698 research outputs found

    Histogram-based multilayer reversible data hiding method for securing secret data

    Get PDF
    In this modern age, data can be easily transferred within networks. This condition has brought the data vulnerable; so they need protection at all times. To minimize this threat, data hiding appears as one of the potential methods to secure data. This protection is done by embedding the secret into various types of data, such as an image. In this case, histogram shifting has been proposed; however, the amount of secret and the respective stego image are still challenging. In this research, we offer a method to improve its performance by performing some steps, for example removing the shifting process and employing multilayer embedding. Here, the embedding is done directly to the peak of the histogram which has been generated by the cover. The experimental results show that this proposed method has a better quality of stego image than existing ones. So, it can be one of possible solutions to protect sensitive data

    Enhancement Of Pixel Value Ordering Based Data Hiding By Row Block Partition

    Get PDF
    The development of information and communication technology that support digital data transmission such as text, image, audio and video gives several effects. One of them is data security that becomes the main priority during the transmission process. Pixel-Value-Ordering (PVO) which one of data hiding methods can be implemented to achieve the requirement. It embeds data on maximum pixel and minimum pixel in a blok which is a part of the carrier image. However, PVO has capacity a problem, that only 2 bits per block can be hidden. To handle this problem, we propose a new approach by dividing blocks dinamically based on its complexity. These blocks are grouped into 4: smooth block, semi-smooth block, normal block and rough block. Using this approach, the stego capacity can be improved up to 2.6 times in average of previous method by keeping the quality stego more than 65 dB for all testing image

    Video Steganography Technique Based on Enhanced Moving Objects Detection Method

    Get PDF
    مقدمة: أصبح إخفاء المعلومات عن طريق الفيديو خيارًا شائعًا لحماية البيانات السرية من محاولات القرصنة والهجمات الشائعة على الإنترنت. ومع ذلك ، عند استخدام إطار (إطارات) الفيديو بالكامل لتضمين بيانات سرية ، فقد يؤدي ذلك إلى تشويه بصري. طرق العمل: هذا العمل هو محاولة لإخفاء صورة سرية حساسة داخل الأجسام المتحركة في مقطع فيديو بناءً على فصل الكائن عن خلفية الإطار واختيارها وترتيبها حسب حجم الكائن لتضمين الصورة السرية. يتم استخدام تقنية XOR مع البتات العكسية بين بتات الصورة السرية وبتات الكائن المتحرك المكتشفة للتضمين. توفر الطريقة المقترحة مزيدًا من الأمان وعدم الإدراك حيث يتم استخدام الكائنات المتحركة للتضمين ، لذلك من الصعب ملاحظة التغييرات في الكائنات المتحركة بدلاً من استخدام منطقة الخلفية للتضمين في الفيديو. تم إجراء مزيد من التطوير للطريقة المقترحة في مجال إخفاء المعلومات بالفيديو من خلال تطبيق النموذج المكاني مع النموذج الإحصائي. تم أيضًا تطبيق أنماط LSB الإضافية لتقييم قدرة النهج المقترح في اكتشاف الأجسام المتحركة. بالإضافة إلى تقييم متانة الطريقة المقترحة ضد الهجمات المختلفة مثل ضوضاء الملح والفلفل والتصفية المتوسطة. الاستنتاجات: أظهرت النتائج التجريبية جودة بصرية أفضل لفيديو stego مع قيم PSNR تتجاوز 70 ديسيبل ، وهذا يشير إلى أن الطريقة المقترحة تعمل دون إحداث تشويه كبير في الفيديو الأصلي والرسالة السرية المرسلة.Video steganography has become a popular option for protecting secret data from hacking attempts and common attacks on the internet. However, when the whole video frame(s) are used to embed secret data, this may lead to visual distortion. Materials and Methods: This work is an attempt to hide sensitive secret image inside the moving objects in a video based on separating the object from the background of the frame, selecting and arranging them according to object's size for embedding secret image. The proposed approach reverses the secret image bits and uses XOR technique between the reversed bits and the detected moving object bits for embedding. The proposed approach provides more security and imperceptibility as the moving objects are used for embedding, so it is difficult to notice the changes in the moving objects instead of using background area for embedding in the video. Further development to the proposed approach in the area of video steganography has been done by applying spatial model in combination with statistical model. Additional LSB styles have been also applied to evaluate the ability of the proposed approach in detecting moving objects. In addition to evaluating the robustness of the proposed approach against different attacks such as salt and pepper noise and median filtering. Results: The experimental results showed the better visual quality of the stego video with PSNR values exceeding 70 dB, this indicates that the proposed method works without causing much distortion in the original video and transmitted secret message. Conclusion: The experimental proof of the proposed approach can successfully detect and embed secret image. Also, it provides more security and imperceptibility as the data was hidden in the moving objects and the updates in the moving objects are difficult to notice rather than the static region in a vide

