Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








14 Hits in 6.0 sec

Image Steganography in Spatial Domain: Current Status, Techniques, and Trends

Adeeb M. Alhomoud
2021 Intelligent Automation and Soft Computing  
Furthermore, to aid the steganography researchers in developing efficient spatial-domain embedding techniques, the future research of the spatial-domain steganography is discussed and a set of recommendations  ...  This research article provides an up-to-date review of spatial-domain steganography.  ...  A greater difference between the two pixels allows a greater change and thus higher payload can be embedded.  ... 
doi:10.32604/iasc.2021.014773 fatcat:brkq663abvdxxaqr4sm4a46z6e

An Accurate Texture Complexity Estimation for Quality-Enhanced and Secure Image Steganography

Ayesha Saeed, Fawad, Muhammad Jamil Khan, Humayun Shahid, Syeda Iffat Naqvi, Muhammad Ali Riaz, Mansoor Shaukat Khan, Yasar Amin
2020 IEEE Access  
The decimal equivalent of secret bits is extracted by taking the difference between interpolated and embedded pixels.  ...  Steganalysis is the counterpart of steganography. It tries to detect the presence of hidden data in a given image.  ...  He also serves as the Director of Embedded Systems Research and Development Centre.  ... 
doi:10.1109/access.2020.2968217 fatcat:7jhtn4tz2nfvbnv4h6t6eswpdm

Secure Data Transfer over Internet Using Image Steganography: Review

Dakhaz Mustafa Abdullah, Siddeeq Y. Ameen, Naaman Omar, Azar Abid Salih, Dindar Mikaeel Ahmed, Shakir Fattah Kak, Hajar Maseeh Yasin, Ibrahim Mahmood Ibrahim, Awder Mohammed Ahmed, Zryan Najat Rashid
2021 Asian Journal of Research in Computer Science  
In disguising information, Steganography plays a significant role. Traditional Steganography faces a further concern of discovery as steganalysis develops.  ...  These are; Least Significant Bit (LSB), Pixel Value Difference (PVD), Exploiting Modification Direction (EMD), contourlet transform, Discrete Wavelet Transformation (DWT), and, Discrete Cosine Transformation  ...  The most popular approach for picture steganography consists of the least essential bits (LSB), changed by secret message bits, of image pixels [63] .  ... 
doi:10.9734/ajrcos/2021/v10i330243 fatcat:pgi7epb54veqvaxkfnxpcece4m

Reversible Encrypted Data Hiding In Encrypted Video

Biby Bino Varghese, Rosna P. Haroon
2014 IOSR Journal of Computer Engineering  
It is then embedded by modifying a small portion of the encrypted cover image. The decryption of video is done first followed by the decryption of the data.  ...  With the aid of the data hiding key and spatial correlation in natural image, the embedded data can be successfully extracted and the original video can be perfectly recovered.  ...  It is very important to investigate steganalysis, the study of techniques to detect the presence of hidden data.  ... 
doi:10.9790/0661-16157182 fatcat:5t5onycqejbmnhxi6mmnixd5oe

Reversible Data Hiding in Encrypted Images using POB Number System

Hua Ren, Shaozhang Niu, Xinyi Wang
2019 IEEE Access  
To deal with these issues, we proposed a novel RDHEI method with the functionality of embedding synchronized with re-encryption, which is well carried out by a data hider using a permutation ordered binary  ...  Unlike conventional PEE-based RDHEI techniques, this scheme takes advantage of two peak points for embedding, but thoroughly abandons the former idea of shifting process.  ...  His research interests include steganography, steganalysis, and digital forensics.  ... 
doi:10.1109/access.2019.2946929 fatcat:ag6pd6fcr5bztck3in7qerrm4m

Online) International Journal of Network Security is published both in traditional paper form (ISSN 1816-353X) and in Internet

Min-Shiang Hwang, Shu-Fen Chiou, Chia-Chun Wu, Cheng-Yi Yang, Ajith Abraham, Korea, Wael Adi, Iqbal Sheikh, Ahamed, Vijay Atluri, Mauro Barni, Andrew Blyth (+36 others)
2016 unpublished
Acknowledgments This research was supported in part by the National Nature Science Foundation of China (grant number: 61202228) and the College Natural Science Key Project of Anhui Province of China (grant  ...  Acknowledgments The research work was supported by New Century Excellent Talents Acknowledgments The work described in this paper was supported by the Key program of National Science Fund of Tianjin  ...  [12] embedded secret data using directions to achieve high image quality, but the embedding capacity could only reach 0.75 bits per pixel (bpp). Chang et al.  ... 
fatcat:xjcy7wc2hzbhzl3bfxwniqvjhy

The First Workshop on Information Hiding Techniques for Internet Anonymity and Privacy

Massimo Villari
INTERNET 2012 The Fourth International Conference on Evolving Internet IHTIAP 2012   unpublished
increasing the confidence of watermark detection, will also be embedded.  ...  To resist geometrical transformations, the extended synchronization templates, which help to ensure that reasonably large invariant regions will be available for carrying the watermark payload and/or for  ...  Steganography refers to the science of covert communication, and steganalysis is the opposite of steganography.  ... 
fatcat:qde6lpe4engxxbzy7jry4w6iw4

Sensor Data Integrity Verification for Real-time and Resource Constrained Systems [article]

