCP/IP protocol-stack is proposed by Mazurczyk and Lubacz, (2010). According to them, for VoIP systems, four possible hidden communication 32

6 scenarios may be considered. In the first method, the sender and the receiver perform VoIP conversation while simultaneously exchanging secret messages. In the rest three methods only a part of the VoIP end-to-end path is used for hidden communication and thus the sender and/or receiver are unaware of the steganographic data exchange. TRANSTEG: Mazurczyk et al., (2011) presented a steganographic method for IP telephony called TranSteg (Transcoding Steganography) which is intended for a broad class of multimedia and real-time applications. The main idea of TranSteg is to find a codec that will result in a similar voice quality but smaller voice payload size than the originally selected with the least possible degradation in voice quality. Then, the voice stream is transcoded. At this step the original voice payload size is intentionally unaltered and the change of the codec is not indicated. Instead, after placing the transcoded voice payload, the remaining free space is filled with hidden data. LACK: In case of VoIP, when a packet does not reach the destination point or when it is delayed excessive amount of time, it is considered as packet lost and then discarded. This feature is used to create new steganographic technique called LACK (Lost Audio Packets Steganographic Method) (Mazurczyk and Szczypiorski, 2008). LACK is a hybrid steganographic method which modifies both packets and their time dependencies. Firstly, one packet is selected from the RTP stream and its voice payload is substituted with bits of the secret message (Mazurczyk and Lubacz, 2010). At the transmitter, some selected audio packets are intentionally delayed by a certain time before transmitting. If the delay of such packets at the receiver is considered excessive, the packets are discarded by a receiver which is not aware of the steganographic procedure. If the receiver knows about the hidden communication, then instead of deleting the packet the receiver extracts the payload. For unaware receivers the hidden data is invisible (Mazurczyk and Szczypiorski, 2008). Padding based Steganography: Padding can be found at any layer of the OSI model, but typically it is exploited for covert communications only in the data link, network and transport layers (Mazurczyk and Szczypiorski, 2008).According to Jankowski et al., (2010), Padding based Steganography is 33

7 the steganographic system that utilizes Ethernet (IEEE 802.3), ARP, TCP and other protocols and is designed for LANs only because it utilizes improper Ethernet frame padding in Ethernet. The method stated by them initiates by a process where each host willing to exchange secret messages should be able to locate and identify other hidden hosts. Due to incorrect handling of Ethernet frame padding a memory leakage occurs and is called Etherleak. Thus data is inserted in padding by Etherleak which is considered unlikely to contain any valuable information and does not pose serious threat to network security. However, it creates a perfect candidate for a carrier of the secret messages. SCTP Steganography: Steganographic methods may be applied to Stream Control Transmission Protocol (SCTP) which is a transport layer protocol and its main role is similar to both popular protocols Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) as stated by Fraczek et al., (2010). According to them, information hiding methods that have been proposed for TCP and UDP protocols may be utilized due to several similarities between these transport layer protocols and SCTP. It provides ensuring reliability and transport of messages with congestion control. SCTPspecific steganographic methods can be divided in three groups- methods that modify content of SCTP packets, methods that modify how SCTP packets are exchanged and methods that modify both content of SCTP and the way they are exchanged i.e. hybrid methods. Multi-Level Steganography: Fraczek et al., (2012) proposed Multi-Level Steganography which is based on two steganographic methods. First, the upper-level method uses covert traffic as a secret data carrier. The second, the lower-level method, uses the way the upper-level method operates as a carrier. The indirect carriers for lower-level methods are still packets from covert communication, but the direct carrier is another (upper-level) method. In MLS the bandwidth of the lower-level method is a fraction of the bandwidth of the upper-level method. Also, the lower-level method is potentially harder to detect than the upper-level one. It results from the fact that the lower-level method functioning entirely depends on upper-level one. Thus, the adversary has to detect the upper-level method first in order to look for the lower-level one. 34

8 3.4 Audio Steganography Steganography can be applied to audio files. Audio files may be modified in such a way that they contain hidden information in such a way that it is difficult to remove the hidden data without destroying the original signal. Audio steganography takes advantage of the psycho acoustical masking phenomenon of the human auditory system (HAS) (Dutta et al., 2009). The HAS perceives the additive random noise and also the perturbations in a sound file can also be detected. While the HAS have a large dynamic range, it has a fairly small differential range. As a result, loud sounds tend to mask out quiet sounds. And there are also some distortions that are so common that the HAS ignores them Least significant bit encoding Least significant bit (LSB) coding is the simplest and popular way to embed information in a digital audio file that replaces the least significant bit of the cover audio file to hide a sequence of bytes containing the hidden data (Saroha and Singh, 2010). The technique doesn't cause significant quality degradation in audio and allows for a large amount of data to be encoded (Jayaram et al., 2011). In LSB coding, one LSB of the audio file is replaced with one bit of the message. In some implementations of such coding more LSBs of a sample are replaced with message bits. This increases the amount of data that can be encoded but also increases the amount of resulting noise in the audio file as well. There is also disadvantage associated with the use of methods like LSB coding. If a sound file embedded with a secret message using LSB coding was resampled, the embedded information would be lost (Saroha and Singh, 2010) Phase coding The phase coding method works by substituting the phase of an initial audio segment with a reference phase that represents the data (Jayaram et al., 2011). The phase of subsequent segments is adjusted in order to preserve the relative phase between segments (Malviya et al., 2012). Rather than introducing perturbations, the technique encodes the message bits as phase shifts in the phase spectrum of a digital signal, achieving an inaudible encoding in terms of signal-to-perceived noise ratio (Saroha 35