    ENHANCEMENT OF PIXEL VALUE ORDERING BASED DATA HIDING BY ROW BLOCK PARTITION

    Get PDF
    The development of information and communication technology that support digital data transmission such as text, image, audio and video gives several effects. One of them is data security that becomes the main priority during the transmission process. Pixel-Value-Ordering (PVO) which one of data hiding methods can be implemented to achieve the requirement. It embeds data on maximum pixel and minimum pixel in a blok which is a part of the carrier image. However, PVO has capacity a problem, that only 2 bits per block can be hidden. To handle this problem, we propose a new approach by dividing blocks dinamically based on its complexity. These blocks are grouped into 4: smooth block, semi-smooth block, normal block and rough block. Using this approach, the stego capacity can be improved up to 2.6 times in average of  previous method by keeping the quality stego more than 65 dB for all testing image

    Protecting Information with Subcodstanography

    Get PDF
    In modern communication systems, one of the most challenging tasks involves the implementation of adequate methods for successful and secure transfer of confidential digital information over an unsecured communication channel. Many encryption algorithms have been developed for protection of confidential information. However, over time, flaws have been discovered even with the most sophisticated encryption algorithms. Each encryption algorithm can be decrypted within sufficient time and with sufficient resources. The possibility of decryption has increased with the development of computer technology since available computer speeds enable the decryption process based on the exhaustive data search. This has led to the development of steganography, a science which attempts to hide the very existence of confidential information. However, the stenography also has its disadvantages, listed in the paper. Hence, a new method which combines the favourable properties of cryptography based on substitution encryption and stenography is analysed in the paper. The ability of hiding the existence of confidential information comes from steganography and its encryption using a coding table makes its content undecipherable. This synergy greatly improves protection of confidential information

    Peningkatan Kualitas Citra Stego pada Adaptive Pixel Block Grouping Reduction Error Expansion dengan Variasi Model Scanning pada Pembentukan Kelompok Piksel

