1,584 research outputs found
An Efficient Approach to Secure Versatile Data File in Video using Forbidden Zone Data Hiding Technique
Video Steganography is a technique in which we can hide all types of files with any extension into a carrying Video file. In this dissertation, we are using two main terminology that is host file and carrier file where host file is a hidden file (any kind of file like text file, image file, and audio/video file) and carrier file must be a video file. The main motivation of this dissertation is to secure transferring of data by using steganography and cryptography technique. It is concerned with embedding information in an innocuous cover media in a secure and robust manner. In this dissertation we are using Forbidden Zone Data Hiding technique where no alteration is required in host signal range during data hiding process.To securely transferring the data file, we use video data hiding and making use of correction capacity of repeat accumulate code with superiority of forbidden zone data hiding. Using this approach we can also hide and transfer the large video file whose size is larger than cover file in secure manner. The main advantage of using video file in hiding information is the added security against of the third party or unintended receiver due to the relative complexity of video compared to image and audio file
Hybrid Cryptography and Steganography-Based Security System for IoT Networks
Despite the fact that many IoT devices are publicly accessible to everyone on the network, understanding the security risks and threats posed by cyber attacks is critical; as a result, it should be safeguarded. Plain text is constructed into encrypted text, before being delivered by using cryptography, and is then reconstructed back to plain text after receiving a response from the recipient. The steganography technique can be used to hide sensitive information incorporated in a text, audio, or video file. One approach is to hide data in bits that correspond to successive rows of pixels with the same color in an image file. As a consequence, the image file retains the original's appearance while also containing "noise" patterns made out of common, unencrypted data. To do this, the encrypted data is subtly applied to the redundant data. In this work, it is suggested that IoT network data be encrypted using cryptography, and that an encrypted message be concealed inside an image file using steganography. Additionally, it is suggested to enhance the number of bits that may be stored within a single picture pixel. The payload that may be sent through an image is significantly increased by incorporating Convolutional Neural Networks into the classic steganography technique. In this work, we propose, design, and train Convolutional Neural Networks (CNN) to enhance the amount of data that can be securely encrypted and decrypted to show the original message
Novel Framework for Hidden Data in the Image Page within Executable File Using Computation between Advanced Encryption Standard and Distortion Techniques
The hurried development of multimedia and internet allows for wide
distribution of digital media data. It becomes much easier to edit, modify and
duplicate digital information. In additional, digital document is also easy to
copy and distribute, therefore it may face many threats. It became necessary to
find an appropriate protection due to the significance, accuracy and
sensitivity of the information. Furthermore, there is no formal method to be
followed to discover a hidden data. In this paper, a new information hiding
framework is presented.The proposed framework aim is implementation of
framework computation between advance encryption standard (AES) and distortion
technique (DT) which embeds information in image page within executable file
(EXE file) to find a secure solution to cover file without change the size of
cover file. The framework includes two main functions; first is the hiding of
the information in the image page of EXE file, through the execution of four
process (specify the cover file, specify the information file, encryption of
the information, and hiding the information) and the second function is the
extraction of the hiding information through three process (specify the stego
file, extract the information, and decryption of the information).Comment: 6 Pages IEEE Format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.42
- โฆ