9 and Singh, 2010). In such coding data hiding starts by breaking the original sound signal into smaller segments whose lengths equal the size of the message to be encoded and a Discrete Fourier Transform (DFT) is applied to each segment to create a matrix of the phases and Fourier transform magnitudes (Dutta et al., 2009). Phase differences between adjacent segments are calculated and phase shifts between consecutive segments are used to embed secret data where the absolute phases of the segments can be changed but the relative phase differences between adjacent segments must be preserved (Jayaram et al., 2011). Then a new phase matrix is created using the new phase of the first segment and the original phase differences. Using the new phase matrix and original magnitude matrix, the sound signal is reconstructed by applying the inverse DFT and then concatenating the sound segments back together (Malviya et al., 2012) Parity coding One of the prior works in audio data hiding technique is parity coding technique. Instead of breaking a signal down into individual samples, the parity coding method breaks a signal down into separate regions of samples and encodes each bit from the secret message in a sample region's parity bit (Malviya et al., 2012). If the parity bit of a selected region does not match the secret bit to be encoded, the process inverts the LSB of one of the samples in the region (Dutta et al., 2009). Parity files are created to accompany data files, and are used to preserve data integrity and assist in data recovery. Here a group of 'parity files' are built that record the structure of the files to be protected. Later, if any of the protected files are lost, the parity files can be used to re-create the missing files. The disadvantage of the method is that the attackers can still find the pattern to break or remove the information from the carrier media Spread spectrum In audio steganography, the basic spread spectrum (SS) method attempts to spread secret information across the frequency spectrum of the audio signal which is similar to a system which uses an implementation of the LSB that spreads the message bits over the entire sound file (Jayaram et al., 2011). However, unlike LSB coding, the Spread Spectrum method spreads the secret information over the frequency spectrum 36

10 of the sound file using a code which is independent of the actual signal (Saroha and Singh, 2010). As a result, the final signal occupies a bandwidth which is more than what is actually required for transmission. The Spread Spectrum can show better performance in some areas compared to LSB coding, phase coding, and parity coding techniques in that it offers a moderate data transmission rate and high level of robustness against removal techniques (Saroha and Singh, 2010). However, the Spread Spectrum method has one main disadvantage that it can introduce noise into a sound file (Jayaram et al., 2011) Echo hiding In echo hiding, information is embedded in a sound file by introducing an echo into the discrete signal (Malviya et al., 2012). Like the spread spectrum method, it too provides advantages in that it allows for a high data transmission rate and provides superior robustness when compared to the noise inducing methods (Dutta et al., 2009). To hide the data successfully, three parameters of the echo are varied: amplitude, decay rate, and offset (delay time) from the original signal (Saroha and Singh, 2010). All three parameters are set below the human hearing threshold so that the echo is not easily resolved. In addition, offset is varied to represent the binary message to be encoded. If only one echo was produced from the original signal, only one bit of information could be encoded (Jayaram et al., 2011). Therefore, the original signal is broken down into blocks before the encoding process begins. Once the encoding process is completed, the blocks are concatenated back together to create the final signal (Malviya et al., 2012). 3.5 Image steganography In the domain of digital images many different image file formats exist. For these different image file formats, different steganographic algorithms exist. Image steganography is about exploiting the limited powers of the human visual system (HVS). Images are the most popular and useful cover image for steganography. Image steganography is basically divided into two categories: Steganography in the Image Spatial Domain and Frequency Domain. 37

11 3.5.1 Spatial domain based Spatial domain based steganographic method involves modification of the secret data in the spatial domain of the cover image, which is the embedding of the Least Significant Bits (LSBs).This method is based on the fact that the least significant bits of an image can be considered as random noise and thus they do not cause any changes to any modifications on the image Frequency domain based In the frequency domain cover images are transformed using a frequency-oriented mechanism such as discrete cosine transform (DCT), discrete wavelet transform (DWT) or similar mechanisms, after which the secret messages can be combined with the coefficients in the frequency-form images to achieve embedding. Frequency Domain are also known as transform domain. As this thesis is concentrated on image based methods a more detailed study of the image based methods is done in Chapter Video steganography A digital video is basically collection of images and audio, thus most of the steganographic techniques related to images and audio can be applied to video files too. Data hiding in videos is similar to that of data hiding in images, apart from information is hidden in each frame of the video (Bhaumik et al., 2009). The great advantages of video are the large amount of data that can be hidden inside and the fact that it is a moving stream of images and sounds. Therefore, any small but otherwise noticeable distortions might go by unobserved by humans because of the continuous flow of information. In video steganography the cover video is then broken down into frames and the secret data is embedded in these frames. The size of the message does not matter in video steganography as the message can be embedded in multiple frames. Although video based steganography can afford large volume of secret data, but the main problem is the size of such file and also the time computation is too high in such method. According to the working domain, video steganography techniques 38

12 are classified into): Spatial domain, Frequency domain and Format-specific (Jayamalar and Radha, 2010) Spatial domain The spatial domain techniques embed the secret data by modifying the pixel values of the host video directly. Least Significant Bit (LSB) method is the common and most simple approach for embedding information in a cover video and is used most frequently for data hiding (Chae and Manjunath, 1999). This method hides the secret message directly into the least significant bit of each color channel of the host video and thus a large amount of data can be hidden into the video file. This technique is most-straight forward method and uses the entire cover image to embed the secret message (Bhaumik et al., 2009). In spatial domain, it is possible to hide a significant amount of information in the covert file, by using the LSB of each color channel to carry the secret information (Swathi and Jilani, 2012). After concealing data in multiple frames of the carrier video, they are grouped together to form a stego video which to be used as normal sequence of streaming (Hanafy et al., 2008). The main advantage of the LSB coding method is a very high data hiding channel bit rate and a low computational complexity. With such a small variation in the colors of the video image it would be very difficult for the human eye to discern the difference thus providing high robustness to the system (Chae and Manjunath, 1999). In case of LSB method an attack that is set on a pixel to pixel basis can fully uncover the secret message, which is the major drawback of the system Frequency domain In frequency domain, host video is transformed to frequency components by transformation techniques and then messages are embedded in some or all of the transformed coefficients (Jayamalar and Radha, 2010). Embedding may be bit level or in block level. In frequency domain technique, the message is embedded distributively in overall domain of an original data. In this domain, DCT alters values of certain parts of the images by rounding them up. The digital video is composed of frames and the host frame is transformed to the DCT domain and each block of 8x8 host frame pixels is quantized by scaling the DCT coefficients using the quantization matrix (Bhaumik et al., 2009). The secret bits are then replaced with the bits of the 39