Raghavendar Changalvala, University, My, Hafiz Malik
2021
We identify the areas in an autonomous vehicle that require sensor data integrity and propose suitable water-marking techniques to verify the integrity of the data and evaluate the performance of the proposed  ...  In our proposed method, sensor data is embedded with application specific metadata and this process introduces some distortion.  ...  Further, I would like to thank each one of my  ... 
doi:10.7302/1062 fatcat:acr5ocesxfgefmxgwanximzq24

Online) International Journal of Network Security is published both in traditional paper form (ISSN 1816-353X) and in Internet

Min-Shiang Hwang, Shu-Fen Chiou, Chia-Chun Wu, Cheng-Yi Yang, Ajith Abraham, Korea, Wael Adi, Iqbal Sheikh, Ahamed, Vijay Atluri, Mauro Barni, Andrew Blyth (+77 others)
2017 International Journal of Network Security   unpublished
Then, n shadows were embedded into the pre-selected cover images by using matrix encoding so as to generate n stego images.  ...  Benefiting from the comparatively slight modification to the cover image, our scheme obtains enhancement in both the security of secret data and the visual quality of the stego image.  ...  embedded data; secondly, the RS steganalysis [8, 10] can easily detect the existence of secret data that has been embedded by LSBs and can predict its length.  ... 
fatcat:btwmayvuhzbotmhejwow3wbldq

Online) International Journal of Network Security is published both in traditional paper form

Min-Shiang Hwang, Shu-Fen Chiou, Chia-Chun Wu, Cheng-Yi Yang, Ajith Abraham, Korea, Wael Adi, Iqbal Sheikh, Ahamed, Vijay Atluri, Mauro Barni, Andrew Blyth (+97 others)
2016 International Journal of Network Security   unpublished
Finally, we give the security proof and the efficiency analysis of our proposed scheme.  ...  Security of the scheme is based on chaotic maps hard problems and a secure one way hash function.  ...  Acknowledgments The paper has been supported by Natural Science Foundation of China under No.61003300 and 61272074, and Natural Science Foundation of Jiangsu Province under No.BK2011464.  ... 
fatcat:3gborlznmrac3ebiwzxjjy5jly

Cryptography and Steganography: New Algorithms and Applications

Jonathan Blackledge
2011
Acknowledgments The author is supported by the Science Foundation Ireland Stokes Professorship Programme and by the Centre for Advanced Studies, Warsaw University of Technology.  ...  These have included schemes based on synchronized chaotic (analogue) circuits, for example, which belong to the field of steganography and secure radio communication [51] .  ...  and receiver synchronized to the same coded sequence.  ... 
doi:10.21427/d7zs63 fatcat:6fejmptldrdztocxpmudsrra54

Online) International Journal of Network Security is published both in traditional paper form (ISSN 1816-353X) and in Internet

Min-Shiang Hwang, Shu-Fen Chiou, Chia-Chun Wu, Cheng-Yi Yang, Ajith Abraham, Korea, Wael Adi, Iqbal Sheikh, Ahamed, Vijay Atluri, Mauro Barni, Andrew Blyth (+91 others)
2017 International Journal of Network Security   unpublished
In order to satisfy the requirements of a remote user authentication scheme, the smart card has become an essential device, one that is widely used because of its low computational cost and expedient portability  ...  With the advancement of internet network technologies, remote user authentication schemes using smart cards have been widely adopted.  ...  YCSZ2013069), the High Level Innovation Team of Guangxi Colleges and Universities, and the Program for Innovative Research Team of Guilin University of Electronic Technology.  ... 
fatcat:nev5sh4gw5c45hffrl3qmchnzi

Online) International Journal of Network Security is published both in traditional paper form

Min-Shiang Hwang, Shu-Fen Chiou, Chia-Chun Wu, Cheng-Yi Yang, Ajith Abraham, Korea, Wael Adi, Iqbal Sheikh, Ahamed, Vijay Atluri, Mauro Barni, Andrew Blyth (+102 others)
2016 International Journal of Network Security   unpublished
The success of these attacks on the proposed mechanism dependence on trust score: lesser trust score (≤ 50) increases the chances of these attacks whereas higher trust score protects the network from these  ...  Trust management plays the role of maintaining the relationship between nodes for long endeavor.  ...  Acknowledgment The author gratefully acknowledged the financial support of My PhD from the Ministry of Education Malaysia.  ... 
fatcat:ez6kvrzkuzg75nulaxycvfvxcq

Online) International Journal of Network Security is published both in traditional paper form (ISSN 1816-353X) and in Internet

Min-Shiang Hwang, Shu-Fen Chiou, Chia-Chun Wu, Cheng-Yi Yang, Ajith Abraham, Korea, Wael Adi, Iqbal Sheikh, Ahamed, Vijay Atluri, Mauro Barni, Andrew Blyth (+115 others)
2017 International Journal of Network Security   unpublished
With the characteristic of spatial diversity and low cost, cooperative system is a tendency for the future communications.  ...  It is not suitable to apply to the equipment with low computing resources, such as Internet of Things (IoT) application.  ...  Acknowledgments This work is supported by the National Natural Science Foundation of China (No. 61363078), the Natural Science Foundation of Gansu Province of China (No. 1310RJYA004).  ... 
fatcat:vy4pp4thsfcrpakpwdjmdgjuoy