NEURAL NETWORKS - A NEW DIMENSION IN DATA SECURITY
|
|
- Brian Simpson
- 6 years ago
- Views:
Transcription
1 NEURAL NETWORKS - A NEW DIMENSION IN DATA SECURITY 1. Introduction: New possibilities of digital imaging and data hiding open wide prospects in modern imaging science, content management and secure communications. However, despite the obvious advantages of digital data hiding technologies and their current progress, these developments carry inherent risks such as copyright violation, unauthorized prohibited usage and distribution of digital media, secret communications and network security violations.although the issues of robustness, visibility and capacity of digital data hiding technologies have received a lot of attention, their security aspect still remains an open and little studied problem. The security requirement is closely related to the stochastic visibility and unauthorized detection of hidden information and requires both new and careful study. New information-theoretic methods for blind stochastic detection of hidden data should be investigated. This aspect will have a great impact on robust digital watermarking, steganography,integrity control and tamper proofing (possibly even without embedded hidden data) and Internet/network security. 2.Related Research: An introduction to steganography and its application to digital images are available from [fig5]. Other, more robust, methods of hiding information in images include application of the transform domain that takes advantage of algorithms and coefficients from processing the image or its components to hide information. Transformations can be applied over the entire image [8] to blocks through out the image [fig9, fig10], or other variations. Many of these transformation techniques require use of the original, unmarked image to extract the watermark. In [fig11] a number of papers propose techniques that do not require using the original to extract the watermark [fig12]. A method that proposes a combination of these techniques from LSB insertion to spread spectrum disbursement of data is described in [fig9]. A survey of transform domain techniques can be found in [fig13]. grabs. One common drawback of virtually all current data embedding methods is the fact that the original image is inevitably distorted due to data embedding itself. This distortion typically cannot be removed completely due to quantization, bit-replacement, or truncation at the grayscales 0 and 255 [fig6]. Another unconventional approach in which we consider piggy-backing the color information on the luminance component of an image for improved color image coding[fig1]. The new technique essentially transforms a given color image into the YIQ color space where the chrominance information is subsampled and embedded in the wavelet domain of the luminance component 3.The New Approach: 3.1 Multiple Key Function Method: In this paper, we formulate a distinctive method for information hiding in images to beat the existing detection techniques. Let us take the example of hiding an secret text called the cipher text in an image called the cover image. In the effort to keep the structural characteristics of the cover image, secure, we make minimal introduction of message bits into the cover image and yet manage to embed text messages of substantial size. It is thus possible, by choosing from a set of key functions, which requires introducing least number of message bits in the cover image and still
2 accommodate the entire cipher intended to be hidden. The key functions are used to generate a set of byte-positions where the message is to be embedded. At various bit positions in the cover image a match between the cipher bit and the original image bit may result, which means that actually, no replacement of the original image bit occurs. The Bit Replacement Count (BRC) for this key function is calculated, dynamically, as the replacement/nonreplacement of the image bits occur. Here, BRC = Number of replacements in the original image bits introduced Now, another key function from the key function set is chosen and the above manipulations are performed. As before, the new value of BRC is calculated. Redundant application of the above formulation will result in a set of BRCs. The set of BRCs can be compared to find out a key function, which belongs to the key function set, which causes least number of original image bit replacements. The result is, a sizable text embedded into a cover image, without actually disturbing much of the image s original characteristics.associated with the key functions, is a unique identification number in the key functions lookup table. Both the sender and the receiver are required to have a similar lookup table. The unique key identification number is also embedded in the cover image at specific positions in the cover image, along with the cipher. The embedded cipher can be recovered safely by the receiver by first extracting the key identification number from the cover image, and then generate the bytepositions to actually decipher the embedded cipher information. Because the number of bits in the cover retouched is minimal, as resulted from using the suitable key function, the image can escape the statistical analyses (such as CHI-SQUARE or Extended CHI-SQUARE tests), Implementation and Testing of Multiple Key method: This approach was implemented and tested in windows environment with the c++ compiler. The results given above are with a modest, 11 different key function table for a cipher text of 20 bytes. The perfect permutation of the key function and the cover image can produce astonishing results with the ratio of the BRC to the size of the cipher, approaching unity. BRC/Size of the Cipher = 1 (approx.)