    Get PDF
    Kebutuhan komunikasi yang terus bertambah dan ditandai dengan meningkatnya jumlah IP traffic dari 744 EB menjadi 1.164 EB menjadikan keamanan sebagai salah satu kebutuhan utama dalam menjaga kerahasiaan data. Adaptive Pixel Block Grouping Reduction Error Expansion (APBG-REE) sebagai salah satu metode data hiding dapat diterapkan untuk memenuhi kebutuhan tersebut. Metode ini akan membagi citra carrier menjadi blok-blok dan membentuknya menjadi kelompok-kelompok piksel. Hasil dari proses ini akan dimanfaatkan untuk menyembunyikan data rahasia. Namun, metode ini memiliki kekurangan, yaitu belum diketahuinya metode scanning terbaik dalam pembentukan kelompok piksel untuk menciptakan citra stego dengan kualitas tinggi. Untuk mengatasi masalah ini, kami mengusulkan 4 mode (cara) scanning berdasarkan arah scanning tersebut. Mode scanning tersebut memberikan hasil yang berbeda-beda untuk masing-masing citra stego yang diujikan. Namun berdasarkan hasil uji coba, setiap mode scanning mampu menjaga kualitas citra stego diatas 57,5 dB. Hasil ini akan meningkat seiring dengan berkurangnya jumlah shifted pixel yang terbentuk.   Abstract The need of communication has increased continously which is represented by the rise of number of IP traffic, from 744 EB to 1.164 EB. This has made data security one of the main requirements in terms of securing secret data. Adaptive Pixel Block Grouping Reduction Error Expansion (APBG-REE) as one of data hiding methods can be implemented to meet that requirement. It divides the carrier image into blocks which are then used as pixel groups. The result of this process is to be a space for secret data. However, this method has a problem in the scanning when creating pixel groups to generate a high quality stego image. To handle this problem, we propose four scanning models base on its direction. This means that the scanning can be done row-by-row or column-by-column. Base on the experiment, we find that those modes deliver various results and each of them is able to maintain the stego quality of more than 57,5 dB. This result increases along with the decreasing the number of shifted pixels

    Selected Papers from the First International Symposium on Future ICT (Future-ICT 2019) in Conjunction with 4th International Symposium on Mobile Internet Security (MobiSec 2019)

    Get PDF
    The International Symposium on Future ICT (Future-ICT 2019) in conjunction with the 4th International Symposium on Mobile Internet Security (MobiSec 2019) was held on 17–19 October 2019 in Taichung, Taiwan. The symposium provided academic and industry professionals an opportunity to discuss the latest issues and progress in advancing smart applications based on future ICT and its relative security. The symposium aimed to publish high-quality papers strictly related to the various theories and practical applications concerning advanced smart applications, future ICT, and related communications and networks. It was expected that the symposium and its publications would be a trigger for further related research and technology improvements in this field

    An improved image steganography scheme based on distinction grade value and secret message encryption

    Get PDF
    Steganography is an emerging and greatly demanding technique for secure information communication over the internet using a secret cover object. It can be used for a wide range of applications such as safe circulation of secret data in intelligence, industry, health care, habitat, online voting, mobile banking and military. Commonly, digital images are used as covers for the steganography owing to their redundancy in the representation, making them hidden to the intruders, hackers, adversaries, unauthorized users. Still, any steganography system launched over the Internet can be cracked upon recognizing the stego cover. Thus, the undetectability that involves data imperceptibility or concealment and security is the significant trait of any steganography system. Presently, the design and development of an effective image steganography system are facing several challenges including low capacity, poor robustness and imperceptibility. To surmount such limitations, it is important to improve the capacity and security of the steganography system while maintaining a high signal-to-noise ratio (PSNR). Based on these factors, this study is aimed to design and develop a distinction grade value (DGV) method to effectively embed the secret data into a cover image for achieving a robust steganography scheme. The design and implementation of the proposed scheme involved three phases. First, a new encryption method called the shuffle the segments of secret message (SSSM) was incorporated with an enhanced Huffman compression algorithm to improve the text security and payload capacity of the scheme. Second, the Fibonacci-based image transformation decomposition method was used to extend the pixel's bit from 8 to 12 for improving the robustness of the scheme. Third, an improved embedding method was utilized by integrating a random block/pixel selection with the DGV and implicit secret key generation for enhancing the imperceptibility of the scheme. The performance of the proposed scheme was assessed experimentally to determine the imperceptibility, security, robustness and capacity. The standard USC-SIPI images dataset were used as the benchmarking for the performance evaluation and comparison of the proposed scheme with the previous works. The resistance of the proposed scheme was tested against the statistical, X2 , Histogram and non-structural steganalysis detection attacks. The obtained PSNR values revealed the accomplishment of higher imperceptibility and security by the proposed DGV scheme while a higher capacity compared to previous works. In short, the proposed steganography scheme outperformed the commercially available data hiding schemes, thereby resolved the existing issues
    corecore