13 texture components of quantized DCT coefficients to form a fused block of DCT coefficients. The fused coefficients are then transformed inverse to produce an embedded frame. According to Chae and Manjunath, (1999) the human visual system is more sensitive to the changes in low frequency regions than in highly textured regions and so, insertions in the textured regions are less likely to result in visible distortions compared to less textured regions Format specific Techniques based on MPEG-2 and -4 have been proposed that involved modification for high frequency DCT coefficient manipulation and DCT block classification. Video steganography techniques that use MPEG-1, -2 and -4 coding structures as primitive components are primarily motivated by the goal of integrating data hiding and compression to reduce overall real-time video processing complexity (Morkel et al., 2005). In MPEG-4, video object (VO) is an area of the video scene and an instance of a VO at a particular point in time is a video object plane (VOP) (Vassaux et al., 2002). A compressed video stream is mainly composed of DCT coefficients, motion vectors, and other information (Mansouri and Khademi, 2009). Video compression is used to reduce redundancy in video file and operates on square-shaped groups of neighboring pixels, often called macro blocks. These pixel groups or blocks of pixels are compared from one frame to the next and the video compression code sends only the differences within those blocks. Data embedding can take place in DCT coefficients and motion vectors (Mansouri and Khademi, 2009). Data can be embedded in the high or low textured area of DCT Coefficients of the VOP. In case of motion vectors embedding of secret data takes place in horizontal and vertical components of motion vector of the VOP. 40

A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach

A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach www.ijcsi.org 402 A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach Gunjan Nehru 1, Puja Dhar 2 1 Department of Information Technology, IEC-Group of Institutions

More information

Random Image Embedded in Videos using LSB Insertion Algorithm

Random Image Embedded in Videos using LSB Insertion Algorithm Random Image Embedded in Videos using LSB Insertion Algorithm K.Parvathi Divya 1, K.Mahesh 2 Research Scholar 1, * Associate Professor 2 Department of Computer Science and Engg, Alagappa university, Karaikudi.

More information

Survey paper - Audio-Video Steganography Using Anti Forensics Technique

Survey paper - Audio-Video Steganography Using Anti Forensics Technique Survey paper - Audio-Video Steganography Using Anti Forensics Technique Ms. V.Sarangpure 1 ; Mrs. R. B. Talmale 2 ;Ms. M. Domke 3 1 Final Year M. Tech (CSE), Tulsiramji Gaikwad Patil College of Engineering

More information

Hiding Data in Wave Files

Hiding Data in Wave Files Hiding Data in Wave Files Pushpa Aigal Department of Computer Science, Shivaji University, Kolhapur, Maharashtra 416004. Pramod Vasambekar Department of Computer Science, Shivaji University, Kolhapur,

More information

Digital Image Steganography Techniques: Case Study. Karnataka, India.

Digital Image Steganography Techniques: Case Study. Karnataka, India. ISSN: 2320 8791 (Impact Factor: 1.479) Digital Image Steganography Techniques: Case Study Santosh Kumar.S 1, Archana.M 2 1 Department of Electronicsand Communication Engineering, Sri Venkateshwara College

More information

Secret Communication through Audio for Defense Application

Secret Communication through Audio for Defense Application Secret Communication through Audio for Defense Application A.Nageshwar Rao Maduguri Sudhir R.Venkatesh Abstract: A steganographic method of embedding textual information in an audio file is presented in

More information

A New Approach to Compressed Image Steganography Using Wavelet Transform

A New Approach to Compressed Image Steganography Using Wavelet Transform IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 5, Ver. III (Sep. Oct. 2015), PP 53-59 www.iosrjournals.org A New Approach to Compressed Image Steganography

More information

Networking Applications

Networking Applications Networking Dr. Ayman A. Abdel-Hamid College of Computing and Information Technology Arab Academy for Science & Technology and Maritime Transport Multimedia Multimedia 1 Outline Audio and Video Services

More information

A NOVEL METHOD FOR HIDING INFORMATION

A NOVEL METHOD FOR HIDING INFORMATION A NOVEL METHOD FOR HIDING INFORMATION Samer Thaaban Abaas Al-Shibley Education College, Kufa University samir-alshebly@uokufa.edu.iq Abstract In this paper, we introduce a new method to hide information

More information

CODING METHOD FOR EMBEDDING AUDIO IN VIDEO STREAM. Harri Sorokin, Jari Koivusaari, Moncef Gabbouj, and Jarmo Takala

CODING METHOD FOR EMBEDDING AUDIO IN VIDEO STREAM. Harri Sorokin, Jari Koivusaari, Moncef Gabbouj, and Jarmo Takala CODING METHOD FOR EMBEDDING AUDIO IN VIDEO STREAM Harri Sorokin, Jari Koivusaari, Moncef Gabbouj, and Jarmo Takala Tampere University of Technology Korkeakoulunkatu 1, 720 Tampere, Finland ABSTRACT In

More information

ReLACK: A Reliable VoIP Steganography Approach

ReLACK: A Reliable VoIP Steganography Approach 2011 Fifth International Conference on Secure Software Integration and Reliability Improvement ReLACK: A Reliable VoIP Steganography Approach Mohammad Hamdaqa, Ladan Tahvildari Software Technologies Applied

More information

Perceptual Coding. Lossless vs. lossy compression Perceptual models Selecting info to eliminate Quantization and entropy encoding

Perceptual Coding. Lossless vs. lossy compression Perceptual models Selecting info to eliminate Quantization and entropy encoding Perceptual Coding Lossless vs. lossy compression Perceptual models Selecting info to eliminate Quantization and entropy encoding Part II wrap up 6.082 Fall 2006 Perceptual Coding, Slide 1 Lossless vs.

