A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
Image Steganography in Spatial Domain: Current Status, Techniques, and Trends
2021
Intelligent Automation and Soft Computing
Furthermore, to aid the steganography researchers in developing efficient spatial-domain embedding techniques, the future research of the spatial-domain steganography is discussed and a set of recommendations ...
This research article provides an up-to-date review of spatial-domain steganography. ...
A greater difference between the two pixels allows a greater change and thus higher payload can be embedded. ...
doi:10.32604/iasc.2021.014773
fatcat:brkq663abvdxxaqr4sm4a46z6e
An Accurate Texture Complexity Estimation for Quality-Enhanced and Secure Image Steganography
2020
IEEE Access
The decimal equivalent of secret bits is extracted by taking the difference between interpolated and embedded pixels. ...
Steganalysis is the counterpart of steganography. It tries to detect the presence of hidden data in a given image. ...
He also serves as the Director of Embedded Systems Research and Development Centre. ...
doi:10.1109/access.2020.2968217
fatcat:7jhtn4tz2nfvbnv4h6t6eswpdm
Secure Data Transfer over Internet Using Image Steganography: Review
2021
Asian Journal of Research in Computer Science
In disguising information, Steganography plays a significant role. Traditional Steganography faces a further concern of discovery as steganalysis develops. ...
These are; Least Significant Bit (LSB), Pixel Value Difference (PVD), Exploiting Modification Direction (EMD), contourlet transform, Discrete Wavelet Transformation (DWT), and, Discrete Cosine Transformation ...
The most popular approach for picture steganography consists of the least essential bits (LSB), changed by secret message bits, of image pixels [63] . ...
doi:10.9734/ajrcos/2021/v10i330243
fatcat:pgi7epb54veqvaxkfnxpcece4m
Reversible Encrypted Data Hiding In Encrypted Video
2014
IOSR Journal of Computer Engineering
It is then embedded by modifying a small portion of the encrypted cover image. The decryption of video is done first followed by the decryption of the data. ...
With the aid of the data hiding key and spatial correlation in natural image, the embedded data can be successfully extracted and the original video can be perfectly recovered. ...
It is very important to investigate steganalysis, the study of techniques to detect the presence of hidden data. ...
doi:10.9790/0661-16157182
fatcat:5t5onycqejbmnhxi6mmnixd5oe
Reversible Data Hiding in Encrypted Images using POB Number System
2019
IEEE Access
To deal with these issues, we proposed a novel RDHEI method with the functionality of embedding synchronized with re-encryption, which is well carried out by a data hider using a permutation ordered binary ...
Unlike conventional PEE-based RDHEI techniques, this scheme takes advantage of two peak points for embedding, but thoroughly abandons the former idea of shifting process. ...
His research interests include steganography, steganalysis, and digital forensics. ...
doi:10.1109/access.2019.2946929
fatcat:ag6pd6fcr5bztck3in7qerrm4m
Online) International Journal of Network Security is published both in traditional paper form (ISSN 1816-353X) and in Internet
2016
unpublished
Acknowledgments This research was supported in part by the National Nature Science Foundation of China (grant number: 61202228) and the College Natural Science Key Project of Anhui Province of China (grant ...
Acknowledgments The research work was supported by New Century Excellent Talents
Acknowledgments The work described in this paper was supported by the Key program of National Science Fund of Tianjin ...
[12] embedded secret data using directions to achieve high image quality, but the embedding capacity could only reach 0.75 bits per pixel (bpp). Chang et al. ...
fatcat:xjcy7wc2hzbhzl3bfxwniqvjhy
The First Workshop on Information Hiding Techniques for Internet Anonymity and Privacy
INTERNET 2012 The Fourth International Conference on Evolving Internet IHTIAP 2012
unpublished
increasing the confidence of watermark detection, will also be embedded. ...
To resist geometrical transformations, the extended synchronization templates, which help to ensure that reasonably large invariant regions will be available for carrying the watermark payload and/or for ...
