131 research outputs found
Steganography: a class of secure and robust algorithms
This research work presents a new class of non-blind information hiding
algorithms that are stego-secure and robust. They are based on some finite
domains iterations having the Devaney's topological chaos property. Thanks to a
complete formalization of the approach we prove security against watermark-only
attacks of a large class of steganographic algorithms. Finally a complete study
of robustness is given in frequency DWT and DCT domains.Comment: Published in The Computer Journal special issue about steganograph
Data hiding in multimedia - theory and applications
Multimedia data hiding or steganography is a means of communication using subliminal channels. The resource for the subliminal communication scheme is the distortion of the original content that can be tolerated. This thesis addresses two main issues of steganographic communication schemes:
1. How does one maximize the distortion introduced without affecting fidelity of the content?
2. How does one efficiently utilize the resource (the distortion introduced) for communicating as many bits of information as possible? In other words, what is a good signaling strategy for the subliminal communication scheme?
Close to optimal solutions for both issues are analyzed. Many techniques for the issue for maximizing the resource, viz, the distortion introduced imperceptibly in images and video frames, are proposed. Different signaling strategies for steganographic communication are explored, and a novel signaling technique employing a floating signal constellation is proposed. Algorithms for optimal choices of the parameters of the signaling technique are presented.
Other application specific issues like the type of robustness needed are taken into consideration along with the established theoretical background to design optimal data hiding schemes. In particular, two very important applications of data hiding are addressed - data hiding for multimedia content delivery, and data hiding for watermarking (for proving ownership). A robust watermarking protocol for unambiguous resolution of ownership is proposed
Privacy-preserving information hiding and its applications
The phenomenal advances in cloud computing technology have raised concerns about data privacy. Aided by the modern cryptographic techniques such as homomorphic encryption, it has become possible to carry out computations in the encrypted domain and process data without compromising information privacy. In this thesis, we study various classes of privacy-preserving information hiding schemes and their real-world applications for cyber security, cloud computing, Internet of things, etc.
Data breach is recognised as one of the most dreadful cyber security threats in which private data is copied, transmitted, viewed, stolen or used by unauthorised parties. Although encryption can obfuscate private information against unauthorised viewing, it may not stop data from illegitimate exportation. Privacy-preserving Information hiding can serve as a potential solution to this issue in such a manner that a permission code is embedded into the encrypted data and can be detected when transmissions occur.
Digital watermarking is a technique that has been used for a wide range of intriguing applications such as data authentication and ownership identification. However, some of the algorithms are proprietary intellectual properties and thus the availability to the general public is rather limited. A possible solution is to outsource the task of watermarking to an authorised cloud service provider, that has legitimate right to execute the algorithms as well as high computational capacity. Privacypreserving Information hiding is well suited to this scenario since it is operated in the encrypted domain and hence prevents private data from being collected by the cloud.
Internet of things is a promising technology to healthcare industry. A common framework consists of wearable equipments for monitoring the health status of an individual, a local gateway device for aggregating the data, and a cloud server for storing and analysing the data. However, there are risks that an adversary may attempt to eavesdrop the wireless communication, attack the gateway device or even access to the cloud server. Hence, it is desirable to produce and encrypt the data simultaneously and incorporate secret sharing schemes to realise access control. Privacy-preserving secret sharing is a novel research for fulfilling this function.
In summary, this thesis presents novel schemes and algorithms, including:
• two privacy-preserving reversible information hiding schemes based upon symmetric cryptography using arithmetic of quadratic residues and lexicographic permutations, respectively.
• two privacy-preserving reversible information hiding schemes based upon asymmetric cryptography using multiplicative and additive privacy homomorphisms, respectively.
• four predictive models for assisting the removal of distortions inflicted by information hiding based respectively upon projection theorem, image gradient, total variation denoising, and Bayesian inference.