More information

A Review of Approaches for Steganography

A Review of Approaches for Steganography International Journal of Computer Science and Engineering Open Access Review Paper Volume-2, Issue-5 E-ISSN: 2347-2693 A Review of Approaches for Steganography Komal Arora 1* and Geetanjali Gandhi 2 1*,2

More information

CHAPTER 3 DIFFERENT DOMAINS OF WATERMARKING. domain. In spatial domain the watermark bits directly added to the pixels of the cover

CHAPTER 3 DIFFERENT DOMAINS OF WATERMARKING. domain. In spatial domain the watermark bits directly added to the pixels of the cover 38 CHAPTER 3 DIFFERENT DOMAINS OF WATERMARKING Digital image watermarking can be done in both spatial domain and transform domain. In spatial domain the watermark bits directly added to the pixels of the

More information

Data Hiding in Video

Data Hiding in Video Data Hiding in Video J. J. Chae and B. S. Manjunath Department of Electrical and Computer Engineering University of California, Santa Barbara, CA 9316-956 Email: chaejj, manj@iplab.ece.ucsb.edu Abstract

More information

CHAPTER 6. LSB based data hiding with double Encryption. 6.1 Introduction

CHAPTER 6. LSB based data hiding with double Encryption. 6.1 Introduction CHAPTER 6 LSB based data hiding with double Encryption 6.1 Introduction In image steganography, the amount of secret data that can be embedded depends on the method and the cover-image as capacity limitation

More information

OTP-Steg. One-Time Pad Image Steganography Using OTP-Steg V.1.0 Software October 2015 Dr. Michael J. Pelosi

OTP-Steg. One-Time Pad Image Steganography Using OTP-Steg V.1.0 Software October 2015 Dr. Michael J. Pelosi OTP-Steg One-Time Pad Image Steganography Using OTP-Steg V.1.0 Software October 2015 Dr. Michael J. Pelosi What is Steganography? Steganography literally means covered writing Encompasses methods of transmitting

More information

Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation

Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation , 2009, 5, 363-370 doi:10.4236/ijcns.2009.25040 Published Online August 2009 (http://www.scirp.org/journal/ijcns/). Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation

More information

A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and MAC Techniques

A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and MAC Techniques Bashar S. Mahdi Alia K. Abdul Hassan Department of Computer Science, University of Technology, Baghdad, Iraq A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and

More information

Bit-Plane Decomposition Steganography Using Wavelet Compressed Video

Bit-Plane Decomposition Steganography Using Wavelet Compressed Video Bit-Plane Decomposition Steganography Using Wavelet Compressed Video Tomonori Furuta, Hideki Noda, Michiharu Niimi, Eiji Kawaguchi Kyushu Institute of Technology, Dept. of Electrical, Electronic and Computer

More information

Image Steganography (cont.)

Image Steganography (cont.) Image Steganography (cont.) 2.2) Image Steganography: Use of Discrete Cosine Transform (DCT) DCT is one of key components of JPEG compression JPEG algorithm: (1) algorithm is split in 8x8 pixel squares

More information

Audio Contents Protection using Invisible Frequency Band Hiding Based on Mel Feature Space Detection: A Review

Audio Contents Protection using Invisible Frequency Band Hiding Based on Mel Feature Space Detection: A Review Journal Science ISSN: 39-7157, ISSN: 39-7157, 1 015 015 Audio Contents Protection using Invisible Frequency Band Hiding Based on Mel Feature Space Detection: A Review Shefali Rani1, Yogesh Kumar 1 (M.Tech

More information

A NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO

A NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO International journal of computer science & information Technology (IJCSIT) Vol., No.5, October A NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO Pranab Kumar Dhar *, Mohammad

More information

Image Steganography Technique By Using Braille Method of Blind People (LSBraille)

Image Steganography Technique By Using Braille Method of Blind People (LSBraille) Image Steganography Technique By Using Braille Method of Blind People (LSBraille) Abdelmgeid Amin Ali Associate Professor, Dept. of Computer Science Faculty of Science, Al Minia University Al Minia, Egypt

More information

An Analysis of Various Techniques in Audio Steganography

An Analysis of Various Techniques in Audio Steganography An Analysis of Various Techniques in Audio Steganography B.Ramapriya 1, K.Bhuvanasundari 2, D.Bharathi 3 Assistant Professor, Dept. of Computer Science, Sri Akilandeswari Women s College, Wandiwash, Tamil

More information

A Performance of Embedding Process for Text Steganography Method

A Performance of Embedding Process for Text Steganography Method A Performance of Embedding Process for Text Steganography Method BAHARUDIN OSMAN 1, ROSHIDI DIN 1, TUAN ZALIZAM TUAN MUDA 2, MOHD. NIZAM OMAR 1, School of Computing 1, School of Multimedia Technology and

More information

Steganography: Hiding Data In Plain Sight. Ryan Gibson

Steganography: Hiding Data In Plain Sight. Ryan Gibson Steganography: Hiding Data In Plain Sight Ryan Gibson What Is Steganography? The practice of concealing messages or information within other nonsecret text or data. Comes from the Greek words steganos

More information

Robust DWT Based Technique for Digital Watermarking

Robust DWT Based Technique for Digital Watermarking Robust DWT Based Technique for Digital Watermarking Mamta Jain Department of Electronics & Communication Institute of Engineering & Technology Alwar er.mamtajain@gmail.com Abstract Hiding the information

More information

Video Compression An Introduction

Video Compression An Introduction Video Compression An Introduction The increasing demand to incorporate video data into telecommunications services, the corporate environment, the entertainment industry, and even at home has made digital

More information

Image and Video Watermarking

Image and Video Watermarking Telecommunications Seminar WS 1998 Data Hiding, Digital Watermarking and Secure Communications Image and Video Watermarking Herbert Buchner University of Erlangen-Nuremberg 16.12.1998 Outline 1. Introduction:

More information

EFFECTS ON QUALITY IN AUDIO STEGANOGRAPHY HO MAN YEN

EFFECTS ON QUALITY IN AUDIO STEGANOGRAPHY HO MAN YEN PERPUSTAKAAN UMP 111111111111111111111111111111111111111111111111 00001 03237 EFFECTS ON QUALITY IN AUDIO STEGANOGRAPHY HO MAN YEN Thesis submitted in fulfillment of the requirement of the award of Degree

More information

STEGANOGRAPHY: THE ART OF COVERT COMMUNICATION

STEGANOGRAPHY: THE ART OF COVERT COMMUNICATION Journal homepage: www.mjret.in STEGANOGRAPHY: THE ART OF COVERT COMMUNICATION Sudhanshi Sharma 1, Umesh Kumar 2 Computer Engineering, Govt. Mahila Engineering College, Ajmer, India 1 sudhanshisharma91@gmail.com,

More information

A Novel Approach for Hiding Encrypted Data in Image, Audio and Video using Steganography

A Novel Approach for Hiding Encrypted Data in Image, Audio and Video using Steganography A Novel Approach for Hiding Encrypted Data in Image, Audio and Video using Steganography V. Lokeswara Reddy Associate Professor, Department of CSE, K.S.R.M. College of Engg., Kadapa, Y.S.R. Dist., A.P.(INDIA)

More information

Perceptual coding. A psychoacoustic model is used to identify those signals that are influenced by both these effects.