3 The results ought to be better if the key function table is larger and a suitable database of cover image is maintained. In such cases the probability of BRC would consistently reach unity irrespective of the size of the cipher thus escaping all existing detection techniques Enhancements on this technique: fig 3 The complexity of the first approach is very high when the number of functions in the function domain increases. The complexity can be reduced by using a generator which dynamic all generates functions in the neighborhood of the function that gives better BRC values from a domain of just 50 functions. 3.2 Newton s Forward Difference Method: In this approach, Newton s forward difference operator is introduced. The definition for that operator is F(x) = F(x+h) - F(x), where h=interval of x values In the method of Newton Forward Difference, by taking. X :The serial number of cipher bits (1,2,3 n) [ always h=1 ]. F(x): The bit position of image where the respective cipher matches the original Image Bit Using the above functional table, the forward difference table is constructed. From the table thus obtained we get the polynomial function that can generate the functional table. This polynomial function is then sent to the receiver along with the image. The receiver can retrieve the polynomial function which is placed in some fixed positions in the image. He can then generate the functional table thus knowing the bit positions where the cipher information is present.
4 3.2.1 Advantages of this method: Since the method uses the original bits of the image to hide the cipher, the conventional embedding is being ruled out and so probability of BRC is consistently equal to 1 for any cipher size and any cover image. Since we are not going to choose all the bits of the image in sequence, the size of the cipher that can be hidden is extremely large almost equal to half of the size of the image. Since we are not going to embed, the statistical properties of the image left unchanged. So the image escapes all the statistical detection techniques Implementation and testing: This new approach was implemented and tested in windows environment with the c++ compiler. The forward difference table was constructed for a cipher length of 10 bytes., that is, 80 bits and the functional table obtained is as given below. fig 4 The above functional table yields the polynomial function 2x^5+2x^4-3x^2+2 after constructing the forward difference table. The technique was tested for five cases by hiding different ciphers in various images and the results thus obtained are shown in the graph. Fig 5 Thus this approach proves to be more efficient than any other method because nowhere we are going to replace or embed any data into the image. Any detention technique (CHI- SQUARE method) fails to detect any suspection over the image.
5 3.2.3.Enhancements on this technique: The degree of the polynomial thus obtained is very high.to reduce the degree of the resulting Polynomial function, we use a selector to which some intelligence is incorporated. We use the concepts of neural networks to achieve this task. We try to test and train the selector so that it intelligent selector such that the image bit positions such that the higher order differences in theforward difference table vanishes to give a polynomial of lesser degree. Fig 6 As shown above, the same technique is applied recursively on the resultant polynomial functions Until the resultant polynomial function is of lesser degree. The polynomial table resulting because The enhancements is shown below. This table corresponds to the polynomial 3x-2. fig 7
6 3.3.Comparison between the exitsting techniques and our method: fig 8 4.Conclusion: With the arrival of the digital society in the 21st century, the potential of information hiding and watermarking techniques for multimedia has drawn increasingly intensive attention from the research communities and commercial sectors all over the world during the last decade. Recently, many researchers are investigating image data hiding techniques in various aspects in addition to imperceptibility and robustness. These aspects include information theoretic, stochastic, and security issues. This research trend will advance the information hiding technologies and provide opportunity for practical systems. This paper proposes two new evolutionary techniques in the field of data hiding. The first approach aims at minimal embedding by increasing the number of functions. This approach provides facilities for using functions as we have used a 16 bit key.the second approach aims at avoiding embedding thus satisfying theoretic, stochastic, and security issues.
Robust Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform & Singular Value Decomposition
Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 3, Number 8 (2013), pp. 971-976 Research India Publications http://www.ripublication.com/aeee.htm Robust Image Watermarking based
More informationImage Steganography (cont.)
Image Steganography (cont.) 2.2) Image Steganography: Use of Discrete Cosine Transform (DCT) DCT is one of key components of JPEG compression JPEG algorithm: (1) algorithm is split in 8x8 pixel squares
More informationCHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM
74 CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM Many data embedding methods use procedures that in which the original image is distorted by quite a small
More informationDigital Image Steganography Techniques: Case Study. Karnataka, India.