• three privacy-preserving secret sharing algorithms with different levels of generality
Data Hiding in Gray-Scale Images by LSB Method using IWT with Lifting Scheme
This paper introduced a completely unique steganography technique to extend the capability and therefore the physical property of the image once embedding. Genetic rule utilized to get associate degree optimum mapping operate to minimize the error distinction between the quilt and therefore the stego image and use the block mapping technique to preserve the native image properties. Additionally we have a tendency to applied the OPAP to extend the activi ty capability of the rule comp are d to different systems. However, the process complexity of the new rule is high. The simulation results showed that capability and physical property of image had enl arg ed timing. Also, we will choose the most effective blo ck size to scale back the computation value and to extend the PSNR victimisation optimisation algorithms like GA
Recommended from our members
Secure digital documents using Steganography and QR Code
This thesis was submitted for the degree of Doctor of Philosophy and awarded by Brunel University LondonWith the increasing use of the Internet several problems have arisen regarding the processing of electronic documents. These include content filtering, content retrieval/search. Moreover, document security has taken a centre stage including copyright protection, broadcast monitoring etc. There is an acute need of an effective tool which can find the identity, location and the time when the document was created so that it can be determined whether or not the contents of the document were tampered with after creation. Owing the sensitivity of the large amounts of data which is processed on a daily basis, verifying the authenticity and integrity of a document is more important now than it ever was. Unsurprisingly document authenticity verification has become the centre of attention in the world of research. Consequently, this research is concerned with creating a tool which deals with the above problem. This research proposes the use of a Quick Response Code as a message carrier for Text Key-print. The Text Key-print is a novel method which employs the basic element of the language (i.e. Characters of the alphabet) in order to achieve authenticity of electronic documents through the transformation of its physical structure into a logical structured relationship. The resultant dimensional matrix is then converted into a binary stream and encapsulated with a serial number or URL inside a Quick response Code (QR code) to form a digital fingerprint mark. For hiding a QR code, two image steganography techniques were developed based upon the spatial and the transform domains. In the spatial domain, three methods were proposed and implemented based on the least significant bit insertion technique and the use of pseudorandom number generator to scatter the message into a set of arbitrary pixels. These methods utilise the three colour channels in the images based on the RGB model based in order to embed one, two or three bits per the eight bit channel which results in three different hiding capacities. The second technique is an adaptive approach in transforming domain where a threshold value is calculated under a predefined location for embedding in order to identify the embedding strength of the embedding technique. The quality of the generated stego images was evaluated using both objective (PSNR) and Subjective (DSCQS) methods to ensure the reliability of our proposed methods. The experimental results revealed that PSNR is not a strong indicator of the perceived stego image quality, but not a bad interpreter also of the actual quality of stego images. Since the visual difference between the cover and the stego image must be absolutely imperceptible to the human visual system, it was logically convenient to ask human observers with different qualifications and experience in the field of image processing to evaluate the perceived quality of the cover and the stego image. Thus, the subjective responses were analysed using statistical measurements to describe the distribution of the scores given by the assessors. Thus, the proposed scheme presents an alternative approach to protect digital documents rather than the traditional techniques of digital signature and watermarking
Robust image steganography method suited for prining = Robustna steganografska metoda prilagođena procesu tiska
U ovoj doktorskoj dizertaciji prezentirana je robustna steganografska metoda razvijena i
prilagođena za tisak. Osnovni cilj metode je pružanje zaštite od krivotvorenja ambalaže.
Zaštita ambalaže postiže se umetanjem više bitova informacije u sliku pri enkoderu, a potom
maskiranjem informacije kako bi ona bila nevidljiva ljudskom oku. Informacija se pri
dekoderu detektira pomoću infracrvene kamere. Preliminarna istraživanja pokazala su da u
relevantnoj literaturi nedostaje metoda razvijenih za domenu tiska. Razlog za takav
nedostatak jest činjenica da razvijanje steganografskih metoda za tisak zahtjeva veću količinu
resursa i materijala, u odnosu na razvijanje sličnih domena za digitalnu domenu. Također,
metode za tisak često zahtijevaju višu razinu kompleksnosti, budući da se tijekom
reprodukcije pojavljuju razni oblici procesiranja koji mogu kompromitirati informaciju u slici
[1]. Da bi se sačuvala skrivena informacija, metoda mora biti otporna na procesiranje koje se
događa tijekom reprodukcije.
Kako bi se postigla visoka razina otpornosti, informacija se može umetnuti unutar
frekvencijske domene slike [2], [3]. Frekvencijskoj domeni slike možemo pristupiti pomoću
matematičkih transformacija. Najčešće se koriste diskretna kosinusna transformacija (DCT),
diskretna wavelet transformacija (DWT) i diskretna Fourierova transformacija (DFT) [2], [4].
Korištenje svake od navedenih transformacija ima određene prednosti i nedostatke, ovisno o
kontekstu razvijanja metode [5]. Za metode prilagođene procesu tiska, diskretna Fourierova
transformacija je optimalan odabir, budući da metode bazirane na DFT-u pružaju otpornost
na geometrijske transformacije koje se događaju tijekom reprodukcije [5], [6].