Perceptual coding. A psychoacoustic model is used to identify those signals that are influenced by both these effects. Perceptual coding Both LPC and CELP are used primarily for telephony applications and hence the compression of a speech signal. Perceptual encoders, however, have been designed for the compression of general

More information

Outline Introduction MPEG-2 MPEG-4. Video Compression. Introduction to MPEG. Prof. Pratikgiri Goswami

Outline Introduction MPEG-2 MPEG-4. Video Compression. Introduction to MPEG. Prof. Pratikgiri Goswami to MPEG Prof. Pratikgiri Goswami Electronics & Communication Department, Shree Swami Atmanand Saraswati Institute of Technology, Surat. Outline of Topics 1 2 Coding 3 Video Object Representation Outline

More information

Implementation of Random Byte Hiding algorithm in Video Steganography

Implementation of Random Byte Hiding algorithm in Video Steganography Implementation of Random Byte Hiding algorithm in Video Steganography S.Aswath 1, K.Akshara 2, P.Pavithra 2, D.S.Abinaya 2 Asssisant Professor 1, Student 2 (IV Year) Department of Electronics and Communication

More information

Webpage: Volume 4, Issue V, May 2016 ISSN

Webpage:   Volume 4, Issue V, May 2016 ISSN EMBEDDING & EXTRACTION OF POWER DATA INTO A AUDIO FILE USING MODIFIED DIRECT SEQUENCE SPREAD SPECTRUM TECHNIQUE Vijeta Pandey 1, Vikas Verma 2, Gourav Sharma 3 1,M.Tech Student, Electrical Engineering

More information

An introduction to steganography methods

An introduction to steganography methods World Applied Programming, Vol (1), No (3), August 2011. 191-195 ISSN: 2222-2510 2011 WAP journal. www.waprogramming.com An introduction to steganography methods Masoud Nosrati * minibigs_m@yahoo.co.uk

More information

SPREAD SPECTRUM AUDIO WATERMARKING SCHEME BASED ON PSYCHOACOUSTIC MODEL

SPREAD SPECTRUM AUDIO WATERMARKING SCHEME BASED ON PSYCHOACOUSTIC MODEL SPREAD SPECTRUM WATERMARKING SCHEME BASED ON PSYCHOACOUSTIC MODEL 1 Yüksel Tokur 2 Ergun Erçelebi e-mail: tokur@gantep.edu.tr e-mail: ercelebi@gantep.edu.tr 1 Gaziantep University, MYO, 27310, Gaziantep,

More information

Application of Data Hiding in Audio-Video Using Advance Algorithm

Application of Data Hiding in Audio-Video Using Advance Algorithm Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 5.258 IJCSMC,

More information

Audio-coding standards

Audio-coding standards Audio-coding standards The goal is to provide CD-quality audio over telecommunications networks. Almost all CD audio coders are based on the so-called psychoacoustic model of the human auditory system.

More information

Filtering. -If we denote the original image as f(x,y), then the noisy image can be denoted as f(x,y)+n(x,y) where n(x,y) is a cosine function.

Filtering. -If we denote the original image as f(x,y), then the noisy image can be denoted as f(x,y)+n(x,y) where n(x,y) is a cosine function. Filtering -The image shown below has been generated by adding some noise in the form of a cosine function. -If we denote the original image as f(x,y), then the noisy image can be denoted as f(x,y)+n(x,y)

More information

Text Hiding In Multimedia By Huffman Encoding Algorithm Using Steganography

Text Hiding In Multimedia By Huffman Encoding Algorithm Using Steganography Text Hiding In Multimedia By Huffman Encoding Algorithm Using Steganography Madhavi V.Kale 1, Prof. Swati A.Patil 2 PG Student, Dept. Of CSE., G.H.Raisoni Institute Of Engineering And Management,Jalgaon

More information

AN OPTIMIZED TEXT STEGANOGRAPHY APPROACH USING DIFFERENTLY SPELT ENGLISH WORDS

AN OPTIMIZED TEXT STEGANOGRAPHY APPROACH USING DIFFERENTLY SPELT ENGLISH WORDS Volume 118 No. 16 2018, 653-666 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu AN OPTIMIZED TEXT STEGANOGRAPHY APPROACH USING DIFFERENTLY SPELT ENGLISH

More information

Complex Encryption Methodology Based On Two Level Encryption Technique

Complex Encryption Methodology Based On Two Level Encryption Technique Complex Encryption Methodology Based On Two Level Encryption Technique Samir Kumar Bandyopadhyay University of Calcutta India skb1@vsnl.com ABSTRACT: In this paper a complex encryption methodology has

More information

Both LPC and CELP are used primarily for telephony applications and hence the compression of a speech signal.

Both LPC and CELP are used primarily for telephony applications and hence the compression of a speech signal. Perceptual coding Both LPC and CELP are used primarily for telephony applications and hence the compression of a speech signal. Perceptual encoders, however, have been designed for the compression of general

More information

Clemens H. Cap Universität Rostock clemens.cap (at) uni-rostock (dot) de STEGANOGRAPHY. BaSoTI 2012, Tartu

Clemens H. Cap Universität Rostock clemens.cap (at) uni-rostock (dot) de STEGANOGRAPHY. BaSoTI 2012, Tartu Clemens H. Cap Universität Rostock clemens.cap (at) uni-rostock (dot) de STEGANOGRAPHY BaSoTI 2012, Tartu Question Definition Can we send hidden information? Steganography is the art of transmitting information

More information

Principles of Audio Coding

Principles of Audio Coding Principles of Audio Coding Topics today Introduction VOCODERS Psychoacoustics Equal-Loudness Curve Frequency Masking Temporal Masking (CSIT 410) 2 Introduction Speech compression algorithm focuses on exploiting

More information

STEGANOGRAPHY Question Definition. Historical Cases of Steganography. Can we send hidden information?

