385 research outputs found

    An enhanced method based on intermediate significant bit technique for watermark images

    Get PDF
    Intermediate Significant Bit digital watermarking technique (ISB) is a new approved technique of embedding a watermark by replacing the original image pixels with new pixels. This is done by ensuring a close connection between the new pixels and the original, and at the same time, the watermark data can be protected against possible damage. One of the most popular methods used in watermarking is the Least Significant Bit (LSB). It uses a spatial domain that includes the insertion of the watermark in the LSB of the image. The problem with this method is it is not resilient to common damage, and there is the possibility of image distortion after embedding a watermark. LSB may be used through replacing one bit, two bits, or three bits; this is done by changing the specific bits without any change in the other bits in the pixel. The objective of this thesis is to formulate new algorithms for digital image watermarking with enhanced image quality and robustness by embedding two bits of watermark data into each pixel of the original image based on ISB technique. However, to understand the opposite relationship between the image quality and robustness, a tradeoff between them has been done to create a balance and to acquire the best position for the two embedding bits. Dual Intermediate Significant Bits (DISB) technique has been proposed to solve the existing LSB problem. Trial results obtained from this technique are better compared with the LSB based on the Peak Signal to Noise Ratio (PSNR) and Normalized Cross Correlation (NCC). The work in this study also contributes new mathematical equations that can study the change on the other six bits in the pixel after embedding two bits

    Digital steganalysis: Computational intelligence approach

    Get PDF
    In this paper, we present a consolidated view of digital media steganalysis from the perspective of computational intelligence.In our analysis the digital media steganalysis is divided into three domains which are image steganalysis, audio steganalysis, and video steganalysis.Three major computational intelligence methods have also been identified in the steganalysis domains which are bayesian, neural network, and genetic algorithm.Each of these methods has its own pros and cons

    Symmetry-Adapted Machine Learning for Information Security

    Get PDF
    Symmetry-adapted machine learning has shown encouraging ability to mitigate the security risks in information and communication technology (ICT) systems. It is a subset of artificial intelligence (AI) that relies on the principles of processing future events by learning past events or historical data. The autonomous nature of symmetry-adapted machine learning supports effective data processing and analysis for security detection in ICT systems without the interference of human authorities. Many industries are developing machine-learning-adapted solutions to support security for smart hardware, distributed computing, and the cloud. In our Special Issue book, we focus on the deployment of symmetry-adapted machine learning for information security in various application areas. This security approach can support effective methods to handle the dynamic nature of security attacks by extraction and analysis of data to identify hidden patterns of data. The main topics of this Issue include malware classification, an intrusion detection system, image watermarking, color image watermarking, battlefield target aggregation behavior recognition model, IP camera, Internet of Things (IoT) security, service function chain, indoor positioning system, and crypto-analysis

    Data Hiding and Its Applications

    Get PDF
    Data hiding techniques have been widely used to provide copyright protection, data integrity, covert communication, non-repudiation, and authentication, among other applications. In the context of the increased dissemination and distribution of multimedia content over the internet, data hiding methods, such as digital watermarking and steganography, are becoming increasingly relevant in providing multimedia security. The goal of this book is to focus on the improvement of data hiding algorithms and their different applications (both traditional and emerging), bringing together researchers and practitioners from different research fields, including data hiding, signal processing, cryptography, and information theory, among others

    A Survey of Data Mining Techniques for Steganalysis

    Get PDF

    Recent Advances in Steganography

    Get PDF
    Steganography is the art and science of communicating which hides the existence of the communication. Steganographic technologies are an important part of the future of Internet security and privacy on open systems such as the Internet. This book's focus is on a relatively new field of study in Steganography and it takes a look at this technology by introducing the readers various concepts of Steganography and Steganalysis. The book has a brief history of steganography and it surveys steganalysis methods considering their modeling techniques. Some new steganography techniques for hiding secret data in images are presented. Furthermore, steganography in speeches is reviewed, and a new approach for hiding data in speeches is introduced

    Enhancement of digital grayscale image watermarking using sparse matrix

    Get PDF
    Watermarking is a form of steganography that proved its worth in successfully protecting copyright information. It is the process of embedding data inside an audio or video or image message such that the embedded data is possible to be detected or extracted later. The core focus in watermarking techniques is their performance which is determined by imperceptibility along with robustness and capacity. These properties are often conflicting, which needs to accept some trade-offs between them. Despite the successes recorder in the area of digital watermarking, several challenges continue to persist particularly in the Areas of balancing these factors. This research aims to enhance the the processes in the watermarking technique for archieving imperceptibility with an acceptable balancing and enhance the security. The research proposed a new scheme using sparse matrix for improving the effectiveness of watermarked image using digital wavelet transform and inverse discrete wavelet transform to locate the best place and level in the image to embed the watermark. Sparse matrix is used to enhance the embedding process by selecting the proper coefficient. For more secure watermarking, additional encryption layer is utilized to increase the difficulty towards unauthorized extraction. The proposed technique generated the proper message size for each sub image based on the PSNR, which is used as an indicator for selecting the suitable level of embedding and for detecting the possibility of attacks. The proposed scheme improves watermarking quality by using the sparse matrix to select the appropriate coefficient for embedding. The experiments showed that the proposed scheme enhances 2.8479 dB of quality (PSNR) or equivalent to 5.3 % of improvements. The research proposed scheme achieved better PSNR in comparison with other research
    corecore