U ovom istraživanju korištene su slike u cmyk prostoru boja. Svaka slika najprije je
podijeljena u blokove, a umetanje informacije vrši se za svaki blok pojedinačno. Pomoću
DFT-a, ???? kanal slikovnog bloka se transformira u frekvencijsku domenu, gdje se vrši
umetanje informacije. Akromatska zamjena koristi se za maskiranje vidljivih artefakata
nastalih prilikom umetanja informacije. Primjeri uspješnog korištenja akromatske zamjene za
maskiranje artefakata mogu se pronaći u [7] i [8]. Nakon umetanja informacije u svaki
slikovni blok, blokovi se ponovno spajaju u jednu, jedinstvenu sliku. Akromatska zamjena
tada mijenja vrijednosti c, m i y kanala slike, dok kanal k, u kojemu se nalazi umetnuta
informacija, ostaje nepromijenjen. Time nakon maskiranja akromatskom zamjenom označena
slika posjeduje ista vizualna svojstva kao i slika prije označavanja. U eksperimentalnom dijelu rada koristi se 1000 slika u cmyk prostoru boja. U digitalnom
okruženju provedeno je istraživanje otpornosti metode na slikovne napade specifične za
reprodukcijski proces - skaliranje, blur, šum, rotaciju i kompresiju. Također, provedeno je
istraživanje otpornosti metode na reprodukcijski proces, koristeći tiskane uzorke. Objektivna
metrika bit error rate (BER) korištena je za evaluaciju. Mogućnost optimizacije metode
testirala se procesiranjem slike (unsharp filter) i korištenjem error correction kodova (ECC).
Provedeno je istraživanje kvalitete slike nakon umetanja informacije. Za evaluaciju su
korištene objektivne metrike peak signal to noise ratio (PSNR) i structural similarity index
measure (SSIM). PSNR i SSIM su tzv. full-reference metrike. Drugim riječima, potrebne su i
neoznačena i označena slika istovremeno, kako bi se mogla utvrditi razina sličnosti između
slika [9], [10]. Subjektivna analiza provedena je na 36 ispitanika, koristeći ukupno 144
uzorka slika. Ispitanici su ocijenjivali vidljivost artefakata na skali od nula (nevidljivo) do tri
(vrlo vidljivo).
Rezultati pokazuju da metoda posjeduje visoku razinu otpornosti na reprodukcijski proces.
Također, metoda se uistinu optimizirala korištenjem unsharp filtera i ECC-a. Kvaliteta slike
ostaje visoka bez obzira na umetanje informacije, što su potvrdili rezultati eksperimenata s
objektivnim metrikama i subjektivna analiza
An Overview of Steganography for the Computer Forensics Examiner (Updated Version, February 2015)
Steganography is the art of covered or hidden writing. The purpose of steganography is covert communication-to hide the existence of a message from a third party. This paper is intended as a high-level technical introduction to steganography for those unfamiliar with the field. It is directed at forensic computer examiners who need a practical understanding of steganography without delving into the mathematics, although references are provided to some of the ongoing research for the person who needs or wants additional detail. Although this paper provides a historical context for steganography, the emphasis is on digital applications, focusing on hiding information in online image or audio files. Examples of software tools that employ steganography to hide data inside of other files as well as software to detect such hidden files will also be presented.
An edited version originally published in the July 2004 issues of Forensic Science Communications
Security during Transmission of Data Using Web Steganography
The project entitled Steganography is to give security to a content record. Since the security of the data over the internet has raised a concern to the people. There are many methods to protect the data from going into the access of unauthorized people. Steganography can be used along with the encryption technique to secure the data. Steganography is used to hide the data or a secret message whereas cryptography is used to encrypt the message and make it difficult the people to read. So, the proposed system is to combine both steganography and cryptography for the secret data transmission. The transmission can be done by using an image as a carrier of data. This paper uses high-performance BMP steganography along with a substitution encryption methodology. The approach that is used here is IDEA (International Data Encryption Algorithm) algorithm which is used for encryption. The IDEA algorithm works as follows, it will take the TEXT document and mystery key as the input and gives the encrypted and BMP picture as the output for the sender side. There can additionally be “Voice Recognition System” framework so that it can use voice to decrypt the message. This is the future expansion or scope of this paper
- …