ISSN: 2320 8791 (Impact Factor: 1.479) Digital Image Steganography Techniques: Case Study Santosh Kumar.S 1, Archana.M 2 1 Department of Electronicsand Communication Engineering, Sri Venkateshwara College
More informationJeff Hinson CS525, Spring 2010
DIGITAL WATERMARKING Jeff Hinson CS525, Spring 2010 Outline Introduction Challenges Algorithms / Methods Detection Existing Programs Lessons Learned / Conclusion Questions Jeff Hinson CS525 Slide #1 Introduction
More informationA Robust Digital Watermarking Scheme using BTC-PF in Wavelet Domain
A Robust Digital Watermarking Scheme using BTC-PF in Wavelet Domain Chinmay Maiti a *, Bibhas Chandra Dhara b a Department of Computer Science & Engineering, College of Engineering & Management, Kolaghat,
More informationInformation Cloaking Technique with Tree Based Similarity
Information Cloaking Technique with Tree Based Similarity C.Bharathipriya [1], K.Lakshminarayanan [2] 1 Final Year, Computer Science and Engineering, Mailam Engineering College, 2 Assistant Professor,
More informationComparison of Wavelet Based Watermarking Techniques for Various Attacks
International Journal of Engineering and Technical Research (IJETR) ISSN: 2321-0869, Volume-3, Issue-4, April 2015 Comparison of Wavelet Based Watermarking Techniques for Various Attacks Sachin B. Patel,
More informationSTEGANOGRAPHIC SECURE DATA COMMUNICATION USING ZIGBEE
STEGANOGRAPHIC SECURE DATA COMMUNICATION USING ZIGBEE MR.NITIN B.NAIK, MRS.ARCHANA NITIN NAIK Vice-Principal, Sharad Institute of Technology,Polytechnic, Yadrav,Dist.Kolhapur(Maharashtra),India HOD E&TC,
More informationAN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS
AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS G Prakash 1,TVS Gowtham Prasad 2, T.Ravi Kumar Naidu 3 1MTech(DECS) student, Department of ECE, sree vidyanikethan
More informationThe Steganography In Inactive Frames Of Voip
The Steganography In Inactive Frames Of Voip This paper describes a novel high-capacity steganography algorithm for embedding data in the inactive frames of low bit rate audio streams encoded by G.723.1
More informationAuthentication and Secret Message Transmission Technique Using Discrete Fourier Transformation
, 2009, 5, 363-370 doi:10.4236/ijcns.2009.25040 Published Online August 2009 (http://www.scirp.org/journal/ijcns/). Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation
More informationA Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach
www.ijcsi.org 402 A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach Gunjan Nehru 1, Puja Dhar 2 1 Department of Information Technology, IEC-Group of Institutions
More informationSpatial, Transform and Fractional Domain Digital Image Watermarking Techniques
Spatial, Transform and Fractional Domain Digital Image Watermarking Techniques Dr.Harpal Singh Professor, Chandigarh Engineering College, Landran, Mohali, Punjab, Pin code 140307, India Puneet Mehta Faculty,
More informationA CRYPTOGRAPHICALLY SECURE IMAGE WATERMARKING SCHEME
A CRYPTOGRAPHICALLY SECURE IMAGE WATERMARKING SCHEME Jian Ren Tongtong Li Department of Electrical and Computer Engineering Michigan State University East Lansing, MI 48824-1226 Email: {renjian,tongli}@egr.msu.edu
More informationFiltering. -If we denote the original image as f(x,y), then the noisy image can be denoted as f(x,y)+n(x,y) where n(x,y) is a cosine function.
Filtering -The image shown below has been generated by adding some noise in the form of a cosine function. -If we denote the original image as f(x,y), then the noisy image can be denoted as f(x,y)+n(x,y)
More informationSteganography: Hiding Data In Plain Sight. Ryan Gibson
Steganography: Hiding Data In Plain Sight Ryan Gibson What Is Steganography? The practice of concealing messages or information within other nonsecret text or data. Comes from the Greek words steganos
More informationCOMPARISON BETWEEN TWO WATERMARKING ALGORITHMS USING DCT COEFFICIENT, AND LSB REPLACEMENT
COMPARISO BETWEE TWO WATERMARKIG ALGORITHMS USIG DCT COEFFICIET, AD LSB REPLACEMET Mona M. El-Ghoneimy Associate Professor, Elect. & Comm. Dept., Faculty of Engineering, Cairo University, Post code 12316
More informationFRAGILE WATERMARKING USING SUBBAND CODING
ICCVG 2002 Zakopane, 25-29 Sept. 2002 Roger ŚWIERCZYŃSKI Institute of Electronics and Telecommunication Poznań University of Technology roger@et.put.poznan.pl FRAGILE WATERMARKING USING SUBBAND CODING
More informationDWT-SVD Based Hybrid Approach for Digital Watermarking Using Fusion Method
