594 research outputs found
Steganography: a class of secure and robust algorithms
This research work presents a new class of non-blind information hiding
algorithms that are stego-secure and robust. They are based on some finite
domains iterations having the Devaney's topological chaos property. Thanks to a
complete formalization of the approach we prove security against watermark-only
attacks of a large class of steganographic algorithms. Finally a complete study
of robustness is given in frequency DWT and DCT domains.Comment: Published in The Computer Journal special issue about steganograph
Review on DNA Cryptography
Cryptography is the science that secures data and communication over the
network by applying mathematics and logic to design strong encryption methods.
In the modern era of e-business and e-commerce the protection of
confidentiality, integrity and availability (CIA triad) of stored information
as well as of transmitted data is very crucial. DNA molecules, having the
capacity to store, process and transmit information, inspires the idea of DNA
cryptography. This combination of the chemical characteristics of biological
DNA sequences and classical cryptography ensures the non-vulnerable
transmission of data. In this paper we have reviewed the present state of art
of DNA cryptography.Comment: 31 pages, 12 figures, 6 table
Undetectable Communication: The Online Social Networks Case
Online Social Networks (OSNs) provide users with
an easy way to share content, communicate, and update others
about their activities. They also play an increasingly fundamental
role in coordinating and amplifying grassroots movements, as
demonstrated by recent uprisings in, e.g., Egypt, Tunisia, and
Turkey. At the same time, OSNs have become primary targets
of tracking, profiling, as well as censorship and surveillance. In
this paper, we explore the notion of undetectable communication
in OSNs and introduce formal definitions, alongside system and
adversarial models, that complement better understood notions
of anonymity and confidentiality. We present a novel scheme
for secure covert information sharing that, to the best of our
knowledge, is the first to achieve undetectable communication
in OSNs. We demonstrate, via an open-source prototype, that
additional costs are tolerably low
Using Transcoding for Hidden Communication in IP Telephony
The paper presents a new steganographic method for IP telephony called
TranSteg (Transcoding Steganography). Typically, in steganographic
communication it is advised for covert data to be compressed in order to limit
its size. In TranSteg it is the overt data that is compressed to make space for
the steganogram. The main innovation of TranSteg is to, for a chosen voice
stream, find a codec that will result in a similar voice quality but smaller
voice payload size than the originally selected. Then, the voice stream is
transcoded. At this step the original voice payload size is intentionally
unaltered and the change of the codec is not indicated. Instead, after placing
the transcoded voice payload, the remaining free space is filled with hidden
data. TranSteg proof of concept implementation was designed and developed. The
obtained experimental results are enclosed in this paper. They prove that the
proposed method is feasible and offers a high steganographic bandwidth.
TranSteg detection is difficult to perform when performing inspection in a
single network localisation.Comment: 17 pages, 16 figures, 4 table
Hiding Functions within Functions: Steganography by Implicit Neural Representations
Deep steganography utilizes the powerful capabilities of deep neural networks
to embed and extract messages, but its reliance on an additional message
extractor limits its practical use due to the added suspicion it can raise from
steganalyzers. To address this problem, we propose StegaINR, which utilizes
Implicit Neural Representation (INR) to implement steganography. StegaINR
embeds a secret function into a stego function, which serves as both the
message extractor and the stego media for secure transmission on a public
channel. Recipients need only use a shared key to recover the secret function
from the stego function, allowing them to obtain the secret message. Our
approach makes use of continuous functions, enabling it to handle various types
of messages. To our knowledge, this is the first work to introduce INR into
steganography. We performed evaluations on image and climate data to test our
method in different deployment contexts
HIGH CAPACITY AND OPTIMIZED IMAGE STEGANOGRAPHY TECHNIQUE BASED ON ANT COLONY OPTIMIZATION ALGORITHM
The tremendous development of digital technology, it is mandatory to address the security while transmitting information over network in a way that observer couldn’t depict it. Measures to be taken to provide the security by establishing hidden communication using steganography principle which is help to camouflage the secret information in some carrier file such as text, image, audio and video. In this era of hidden data communication, image becoming an effective tool on account of their frequency, capability and accuracy. Image steganography uses an image as a carrier medium to hide the secret data. The main motive of this article is that the uses the combination of frequency domain and optimization method inorder to increasing in robustness. In this article, Integer Wavelet transform is performed into the host image and coefficients have been transformed. ACO optimization algorithm is used to find the optimal coefficients where to hide the data. Furthermore, sample images and information having been demonstrated which proved the increased robustness as well as high level of data embedding capacity
Big Data Security (Volume 3)
After a short description of the key concepts of big data the book explores on the secrecy and security threats posed especially by cloud based data storage. It delivers conceptual frameworks and models along with case studies of recent technology
- …