70 research outputs found

    Hybrid Transform Technique for Robust Steganography on Red Component

    Get PDF
    The dynamic field of image steganography is witnessing remarkable advancements with the introduction of sophisticated techniques designed to bolster the security of digital data. A novel approach that has garnered attention involves leveraging grayscale picture steganography within the YIQ color space, aiming to provide a more secure method for protecting images. This innovative strategy necessitates the conversion of the carrier image from the conventional RGB color space to the YIQ color space, a process pivotal for the successful application of this steganographic method. The YIQ color space is particularly suited for this purpose due to its structure, which separates the luminance component (Y) from the chrominance components (I and Q). This separation is advantageous for steganography as it allows for the embedding of sensitive information within the luminance component, thus minimizing the impact on the image's color attributes. By converting sensitive information into a grayscale image, this method ensures that the data can be discreetly embedded into the Y component of the YIQ color space. The integrity of the I and Q components is preserved during this process, maintaining the original color characteristics of the carrier image while securely concealing the information. A crucial aspect of this approach is the use of a reliable steganographic technique during the embedding process. This technique must ensure that the grayscale image is seamlessly integrated into the Y component without compromising the quality of the carrier image. The effectiveness of this method is measured through two critical metrics: the Peak Signal to Noise Ratio (PSNR) and the Mean Square Error (MSE). High PSNR values indicate a high degree of similarity between the original and the stego image, suggesting that the embedding process has minimally affected the image quality. Simultaneously, minimal MSE values reflect the low error rate in the reconstructed image, further affirming the method's ability to maintain the integrity of the original image. The proposed algorithm, which utilizes grayscale image steganography within the YIQ color space, represents a significant advancement in enhancing the security of digital communications. By ensuring high PSNR and low MSE in the extracted image, this method demonstrates its efficacy in concealing sensitive information while preserving the visual quality of the carrier image. As such, it opens new avenues for the development of secure communication techniques, underscoring the potential for continued innovation in the field of steganography. This approach not only enhances current communication security protocols but also lays the groundwork for future exploration and development in this ever-evolving domain

    A digital signature and watermarking based authentication system for JPEG2000 images

    Get PDF
    In this thesis, digital signature based authentication system was introduced, which is able to protect JPEG2000 images in different flavors, including fragile authentication and semi-fragile authentication. The fragile authentication is to protect the image at code-stream level, and the semi-fragile is to protect the image at the content level. The semi-fragile can be further classified into lossy and lossless authentication. With lossless authentication, the original image can be recovered after verification. The lossless authentication and the new image compression standard, JPEG2000 is mainly discussed in this thesis

    Recent Advances in Steganography

    Get PDF
    Steganography is the art and science of communicating which hides the existence of the communication. Steganographic technologies are an important part of the future of Internet security and privacy on open systems such as the Internet. This book's focus is on a relatively new field of study in Steganography and it takes a look at this technology by introducing the readers various concepts of Steganography and Steganalysis. The book has a brief history of steganography and it surveys steganalysis methods considering their modeling techniques. Some new steganography techniques for hiding secret data in images are presented. Furthermore, steganography in speeches is reviewed, and a new approach for hiding data in speeches is introduced

    Currency security and forensics: a survey

    Get PDF
    By its definition, the word currency refers to an agreed medium for exchange, a nation’s currency is the formal medium enforced by the elected governing entity. Throughout history, issuers have faced one common threat: counterfeiting. Despite technological advancements, overcoming counterfeit production remains a distant future. Scientific determination of authenticity requires a deep understanding of the raw materials and manufacturing processes involved. This survey serves as a synthesis of the current literature to understand the technology and the mechanics involved in currency manufacture and security, whilst identifying gaps in the current literature. Ultimately, a robust currency is desire

    Elliptical Monogenic Wavelets for the analysis and processing of color images

    No full text
    International audienceThis paper studies and gives new algorithms for image processing based on monogenic wavelets. Existing greyscale monogenic filterbanks are reviewed and we reveal a lack of discussion about the synthesis part. The monogenic synthesis is therefore defined from the idea of wavelet modulation, and an innovative filterbank is constructed by using the Radon transform. The color extension is then investigated. First, the elliptical Fourier atom model is proposed to generalize theanalytic signal representation for vector-valued signals. Then a color Riesz-transform is defined so as to construct color elliptical monogenic wavelets. Our Radon-based monogenic filterbank can be easily extended to color according to this definition. The proposed wavelet representation provides efficient analysis of local features in terms of shape and color, thanks to the concepts of amplitude, phase, orientation, and ellipse parameters. The synthesis from local features is deeply studied. We conclude the article by defining the color local frequency, proposing an estimation algorithm

    Invisible watermarking of digital signals

    Get PDF
    Cílem téhle práce je navrhnutí nových technik pro robustní neviditelné značení digitálních signálů. Nejdříve je prezentován současný stav tohoto odvětví a dostupné softwarové řešení. Poté následuje návrh několika algoritmů pro neviditelné značení, přičemž každý z nich je založen na jiném principu. Dále je připravena sada digitálních testovacích signálů společně s testovacím softwarem pro otestování navržených řešení a jejích porovnání s vybraným dostupným softwarem. Poté následuje srovnání naměřených výsledků, výkonu a jejích diskuze.The aim of this thesis is to propose new techniques for robust invisible watermarking of digital signals. Firstly, state of the art and existing available software solutions are discussed. Then, design of multiple algorithms for invisible watermarking follows, each based on different principle. In order to enable benchmarking, suitable digital signals dataset is prepared. Also, testing benchmark is introduced, empowering multiple known attacks. Each presented solution is then benchmarked, as well as the introduced existing available software solutions for invisible watermarking. Results are then compared and discussed.

    Application and Theory of Multimedia Signal Processing Using Machine Learning or Advanced Methods

    Get PDF
    This Special Issue is a book composed by collecting documents published through peer review on the research of various advanced technologies related to applications and theories of signal processing for multimedia systems using ML or advanced methods. Multimedia signals include image, video, audio, character recognition and optimization of communication channels for networks. The specific contents included in this book are data hiding, encryption, object detection, image classification, and character recognition. Academics and colleagues who are interested in these topics will find it interesting to read

    Robust Lossless Semi Fragile Information Protection in Images

    Get PDF
    Internet security finds it difficult to keep the information secure and to maintain the integrity of the data. Sending messages over the internet secretly is one of the major tasks as it is widely used for passing the message. In order to achieve security there must be some mechanism to protect the data against unauthorized access. A lossless data hiding scheme is proposed in this paper which has a higher embedding capacity than other schemes. Unlike other schemes that are used for embedding fixed amount of data, the proposed data hiding method is block based approach and it uses a variable data embedding in different blocks which reduces the chances of distortion and increases the hiding capacity of the image. When the data is recovered the original image can be restored without any distortion. Our experimental results indicate that the proposed solution can significantly support the data hiding problem. We achieved good Peak signal-to-noise ratio (PSNR) while hiding large amount of data into smoother regions
    corecore