DWT-SVD Based Hybrid Approach for Digital Watermarking Using Fusion Method Sonal Varshney M.tech Scholar Galgotias University Abhinandan Singh M.tech Scholar Galgotias University Abstract With the rapid
More informationHighly Secure Invertible Data Embedding Scheme Using Histogram Shifting Method
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 8 August, 2014 Page No. 7932-7937 Highly Secure Invertible Data Embedding Scheme Using Histogram Shifting
More informationAn Improved Performance of Watermarking In DWT Domain Using SVD
An Improved Performance of Watermarking In DWT Domain Using SVD Ramandeep Kaur 1 and Harpal Singh 2 1 Research Scholar, Department of Electronics & Communication Engineering, RBIEBT, Kharar, Pin code 140301,
More informationData Hiding on Text Using Big-5 Code
Data Hiding on Text Using Big-5 Code Jun-Chou Chuang 1 and Yu-Chen Hu 2 1 Department of Computer Science and Communication Engineering Providence University 200 Chung-Chi Rd., Shalu, Taichung 43301, Republic
More informationBit Adjusting Image Steganography in Blue Channel using AES and Secured Hash Function
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 6.017 IJCSMC,
More informationBreaking the OutGuess
Breaking the OutGuess Jessica Fridrich, Miroslav Goljan, Dorin Hogea * presented by Deepa Kundur Department of Electrical and Computer Engineering * Department of Computer Science SUNY Binghamton, Binghamton,
More informationKeywords Stegnography, stego-image, Diamond Encoding, DCT,stego-frame and stego video. BLOCK DIAGRAM
Volume 6, Issue 1, January 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Information
More informationSteganography. Brent McClain Rob Carey
Steganography Brent McClain Rob Carey What is Steganography Greek Origin Steganos means covered Graph means writing Hiding information in plain sight Cover Image Another image hidden in the picture Created
More informationEnhancing the Image Compression Rate Using Steganography
The International Journal Of Engineering And Science (IJES) Volume 3 Issue 2 Pages 16-21 2014 ISSN(e): 2319 1813 ISSN(p): 2319 1805 Enhancing the Image Compression Rate Using Steganography 1, Archana Parkhe,
More informationA New Approach to Compressed Image Steganography Using Wavelet Transform
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 5, Ver. III (Sep. Oct. 2015), PP 53-59 www.iosrjournals.org A New Approach to Compressed Image Steganography
More informationWATERMARKING FOR LIGHT FIELD RENDERING 1
ATERMARKING FOR LIGHT FIELD RENDERING 1 Alper Koz, Cevahir Çığla and A. Aydın Alatan Department of Electrical and Electronics Engineering, METU Balgat, 06531, Ankara, TURKEY. e-mail: koz@metu.edu.tr, cevahir@eee.metu.edu.tr,
More informationImproved Qualitative Color Image Steganography Based on DWT
Improved Qualitative Color Image Steganography Based on DWT 1 Naresh Goud M, II Arjun Nelikanti I, II M. Tech student I, II Dept. of CSE, I, II Vardhaman College of Eng. Hyderabad, India Muni Sekhar V
More informationImage and Video Watermarking
Telecommunications Seminar WS 1998 Data Hiding, Digital Watermarking and Secure Communications Image and Video Watermarking Herbert Buchner University of Erlangen-Nuremberg 16.12.1998 Outline 1. Introduction:
More informationAudio Contents Protection using Invisible Frequency Band Hiding Based on Mel Feature Space Detection: A Review
Journal Science ISSN: 39-7157, ISSN: 39-7157, 1 015 015 Audio Contents Protection using Invisible Frequency Band Hiding Based on Mel Feature Space Detection: A Review Shefali Rani1, Yogesh Kumar 1 (M.Tech
More informationMultimedia Security: So What s the Big Deal?
Multimedia Security: So What s the Big Deal? Edward J. Delp Purdue University School of Electrical and Computer Engineering Video and Image Processing Laboratory (VIPER) West Lafayette, Indiana email:
More informationDIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS
DIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS Murat Furat Mustafa Oral e-mail: mfurat@cu.edu.tr e-mail: moral@mku.edu.tr Cukurova University, Faculty of Engineering,
More informationAttack Detection in Watermarked Images with PSNR and RGB Intensity
Attack Detection in Watermarked Images with PSNR and RGB Intensity Neha Chauhan 1, Akhilesh A. Waoo 2, P. S. Patheja 3 Abstract For more security to the information and to enhance the hiding capacity of
More informationOverview Of Techniques Of Stegnography On Various Media