Steganography refers to the science of covert communication, and steganalysis is the opposite of steganography. ...
fatcat:qde6lpe4engxxbzy7jry4w6iw4
Sensor Data Integrity Verification for Real-time and Resource Constrained Systems
[article]
2021
We identify the areas in an autonomous vehicle that require sensor data integrity and propose suitable water-marking techniques to verify the integrity of the data and evaluate the performance of the proposed ...
In our proposed method, sensor data is embedded with application specific metadata and this process introduces some distortion. ...
Further, I would like to thank each one of my ...
doi:10.7302/1062
fatcat:acr5ocesxfgefmxgwanximzq24
Online) International Journal of Network Security is published both in traditional paper form (ISSN 1816-353X) and in Internet
2017
International Journal of Network Security
unpublished
Then, n shadows were embedded into the pre-selected cover images by using matrix encoding so as to generate n stego images. ...
Benefiting from the comparatively slight modification to the cover image, our scheme obtains enhancement in both the security of secret data and the visual quality of the stego image. ...
embedded data; secondly, the RS steganalysis [8, 10] can easily detect the existence of secret data that has been embedded by LSBs and can predict its length. ...
fatcat:btwmayvuhzbotmhejwow3wbldq
Online) International Journal of Network Security is published both in traditional paper form
2016
International Journal of Network Security
unpublished
Finally, we give the security proof and the efficiency analysis of our proposed scheme. ...
Security of the scheme is based on chaotic maps hard problems and a secure one way hash function. ...
Acknowledgments The paper has been supported by Natural Science Foundation of China under No.61003300 and 61272074, and Natural Science Foundation of Jiangsu Province under No.BK2011464. ...
fatcat:3gborlznmrac3ebiwzxjjy5jly
Cryptography and Steganography: New Algorithms and Applications
2011
Acknowledgments The author is supported by the Science Foundation Ireland Stokes Professorship Programme and by the Centre for Advanced Studies, Warsaw University of Technology. ...
These have included schemes based on synchronized chaotic (analogue) circuits, for example, which belong to the field of steganography and secure radio communication [51] . ...
and receiver synchronized to the same coded sequence. ...
doi:10.21427/d7zs63
fatcat:6fejmptldrdztocxpmudsrra54
Online) International Journal of Network Security is published both in traditional paper form (ISSN 1816-353X) and in Internet
2017
International Journal of Network Security
unpublished
In order to satisfy the requirements of a remote user authentication scheme, the smart card has become an essential device, one that is widely used because of its low computational cost and expedient portability ...
With the advancement of internet network technologies, remote user authentication schemes using smart cards have been widely adopted. ...
YCSZ2013069), the High Level Innovation Team of Guangxi Colleges and Universities, and the Program for Innovative Research Team of Guilin University of Electronic Technology. ...
fatcat:nev5sh4gw5c45hffrl3qmchnzi
Online) International Journal of Network Security is published both in traditional paper form
2016
International Journal of Network Security
unpublished
The success of these attacks on the proposed mechanism dependence on trust score: lesser trust score (≤ 50) increases the chances of these attacks whereas higher trust score protects the network from these ...
Trust management plays the role of maintaining the relationship between nodes for long endeavor. ...
Acknowledgment The author gratefully acknowledged the financial support of My PhD from the Ministry of Education Malaysia. ...
fatcat:ez6kvrzkuzg75nulaxycvfvxcq
Online) International Journal of Network Security is published both in traditional paper form (ISSN 1816-353X) and in Internet
2017
International Journal of Network Security
unpublished
With the characteristic of spatial diversity and low cost, cooperative system is a tendency for the future communications. ...
It is not suitable to apply to the equipment with low computing resources, such as Internet of Things (IoT) application. ...
Acknowledgments This work is supported by the National Natural Science Foundation of China (No. 61363078), the Natural Science Foundation of Gansu Province of China (No. 1310RJYA004). ...
fatcat:vy4pp4thsfcrpakpwdjmdgjuoy