STEGANOGRAPHY Question Definition. Historical Cases of Steganography. Can we send hidden information? Clemens H. Cap Universität Rostock clemens.cap (at) uni rostock (dot) de STEGANOGRAPHY Question Definition Can we send hidden information? Steganography is the art of transmitting information but hiding

More information

The Steganography In Inactive Frames Of Voip

The Steganography In Inactive Frames Of Voip The Steganography In Inactive Frames Of Voip This paper describes a novel high-capacity steganography algorithm for embedding data in the inactive frames of low bit rate audio streams encoded by G.723.1

More information

Distributed Steganography

Distributed Steganography Distributed Steganography Background Steganography refers to any methodology used to hide a message (including text, sound, or picture) in a separate file. Most commonly text or an image is inserted into

More information

SPEECH WATERMARKING USING DISCRETE WAVELET TRANSFORM, DISCRETE COSINE TRANSFORM AND SINGULAR VALUE DECOMPOSITION

SPEECH WATERMARKING USING DISCRETE WAVELET TRANSFORM, DISCRETE COSINE TRANSFORM AND SINGULAR VALUE DECOMPOSITION SPEECH WATERMARKING USING DISCRETE WAVELET TRANSFORM, DISCRETE COSINE TRANSFORM AND SINGULAR VALUE DECOMPOSITION D. AMBIKA *, Research Scholar, Department of Computer Science, Avinashilingam Institute

More information

Introduction to LAN/WAN. Application Layer 4

Introduction to LAN/WAN. Application Layer 4 Introduction to LAN/WAN Application Layer 4 Multimedia Multimedia: Audio + video Human ear: 20Hz 20kHz, Dogs hear higher freqs DAC converts audio waves to digital E.g PCM uses 8-bit samples 8000 times

More information

CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM

CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM 74 CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM Many data embedding methods use procedures that in which the original image is distorted by quite a small

More information

Overview Of Techniques Of Stegnography On Various Media

Overview Of Techniques Of Stegnography On Various Media Overview Of Techniques Of Stegnography On Various Media Ms. Arpana Chaturvedi,, Jagannath International Management School, Vasant Kunj, Email: pcord.bca@jagannath.org Ms.Poonam Verma, Jagannath International

More information

DIGITAL TELEVISION 1. DIGITAL VIDEO FUNDAMENTALS

DIGITAL TELEVISION 1. DIGITAL VIDEO FUNDAMENTALS DIGITAL TELEVISION 1. DIGITAL VIDEO FUNDAMENTALS Television services in Europe currently broadcast video at a frame rate of 25 Hz. Each frame consists of two interlaced fields, giving a field rate of 50

More information

Research Article A Novel Steganalytic Algorithm based on III Level DWT with Energy as Feature

Research Article A Novel Steganalytic Algorithm based on III Level DWT with Energy as Feature Research Journal of Applied Sciences, Engineering and Technology 7(19): 4100-4105, 2014 DOI:10.19026/rjaset.7.773 ISSN: 2040-7459; e-issn: 2040-7467 2014 Maxwell Scientific Publication Corp. Submitted:

More information

EXPLORING ON STEGANOGRAPHY FOR LOW BIT RATE WAVELET BASED CODER IN IMAGE RETRIEVAL SYSTEM

EXPLORING ON STEGANOGRAPHY FOR LOW BIT RATE WAVELET BASED CODER IN IMAGE RETRIEVAL SYSTEM TENCON 2000 explore2 Page:1/6 11/08/00 EXPLORING ON STEGANOGRAPHY FOR LOW BIT RATE WAVELET BASED CODER IN IMAGE RETRIEVAL SYSTEM S. Areepongsa, N. Kaewkamnerd, Y. F. Syed, and K. R. Rao The University

More information

Jeff Hinson CS525, Spring 2010

Jeff Hinson CS525, Spring 2010 DIGITAL WATERMARKING Jeff Hinson CS525, Spring 2010 Outline Introduction Challenges Algorithms / Methods Detection Existing Programs Lessons Learned / Conclusion Questions Jeff Hinson CS525 Slide #1 Introduction

More information

DATA COMMUNICATION AND NETWORKS

DATA COMMUNICATION AND NETWORKS DATA COMMUNICATION AND NETWORKS A/L Guide TERAN SUBASINGHE Data Communication What is data communication? Data Communication is a process of exchanging data or information between two or more devices along

More information

Image Steganography Method Using Integer Wavelet Transform

Image Steganography Method Using Integer Wavelet Transform ISSN (Online) : 2319-8753 ISSN (Print) : 2347-6710 International Journal of Innovative Research in Science, Engineering and Technology Volume 3, Special Issue 3, March 2014 2014 International Conference

More information

Information and Communications Security: Encryption and Information Hiding

Information and Communications Security: Encryption and Information Hiding Short Course on Information and Communications Security: Encryption and Information Hiding Tuesday, 10 March Friday, 13 March, 2015 Lecture 10: Information Hiding Contents Covert Encryption Principles

More information

15 Data Compression 2014/9/21. Objectives After studying this chapter, the student should be able to: 15-1 LOSSLESS COMPRESSION

15 Data Compression 2014/9/21. Objectives After studying this chapter, the student should be able to: 15-1 LOSSLESS COMPRESSION 15 Data Compression Data compression implies sending or storing a smaller number of bits. Although many methods are used for this purpose, in general these methods can be divided into two broad categories:

More information

Fundamentals of Video Compression. Video Compression

Fundamentals of Video Compression. Video Compression Fundamentals of Video Compression Introduction to Digital Video Basic Compression Techniques Still Image Compression Techniques - JPEG Video Compression Introduction to Digital Video Video is a stream

More information

Reversible Data Hiding in Colour Images using AES Data Encryption System

Reversible Data Hiding in Colour Images using AES Data Encryption System Reversible Data Hiding in Colour Images using AES Data Encryption System M. Prem Anand 1, Y. Karthikeyan 2 1 Assistant Professor 2 M.E Student 1,2 Department of Electronics & Communication Engineering,

More information

OSI Layer OSI Name Units Implementation Description 7 Application Data PCs Network services such as file, print,

OSI Layer OSI Name Units Implementation Description 7 Application Data PCs Network services such as file, print, ANNEX B - Communications Protocol Overheads The OSI Model is a conceptual model that standardizes the functions of a telecommunication or computing system without regard of their underlying internal structure

More information

Review and Implementation of DWT based Scalable Video Coding with Scalable Motion Coding.