Overview Of Techniques Of Stegnography On Various Media Ms. Arpana Chaturvedi,, Jagannath International Management School, Vasant Kunj, Email: pcord.bca@jagannath.org Ms.Poonam Verma, Jagannath International
More informationA Reversible Data Hiding Scheme for BTC- Compressed Images
IJACSA International Journal of Advanced Computer Science and Applications, A Reversible Data Hiding Scheme for BTC- Compressed Images Ching-Chiuan Lin Shih-Chieh Chen Department of Multimedia and Game
More informationA Cryptographic Watermark Embedding Technique
A Cryptographic Watermark Embedding Technique Jian Ren Tongtong Li Department of Electrical and Computer Engineering Michigan State University East Lansing, MI 48824-1226 Email: {renjian,tongli}@egr.msu.edu
More informationOTP-Steg. One-Time Pad Image Steganography Using OTP-Steg V.1.0 Software October 2015 Dr. Michael J. Pelosi
OTP-Steg One-Time Pad Image Steganography Using OTP-Steg V.1.0 Software October 2015 Dr. Michael J. Pelosi What is Steganography? Steganography literally means covered writing Encompasses methods of transmitting
More informationImage Steganography Method Using Integer Wavelet Transform
ISSN (Online) : 2319-8753 ISSN (Print) : 2347-6710 International Journal of Innovative Research in Science, Engineering and Technology Volume 3, Special Issue 3, March 2014 2014 International Conference
More informationDIGITAL IMAGE HIDING ALGORITHM FOR SECRET COMMUNICATION
DIGITAL IMAGE HIDING ALGORITHM FOR SECRET COMMUNICATION T.Punithavalli 1, S. Indhumathi 2, V.Karthika 3, R.Nandhini 4 1 Assistant professor, P.A.College of Engineering and Technology, pollachi 2 Student,
More informationReversible Data Hiding in Colour Images using AES Data Encryption System
Reversible Data Hiding in Colour Images using AES Data Encryption System M. Prem Anand 1, Y. Karthikeyan 2 1 Assistant Professor 2 M.E Student 1,2 Department of Electronics & Communication Engineering,
More informationSCALED WAVELET TRANSFORM VIDEO WATERMARKING METHOD USING HYBRID TECHNIQUE: SWT-SVD-DCT
SCALED WAVELET TRANSFORM VIDEO WATERMARKING METHOD USING HYBRID TECHNIQUE: SWT- Shaveta 1, Daljit Kaur 2 1 PG Scholar, 2 Assistant Professor, Dept of IT, Chandigarh Engineering College, Landran, Mohali,
More informationHiding of Random Permutated Encrypted Text using LSB Steganography with Random Pixels Generator
Hiding of Random Permutated Encrypted Text using LSB Steganography with Random Pixels Generator Noor Kareem Jumaa Department of Computer Technology Engineering Al-Mansour University College, Iraq ABSTRACT
More informationA Reversible Data Hiding Scheme For JPEG Images
A Reversible Data Hiding Scheme For JPEG Images Qiming Li, Yongdong Wu, and Feng Bao Institute for Infocomm Research, A*Star, Singapore {qli,wydong,baofeng}@i2r.a-star.edu.sg Abstract. When JPEG images
More informationCHAPTER 5 AUDIO WATERMARKING SCHEME INHERENTLY ROBUST TO MP3 COMPRESSION
CHAPTER 5 AUDIO WATERMARKING SCHEME INHERENTLY ROBUST TO MP3 COMPRESSION In chapter 4, SVD based watermarking schemes are proposed which met the requirement of imperceptibility, having high payload and
More informationComparison of wavelet based watermarking techniques Using SVD
Comparison of wavelet based watermarking techniques Using SVD Prof.T.Sudha Department of Computer Science Vikrama Simhapuri University Nellore. Email- thatimakula_sudha@yahoo.com Ms. K. Sunitha Head, P.G
More informationRobust and Imperceptible Image Watermarking by DC Coefficients Using Singular Value Decomposition
Robust and Imperceptible Image Watermarking by DC Coefficients Using Singular Value Decomposition Christy Atika Sari atika.sari@dsn.dinus.ac.id Eko Hari Rachmawanto eko.hari@dsn.dinus.ac.id De Rosal Ignatius
More informationA Review of Approaches for Steganography
International Journal of Computer Science and Engineering Open Access Review Paper Volume-2, Issue-5 E-ISSN: 2347-2693 A Review of Approaches for Steganography Komal Arora 1* and Geetanjali Gandhi 2 1*,2
More informationLecture 5: Compression I. This Week s Schedule
Lecture 5: Compression I Reading: book chapter 6, section 3 &5 chapter 7, section 1, 2, 3, 4, 8 Today: This Week s Schedule The concept behind compression Rate distortion theory Image compression via DCT
More informationRandom Image Embedded in Videos using LSB Insertion Algorithm
Random Image Embedded in Videos using LSB Insertion Algorithm K.Parvathi Divya 1, K.Mahesh 2 Research Scholar 1, * Associate Professor 2 Department of Computer Science and Engg, Alagappa university, Karaikudi.
