15 research outputs found

    Text hiding in text using invisible character

    Get PDF
    Steganography can be defined as the art and science of hiding information in the data that could be read by computer. This science cannot recognize stego-cover and the original one whether by eye or by computer when seeing the statistical samples. This paper presents a new method to hide text in text characters. The systematic method uses the structure of invisible character to hide and extract secret texts. The creation of secret message comprises four main stages such using the letter from the original message, selecting the suitable cover text, dividing the cover text into blocks, hiding the secret text using the invisible character and comparing the cover-text and stego-object. This study uses an invisible character (white space) position of in the cover text that used to hide the the secrete sender masseges. The experiments results show that the suggested method presents highly secret due to use the multi-level of complexity to avoid the attackers

    Applied Metaheuristic Computing

    Get PDF
    For decades, Applied Metaheuristic Computing (AMC) has been a prevailing optimization technique for tackling perplexing engineering and business problems, such as scheduling, routing, ordering, bin packing, assignment, facility layout planning, among others. This is partly because the classic exact methods are constrained with prior assumptions, and partly due to the heuristics being problem-dependent and lacking generalization. AMC, on the contrary, guides the course of low-level heuristics to search beyond the local optimality, which impairs the capability of traditional computation methods. This topic series has collected quality papers proposing cutting-edge methodology and innovative applications which drive the advances of AMC

    Applied Methuerstic computing

    Get PDF
    For decades, Applied Metaheuristic Computing (AMC) has been a prevailing optimization technique for tackling perplexing engineering and business problems, such as scheduling, routing, ordering, bin packing, assignment, facility layout planning, among others. This is partly because the classic exact methods are constrained with prior assumptions, and partly due to the heuristics being problem-dependent and lacking generalization. AMC, on the contrary, guides the course of low-level heuristics to search beyond the local optimality, which impairs the capability of traditional computation methods. This topic series has collected quality papers proposing cutting-edge methodology and innovative applications which drive the advances of AMC

    Data Hiding and Its Applications

    Get PDF
    Data hiding techniques have been widely used to provide copyright protection, data integrity, covert communication, non-repudiation, and authentication, among other applications. In the context of the increased dissemination and distribution of multimedia content over the internet, data hiding methods, such as digital watermarking and steganography, are becoming increasingly relevant in providing multimedia security. The goal of this book is to focus on the improvement of data hiding algorithms and their different applications (both traditional and emerging), bringing together researchers and practitioners from different research fields, including data hiding, signal processing, cryptography, and information theory, among others

    Secure covert communications over streaming media using dynamic steganography

    Get PDF
    Streaming technologies such as VoIP are widely embedded into commercial and industrial applications, so it is imperative to address data security issues before the problems get really serious. This thesis describes a theoretical and experimental investigation of secure covert communications over streaming media using dynamic steganography. A covert VoIP communications system was developed in C++ to enable the implementation of the work being carried out. A new information theoretical model of secure covert communications over streaming media was constructed to depict the security scenarios in streaming media-based steganographic systems with passive attacks. The model involves a stochastic process that models an information source for covert VoIP communications and the theory of hypothesis testing that analyses the adversary‘s detection performance. The potential of hardware-based true random key generation and chaotic interval selection for innovative applications in covert VoIP communications was explored. Using the read time stamp counter of CPU as an entropy source was designed to generate true random numbers as secret keys for streaming media steganography. A novel interval selection algorithm was devised to choose randomly data embedding locations in VoIP streams using random sequences generated from achaotic process. A dynamic key updating and transmission based steganographic algorithm that includes a one-way cryptographical accumulator integrated into dynamic key exchange for covert VoIP communications, was devised to provide secure key exchange for covert communications over streaming media. The discrete logarithm problem in mathematics and steganalysis using t-test revealed the algorithm has the advantage of being the most solid method of key distribution over a public channel. The effectiveness of the new steganographic algorithm for covert communications over streaming media was examined by means of security analysis, steganalysis using non parameter Mann-Whitney-Wilcoxon statistical testing, and performance and robustness measurements. The algorithm achieved the average data embedding rate of 800 bps, comparable to other related algorithms. The results indicated that the algorithm has no or little impact on real-time VoIP communications in terms of speech quality (< 5% change in PESQ with hidden data), signal distortion (6% change in SNR after steganography) and imperceptibility, and it is more secure and effective in addressing the security problems than other related algorithms

    Teknik penyembunyian mesej dalam steganografi teks menggunakan pendekatan warna RGB dan penempatan rawak

    Get PDF
    Steganography is a technique that protects the confidentiality and integrity of data in a protective medium from suspicion of hidden data. The hiding of a message in a text medium can be performed on various text attributes such as type, style, size, and font color to generate a stego text. This study have identified two main problems that lead to the suspicion towards the stego text which is the obvious change of colors of the generated stego and the static representation of the secret message characters using sequential selection of hiding location. Therefore, the main objective of this study is to propose the use of specific value for each combination of Red, Green, Blue (RGB) color to reduce the generated stego text obvious color changes. This study also recommends a dynamic secret message representation method based on a randomly selected character location. A Homophonic Cipher Table was adapted as a method to generate the dynamic secret message characters. Besides, the Second Quotient Remainder Theorem was proposed to convert the secret message characters into a 3D representation by mapping (x,y,z) values to RGB color. The RGB color cube model values of RGB(0,0,0) to RGB(15,15,15) were used to format a selected cover text characters using the Pseudorandom Number Generator. The performance of stego text produced in this study was evaluated using three main measures namely capacity, imperceptibility, and robustness. The results revealed that the proposed method produces a better performance of secret message hiding by 41.31% increase in capacity and the Jaro Winkler's scale imperceptibility score of 1. The performance of stego text is proven to be robust as there is no difference compared to the cover text before and after the compression process. In conclusion, the proposed method has successfully reduced the generated stego text obviousness in the change of colors that lead to suspicion of existence of hidden message. Beside, this method also capable of producing dynamic secret messages using a single cover text

    Exploring annotations for deductive verification

    Get PDF

    Childhoods dis-ordered: Non-realist narrative modes in selected post-2000 West African war novels

    Get PDF
    Philosophiae Doctor - PhDThis study explores how selected West African war novels employ non-realist narrative modes to portray disruptions in the child’s development into adulthood. The novels considered are Chris Abani’s Song for Night (2007), Ahmadou Kourouma’s Allah is Not Obliged (2006), Uzodinma Iweala’s Beasts of No Nation (2005) and Delia Jarrett-Macauley’s Moses, Citizen and Me (2005). These novels strain at the conventions of realism as a consequence of the attempt to represent the disruptions in child development as a result of the upheavals of war. A core proposition of the study is to present why the authors in question are obliged to employ non-realist modes in representing disrupted childhoods that reflect the social and cultural disorder attendant upon war. The dissertation also asks pertinent questions regarding the ideological effect of these narrative strategies and the effect of the particular stylistic idiosyncrasies of each of the authors in figuring childhood in postcolonial Africa. The novels in question employ surrealism, the absurd, the grotesque and magical realism, in presenting the first person narratives of children in war situations, or the reflections of adult narrators on children affected by war. This study further analyses the ways the aesthetic modes employed by these authors underscore, in particular, children’s experiences of war. Through strategic use of specific literary techniques, these authors highlight questions of vulnerability, powerlessness and violence on children, as a group that has been victimised and co-opted into violence. The study further considers how these narrative transformations in the representations of children in novels, capture transformations in ideas about childhood in postcolonial Africa
    corecore