Review and Implementation of DWT based Scalable Video Coding with Scalable Motion Coding. Project Title: Review and Implementation of DWT based Scalable Video Coding with Scalable Motion Coding. Midterm Report CS 584 Multimedia Communications Submitted by: Syed Jawwad Bukhari 2004-03-0028 About

More information

CS 335 Graphics and Multimedia. Image Compression

CS 335 Graphics and Multimedia. Image Compression CS 335 Graphics and Multimedia Image Compression CCITT Image Storage and Compression Group 3: Huffman-type encoding for binary (bilevel) data: FAX Group 4: Entropy encoding without error checks of group

More information

A Revisit to LSB Substitution Based Data Hiding for Embedding More Information

A Revisit to LSB Substitution Based Data Hiding for Embedding More Information A Revisit to LSB Substitution Based Data Hiding for Embedding More Information Yanjun Liu 1,, Chin-Chen Chang 1, and Tzu-Yi Chien 2 1 Department of Information Engineering and Computer Science, Feng Chia

More information

Enhancing the Image Compression Rate Using Steganography

Enhancing the Image Compression Rate Using Steganography The International Journal Of Engineering And Science (IJES) Volume 3 Issue 2 Pages 16-21 2014 ISSN(e): 2319 1813 ISSN(p): 2319 1805 Enhancing the Image Compression Rate Using Steganography 1, Archana Parkhe,

More information

Request for Comments: 5109 December 2007 Obsoletes: 2733, 3009 Category: Standards Track. RTP Payload Format for Generic Forward Error Correction

Request for Comments: 5109 December 2007 Obsoletes: 2733, 3009 Category: Standards Track. RTP Payload Format for Generic Forward Error Correction Network Working Group A. Li, Ed. Request for Comments: 5109 December 2007 Obsoletes: 2733, 3009 Category: Standards Track RTP Payload Format for Generic Forward Error Correction Status of This Memo This

More information

A Hybrid Method of Hiding The Text Information Using Stegnography

A Hybrid Method of Hiding The Text Information Using Stegnography A Hybrid Method of Hiding The Text Information Using Stegnography M.Grace Vennice, M.Swapna, MD.Ahmad Ali & T.Dharma Reddy CSE Dept, CMRCET, Hyderabad, India. E-mail : grace_vennice@yahoo.co.in, swapna_manthena2007@yahoo.com

More information

A Reversible Data Hiding Scheme for BTC- Compressed Images

A Reversible Data Hiding Scheme for BTC- Compressed Images IJACSA International Journal of Advanced Computer Science and Applications, A Reversible Data Hiding Scheme for BTC- Compressed Images Ching-Chiuan Lin Shih-Chieh Chen Department of Multimedia and Game

More information

Protocol Data Hiding. By Chet Hosmer Article Posted: March 06, 2012

Protocol Data Hiding. By Chet Hosmer Article Posted: March 06, 2012 Protocol Data Hiding By Chet Hosmer Article Posted: March 06, 2012 On Cinco de Mayo in 1997, which happened to be the first Monday in May that year, the Hacker Publication First Monday included an article

More information

AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS

AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS G Prakash 1,TVS Gowtham Prasad 2, T.Ravi Kumar Naidu 3 1MTech(DECS) student, Department of ECE, sree vidyanikethan

More information

ET4254 Communications and Networking 1

ET4254 Communications and Networking 1 Topic 2 Aims:- Communications System Model and Concepts Protocols and Architecture Analog and Digital Signal Concepts Frequency Spectrum and Bandwidth 1 A Communications Model 2 Communications Tasks Transmission

More information

ITEC310 Computer Networks II

ITEC310 Computer Networks II ITEC310 Computer Networks II Chapter 29 Multimedia Department of Information Technology Eastern Mediterranean University 2/75 Objectives After completing this chapter you should be able to do the following:

More information

Metamorphosis of High Capacity Steganography Schemes

Metamorphosis of High Capacity Steganography Schemes 2012 International Conference on Computer Networks and Communication Systems (CNCS 2012) IPCSIT vol.35(2012) (2012) IACSIT Press, Singapore Metamorphosis of High Capacity Steganography Schemes 1 Shami

More information

ELL 788 Computational Perception & Cognition July November 2015

ELL 788 Computational Perception & Cognition July November 2015 ELL 788 Computational Perception & Cognition July November 2015 Module 11 Audio Engineering: Perceptual coding Coding and decoding Signal (analog) Encoder Code (Digital) Code (Digital) Decoder Signal (analog)

More information

Keywords Stegnography, stego-image, Diamond Encoding, DCT,stego-frame and stego video. BLOCK DIAGRAM

Keywords Stegnography, stego-image, Diamond Encoding, DCT,stego-frame and stego video. BLOCK DIAGRAM Volume 6, Issue 1, January 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Information

More information

Appendix 4. Audio coding algorithms

Appendix 4. Audio coding algorithms Appendix 4. Audio coding algorithms 1 Introduction The main application of audio compression systems is to obtain compact digital representations of high-quality (CD-quality) wideband audio signals. Typically

More information

Need For Protocol Architecture

Need For Protocol Architecture Chapter 2 CS420/520 Axel Krings Page 1 Need For Protocol Architecture E.g. File transfer Source must activate communications path or inform network of destination Source must check destination is prepared

More information

Hiding of Random Permutated Encrypted Text using LSB Steganography with Random Pixels Generator

Hiding of Random Permutated Encrypted Text using LSB Steganography with Random Pixels Generator Hiding of Random Permutated Encrypted Text using LSB Steganography with Random Pixels Generator Noor Kareem Jumaa Department of Computer Technology Engineering Al-Mansour University College, Iraq ABSTRACT

More information

SECRETLY CONCEALING MESSAGE USING ADVANCED IMAGE PROCESSING

SECRETLY CONCEALING MESSAGE USING ADVANCED IMAGE PROCESSING International Journal of Engineering Research ISSN: 2348-4039 & Management Technology May-2017 Volume- 4, Issue-3 Email: editor@ijermt.org www.ijermt.org SECRETLY CONCEALING MESSAGE USING ADVANCED IMAGE

More information

Data Hiding on Text Using Big-5 Code

Data Hiding on Text Using Big-5 Code Data Hiding on Text Using Big-5 Code Jun-Chou Chuang 1 and Yu-Chen Hu 2 1 Department of Computer Science and Communication Engineering Providence University 200 Chung-Chi Rd., Shalu, Taichung 43301, Republic

More information

Need For Protocol Architecture

Need For Protocol Architecture Chapter 2 CS420/520 Axel Krings Page 1 Need For Protocol Architecture E.g. File transfer Source must activate communications path or inform network of destination Source must check destination is prepared

More information

Index. 1. Motivation 2. Background 3. JPEG Compression The Discrete Cosine Transformation Quantization Coding 4. MPEG 5.