More informationDr. Nasseer M. Basheer, Lecturer, Technical Engineering College/Mosul Northern Technical University/Iraq
Volume 6, Issue 7, July 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Arduino Based Text
More informationA Steganography method for JPEG2000 Baseline System
A Steganography method for JPEG2000 Baseline System P.Ramakrishna Rao M.Tech.,[CSE], Teaching Associate, Department of Computer Science, Dr.B.R.Ambedkar University, Etcherla Srikaulam, 532 410. Abstract
More informationPerformance Analysis of Discrete Wavelet Transform based Audio Watermarking on Indian Classical Songs
Volume 73 No.6, July 2013 Performance Analysis of Discrete Wavelet Transform based Audio ing on Indian Classical Songs C. M. Juli Janardhanan Department of ECE Government Engineering College, Wayanad Mananthavady,
More informationImproved Reversible Data Hiding in Encrypted Images Based on Reserving Room After Encryption and Pixel Prediction
Improved Reversible Data Hiding in Encrypted Images Based on Reserving Room After Encryption and Pixel Prediction Ioan Catalin Dragoi, Henri-George Coanda and Dinu Coltuc Electrical Engineering Dept. Valahia
More informationA Data Hiding Model for Image Steganography Using Primes: Towards Data Security
International Journal of Computational Engineering & Management, Vol. 15 Issue 3, May 2012 www..org 1 A Data Hiding Model for Image Steganography Using Primes: Towards Data Security Mamatha.T Assistant
More informationEnhanced Least Significant Bit Scheme Robust Against Chi-Squared Attack
2010 Fourth Asia International Conference on Mathematical/Analytical Modelling and Computer Simulation Enhanced Least Significant Bit Scheme Robust Against Chi-Squared Attack Masoud Afrakhteh Dept. of
More informationCompressive Sensing for Multimedia. Communications in Wireless Sensor Networks
Compressive Sensing for Multimedia 1 Communications in Wireless Sensor Networks Wael Barakat & Rabih Saliba MDDSP Project Final Report Prof. Brian L. Evans May 9, 2008 Abstract Compressive Sensing is an
More informationSmart Data Encryption And Transfer : Steganographic tool for hiding data A JAVA based open source application program
Smart Data Encryption And Transfer : Steganographic tool for hiding data A JAVA based open source application program K. Jayamalini 1, Shashank Dubey 2, Ashish Singh 3, Geetesh Tiwari 4, Gaurav Singh 5
More informationA Hybrid Approach for Detecting Stego Content in Corporate Mail Using Neural Network Based Simplified-Data Encryption Standard Algorithm
American Journal of Applied Sciences 9 (5): 766-771, 2012 ISSN 1546-9239 2012 Science Publications A Hybrid Approach for Detecting Stego Content in Corporate Mail Using Neural Network Based Simplified-Data
More informationHybrid Stegnography using ImagesVaried PVD+ LSB Detection Program
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 5 May 2015, Page No. 12086-12090 Hybrid Stegnography using ImagesVaried PVD+ LSB Detection Program Shruti
More informationEnhanced LSB Based Audio Steganography
Enhanced LSB Based Audio Steganography Prof.Dighe Mohit dighe.mohit@gmail.com Miss. Kavade Priyanka kavade.priyanka@gmail.com Mr. Raje Lakhan lakhan2030@gmail.com Miss.Harale prajakta harale.prajakta15@gmail.com
More informationNew Steganography Technique with Symmetric Cryptography
17 New Steganography Technique with Symmetric Cryptography Swati Gupta, PG Student, Department of CSE, SSSITS, Sehore, India Gajendra Singh, Head, Department of CSE &IT, SSSITS, Sehore, India Ravindra
More informationProtocol Data Hiding. By Chet Hosmer Article Posted: March 06, 2012
Protocol Data Hiding By Chet Hosmer Article Posted: March 06, 2012 On Cinco de Mayo in 1997, which happened to be the first Monday in May that year, the Hacker Publication First Monday included an article
More informationCovert Communication with Authentication via Software Programs Using Invisible ASCII Codes --- A New Approach
Covert Communication with Authentication via Software Programs Using Invisible ASCII Codes --- A New Approach I-Shi Lee Dept. of Computer Science, National Chiao Tung University, Hsinchu, Taiwan 30010
More informationEMPIRICAL ANALYSIS ON STEGANOGRAPHY USING JSTEG, OUTGUESS 0.1 AND F5 ALGORITHMS
EMPIRICAL ANALYSIS ON STEGANOGRAPHY USING JSTEG, OUTGUESS 0.1 AND F5 ALGORITHMS Dr. N.MANOHARAN 1 Dr.R.BALASUBRAMANIAN 2 S.UMA NANDHINI 3 V.SUJATHA 4 1 Assistant Professor in Department of Computer Science,
More informationUse of Visual Cryptography and Neural Networks to Enhance Security in Image Steganography
Use of Visual Cryptography and Neural Networks to Enhance Security in Image Steganography K.S.Seethalakshmi (Department of Computer Science and Engineering, RVCE / VTU, INDIA) ABSTRACT : As a result of
More informationMultipurpose Color Image Watermarking Algorithm Based on IWT and Halftoning
Multipurpose Color Image Watermarking Algorithm Based on IWT and Halftoning C. SANTIAGO-AVILA, M. GONZALEZ LEE, M. NAKANO-MIYATAKE, H. PEREZ-MEANA Sección de Posgrado e Investigación, Esime Culhuacan Instituto
More informationA Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and MAC Techniques
Bashar S. Mahdi Alia K. Abdul Hassan Department of Computer Science, University of Technology, Baghdad, Iraq A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and
More informationReversible Image Data Hiding with Local Adaptive Contrast Enhancement
Reversible Image Data Hiding with Local Adaptive Contrast Enhancement Ruiqi Jiang, Weiming Zhang, Jiajia Xu, Nenghai Yu and Xiaocheng Hu Abstract Recently, a novel reversible data hiding scheme is proposed
More informationCS1114 Assignment 5 Part 1
CS1114 Assignment 5 Part 1 out: Friday, March 30, 2012. due: Friday, April 6, 2012, 9PM. This assignment covers two topics: upscaling pixel art and steganography. This document is organized into those
More informationChaos-based Modified EzStego Algorithm for Improving Security of Message Hiding in GIF Image
015 International Conference on Computer, Control, Informatics and Its Applications Chaos-based Modified EzStego Algorithm for Improving Security of Message Hiding in GIF Image Rinaldi Munir Informatics
More informationSPREAD SPECTRUM AUDIO WATERMARKING SCHEME BASED ON PSYCHOACOUSTIC MODEL
SPREAD SPECTRUM WATERMARKING SCHEME BASED ON PSYCHOACOUSTIC MODEL 1 Yüksel Tokur 2 Ergun Erçelebi e-mail: tokur@gantep.edu.tr e-mail: ercelebi@gantep.edu.tr 1 Gaziantep University, MYO, 27310, Gaziantep,
More informationSECURE DATA EMBEDDING USING REVERSIBLE DATA HIDING FOR ENCRYPTED IMAGES
VOL., NO. 7, APRIL 5 ISSN 89-668 6-5 Asian Research Publishing Network (ARPN). All rights reserved. SECURE DATA EMBEDDING USING REVERSIBLE DATA HIDING FOR ENCRYPTED IMAGES R. Selveeswari and P. R. Vijayalakshmi
More informationCHAPTER 3 DIFFERENT DOMAINS OF WATERMARKING. domain. In spatial domain the watermark bits directly added to the pixels of the cover
38 CHAPTER 3 DIFFERENT DOMAINS OF WATERMARKING Digital image watermarking can be done in both spatial domain and transform domain. In spatial domain the watermark bits directly added to the pixels of the
More informationMetamorphosis of High Capacity Steganography Schemes
2012 International Conference on Computer Networks and Communication Systems (CNCS 2012) IPCSIT vol.35(2012) (2012) IACSIT Press, Singapore Metamorphosis of High Capacity Steganography Schemes 1 Shami
More informationTampering Detection in Compressed Digital Video Using Watermarking
Tampering Detection in Compressed Digital Video Using Watermarking Mehdi Fallahpour, Shervin Shirmohammadi, Mehdi Semsarzadeh, Jiying Zhao School of Electrical Engineering and Computer Science (EECS),
More information1 Achieving IND-CPA security
ISA 562: Information Security, Theory and Practice Lecture 2 1 Achieving IND-CPA security 1.1 Pseudorandom numbers, and stateful encryption As we saw last time, the OTP is perfectly secure, but it forces
More informationDigital watermarking techniques for JPEG2000 scalable image coding
Electronic & Electrical Engineering. Communications Research Group. Digital watermarking techniques for JPEG2000 scalable image coding Deepayan Bhowmik The University of Sheffield, Sheffield, UK Contents
More informationResearch Article A Novel Steganalytic Algorithm based on III Level DWT with Energy as Feature
Research Journal of Applied Sciences, Engineering and Technology 7(19): 4100-4105, 2014 DOI:10.19026/rjaset.7.773 ISSN: 2040-7459; e-issn: 2040-7467 2014 Maxwell Scientific Publication Corp. Submitted:
More informationSECRETLY CONCEALING MESSAGE USING ADVANCED IMAGE PROCESSING
International Journal of Engineering Research ISSN: 2348-4039 & Management Technology May-2017 Volume- 4, Issue-3 Email: editor@ijermt.org www.ijermt.org SECRETLY CONCEALING MESSAGE USING ADVANCED IMAGE
More informationarxiv: v1 [cs.cr] 31 Dec 2018
Security analysis of a self-embedding fragile image watermark scheme Xinhui Gong, Feng Yu, Xiaohong Zhao, Shihong Wang School of Science, Beijing University of Posts and Telecommunications, Beijing 100876,
More informationH.264 STREAM REPLACEMENT WATERMARKING WITH CABAC ENCODING
H.264 STREAM REPLACEMENT WATERMARKING WITH CABAC ENCODING Dekun Zou * and Jeffrey A Bloom ** * Technicolor Corporate Research dekun.zou@technicolor.com ABSTRACT This paper describes a watermarking method