Index. 1. Motivation 2. Background 3. JPEG Compression The Discrete Cosine Transformation Quantization Coding 4. MPEG 5. Index 1. Motivation 2. Background 3. JPEG Compression The Discrete Cosine Transformation Quantization Coding 4. MPEG 5. Literature Lossy Compression Motivation To meet a given target bit-rate for storage

More information

Frequency Domain Watermarking: An Overview

Frequency Domain Watermarking: An Overview The International Arab Journal of Information Technology, Vol. 2, No. 1, January 2005 33 Frequency Domain Watermarking: An Overview Khaled Mahmoud, Sekharjit Datta, and James Flint Department of Electrical

More information

Fast Real-Time Hardware Engine for Multipoint Text Steganography

Fast Real-Time Hardware Engine for Multipoint Text Steganography Fast Real-Time Hardware Engine for Multipoint Text Steganography Ammar Odeh, Khaled Elleithy, and Miad Faezipour Dept. of Computer Science and Engineering University Of Bridgeport Bridgeport, CT 06604,

More information

ABSTRACT. that it avoids the tolls charged by ordinary telephone service

ABSTRACT. that it avoids the tolls charged by ordinary telephone service ABSTRACT VoIP (voice over IP - that is, voice delivered using the Internet Protocol) is a term used in IP telephony for a set of facilities for managing the delivery of voice information using the Internet

More information

A Robust Audio Steganographic Technique based on Phase Shifting and Psycho acoustic Persistence of Human Hearing Ability

A Robust Audio Steganographic Technique based on Phase Shifting and Psycho acoustic Persistence of Human Hearing Ability A Robust Audio Steganographic Technique based on Phase Shifting and Psycho acoustic Persistence of Human Hearing Ability Prof. Samir Kumar Bandyopadhyay, Senior Fellow of IEEE Department of Computer Science

More information

DIGITAL IMAGE HIDING ALGORITHM FOR SECRET COMMUNICATION

DIGITAL IMAGE HIDING ALGORITHM FOR SECRET COMMUNICATION DIGITAL IMAGE HIDING ALGORITHM FOR SECRET COMMUNICATION T.Punithavalli 1, S. Indhumathi 2, V.Karthika 3, R.Nandhini 4 1 Assistant professor, P.A.College of Engineering and Technology, pollachi 2 Student,

More information

UDP Lite for Real Time Multimedia Applications

UDP Lite for Real Time Multimedia Applications UDP Lite for Real Time Multimedia Applications Lars-Åke Larzon*, Mikael Degermark*, Stephen Pink* Extended Enterprise Laboratory HP Laboratories Bristol HPL-IRI-1999-001 April, 1999 E-mail: [11n,micke,steve]@cdt.luth.se

More information

CN1047 INTRODUCTION TO COMPUTER NETWORKING CHAPTER 6 OSI MODEL TRANSPORT LAYER

CN1047 INTRODUCTION TO COMPUTER NETWORKING CHAPTER 6 OSI MODEL TRANSPORT LAYER CN1047 INTRODUCTION TO COMPUTER NETWORKING CHAPTER 6 OSI MODEL TRANSPORT LAYER Transport Layer The Transport layer ensures the reliable arrival of messages and provides error checking mechanisms and data

More information

Audio-coding standards

Audio-coding standards Audio-coding standards The goal is to provide CD-quality audio over telecommunications networks. Almost all CD audio coders are based on the so-called psychoacoustic model of the human auditory system.

More information

Part 1 of 4. MARCH

Part 1 of 4. MARCH Presented by Brought to You by Part 1 of 4 MARCH 2004 www.securitysales.com A1 Part1of 4 Essentials of DIGITAL VIDEO COMPRESSION By Bob Wimmer Video Security Consultants cctvbob@aol.com AT A GLANCE Compression

More information

ITERATIVE HAAR-DWT BASED EFFICIENT IMAGE STEGANOGRAPHY

ITERATIVE HAAR-DWT BASED EFFICIENT IMAGE STEGANOGRAPHY ITERATIVE HAAR-DWT BASED EFFICIENT IMAGE STEGANOGRAPHY Aditi Singh *1, K S Venkatesh 2 and Vikas Patidar 3 Department of Electrical Engineering, Indian Institute of Technology Kanpur, Kanpur-208016, Uttar

More information

CSCD 443/533 Advanced Networks Fall 2017

CSCD 443/533 Advanced Networks Fall 2017 CSCD 443/533 Advanced Networks Fall 2017 Lecture 18 Compression of Video and Audio 1 Topics Compression technology Motivation Human attributes make it possible Audio Compression Video Compression Performance

More information

THE COMBINATION OF WATERMARKING ALGORITHMS FOR MP4 VIDEO

THE COMBINATION OF WATERMARKING ALGORITHMS FOR MP4 VIDEO Journal of Science and Technology 52 (4A) (2014) 180-189 THE COMBINATION OF WATERMARKING ALGORITHMS FOR MP4 VIDEO Thanh Tung Nguyen *, Chan Nam Ngo, Tran Khanh Dang Faculty of Computer Science and Engineering,

More information

Steganography: A Security Model for Open Communication

Steganography: A Security Model for Open Communication Volume: 04 Issue: 04 Pages:1690-1694 (2013) ISSN : 0975-0290 Steganography: A Security Model for Open Communication K. Chandra Sekhar, Department of Computer Applications,Madanapalle Institute of Technology

More information