More informationA General Framework for the Structural Steganalysis of LSB Replacement
A General Framework for the Structural Steganalysis of LSB Replacement Andrew Ker adk@comlab.ox.ac.uk Royal Society University Research Fellow Oxford University Computing Laboratory 7 th Information Hiding
More informationWatermarking Of Relational Databases Mohit H Bhesaniya 1, Kunal Thanki 2
Watermarking Of Relational s Mohit H Bhesaniya 1, Kunal Thanki 2 1 Department of computer engineering, AITS, Rajkot,Gujarat, India. 2 Department of computer engineering, Government polytechnique, porbandar.gujarat,
More informationRobust Digital Image Watermarking. Using Quantization and Back Propagation. Neural Network
Contemporary Engineering Sciences, Vol. 5, 2012, no. 3, 137-147 Robust Digital Image Watermarking Using Quantization and Back Propagation Neural Network Nallagarla Ramamurthy Research Scholar, JNTUA,Anantapur,
More informationDistributed Steganography
Distributed Steganography Background Steganography refers to any methodology used to hide a message (including text, sound, or picture) in a separate file. Most commonly text or an image is inserted into
More informationComparative Analysis of 2-Level and 4-Level DWT for Watermarking and Tampering Detection
International Journal of Latest Engineering and Management Research (IJLEMR) ISSN: 2455-4847 Volume 1 Issue 4 ǁ May 2016 ǁ PP.01-07 Comparative Analysis of 2-Level and 4-Level for Watermarking and Tampering
More informationBLIND EXTRACTION OF HIDDEN DATA FROM DIGITAL IMAGE USING M-IGLS ALGORITHM
BLIND EXTRACTION OF HIDDEN DATA FROM DIGITAL IMAGE USING M-IGLS ALGORITHM D.PADMAVATHI 1 (PG SCHOLAR) DR.K.BABULU 2 PH.D 1 Department of Electronics and Communications, JNTU Kakinada, AP, INDIA 2 Professor,
More informationImage Error Concealment Based on Watermarking
Image Error Concealment Based on Watermarking Shinfeng D. Lin, Shih-Chieh Shie and Jie-Wei Chen Department of Computer Science and Information Engineering,National Dong Hwa Universuty, Hualien, Taiwan,
More informationAn Efficient Self-Embedding Watermarking Scheme for Colour Image Tamper Detection and Recovery
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 1, January 2015,
More informationCOMPARATIVE STUDY OF HISTOGRAM SHIFTING ALGORITHMS FOR DIGITAL WATERMARKING
International Journal of Computer Engineering and Applications, Volume X, Issue VII, July 16 www.ijcea.com ISSN 2321-3469 COMPARATIVE STUDY OF HISTOGRAM SHIFTING ALGORITHMS FOR DIGITAL WATERMARKING Geeta
More informationVarious Approaches for Watermarking of Relational Databases Mohit Bhesaniya, J.N.Rathod, Kunal Thanki
Various Approaches for Watermarking of Relational s Mohit Bhesaniya, J.N.Rathod, Kunal Thanki Abstract as a tool for storing and managing data, relational database is widely used in many information systems.
More informationImage Steganography Technique By Using Braille Method of Blind People (LSBraille)
Image Steganography Technique By Using Braille Method of Blind People (LSBraille) Abdelmgeid Amin Ali Associate Professor, Dept. of Computer Science Faculty of Science, Al Minia University Al Minia, Egypt
More informationA Secure Steganography Technique using DCT and Modified RC4
International Journal of Interdisciplinary and Multidisciplinary Studies (IJIMS), 2015, Vol 2, No.6, 61-65. 61 Available online at http://www.ijims.com ISSN: 2348 0343 A Secure Steganography Technique
More informationA Robust Image Watermarking Scheme using Image Moment Normalization
A Robust Image ing Scheme using Image Moment Normalization Latha Parameswaran, and K. Anbumani Abstract Multimedia security is an incredibly significant area of concern. A number of papers on robust digital
More informationA NEW WATERMARKING TECHNIQUE FOR SECURE DATABASE
Online Journal, www.ijcea.com A NEW WATERMARKING TECHNIQUE FOR SECURE DATABASE Jun Ziang Pinn 1 and A. Fr. Zung 2 1,2 P. S. University for Technology, Harbin 150001, P. R. China ABSTRACT Digital multimedia
More informationInternational Journal of Computer Science Trends and Technology (IJCST) Volume 4 Issue 5, Sep - Oct 2016
RESEARCH ARTICLE Combination of Biometric Information into Watermarking Hai Truong [1], Thanh Tung Nguyen [2] Faculty of Computer Science and Engineering Ho Chi Minh University of Technology Vietnam ABSTRACT
More informationCHAPTER 6 EFFICIENT TECHNIQUE TOWARDS THE AVOIDANCE OF REPLAY ATTACK USING LOW DISTORTION TRANSFORM
109 CHAPTER 6 EFFICIENT TECHNIQUE TOWARDS THE AVOIDANCE OF REPLAY ATTACK USING LOW DISTORTION TRANSFORM Security is considered to be the most critical factor in many applications. The main issues of such
More information