11,356 research outputs found

    Print-Scan Resilient Text Image Watermarking Based on Stroke Direction Modulation for Chinese Document Authentication

    Get PDF
    Print-scan resilient watermarking has emerged as an attractive way for document security. This paper proposes an stroke direction modulation technique for watermarking in Chinese text images. The watermark produced by the idea offers robustness to print-photocopy-scan, yet provides relatively high embedding capacity without losing the transparency. During the embedding phase, the angle of rotatable strokes are quantized to embed the bits. This requires several stages of preprocessing, including stroke generation, junction searching, rotatable stroke decision and character partition. Moreover, shuffling is applied to equalize the uneven embedding capacity. For the data detection, denoising and deskewing mechanisms are used to compensate for the distortions induced by hardcopy. Experimental results show that our technique attains high detection accuracy against distortions resulting from print-scan operations, good quality photocopies and benign attacks in accord with the future goal of soft authentication

    A Taxonomy of Hyperlink Hiding Techniques

    Full text link
    Hidden links are designed solely for search engines rather than visitors. To get high search engine rankings, link hiding techniques are usually used for the profitability of black industries, such as illicit game servers, false medical services, illegal gambling, and less attractive high-profit industry, etc. This paper investigates hyperlink hiding techniques on the Web, and gives a detailed taxonomy. We believe the taxonomy can help develop appropriate countermeasures. Study on 5,583,451 Chinese sites' home pages indicate that link hidden techniques are very prevalent on the Web. We also tried to explore the attitude of Google towards link hiding spam by analyzing the PageRank values of relative links. The results show that more should be done to punish the hidden link spam.Comment: 12 pages, 2 figure

    Coverless Information Hiding Based on Generative adversarial networks

    Full text link
    Traditional image steganography modifies the content of the image more or less, it is hard to resist the detection of image steganalysis tools. To address this problem, a novel method named generative coverless information hiding method based on generative adversarial networks is proposed in this paper. The main idea of the method is that the class label of generative adversarial networks is replaced with the secret information as a driver to generate hidden image directly, and then extract the secret information from the hidden image through the discriminator. It's the first time that the coverless information hiding is achieved by generative adversarial networks. Compared with the traditional image steganography, this method does not modify the content of the original image. therefore, this method can resist image steganalysis tools effectively. In terms of steganographic capacity, anti-steganalysis, safety and reliability, the experimen shows that this hidden algorithm performs well.Comment: arXiv admin note: text overlap with arXiv:1703.05502 by other author

    Spec-ResNet: A General Audio Steganalysis scheme based on Deep Residual Network of Spectrogram

    Full text link
    The widespread application of audio and video communication technology make the compressed audio data flowing over the Internet, and make it become an important carrier for covert communication. There are many steganographic schemes emerged in the mainstream audio compression data, such as AAC and MP3, followed by many steganalysis schemes. However, these steganalysis schemes are only effective in the specific embedded domain. In this paper, a general steganalysis scheme Spec-ResNet (Deep Residual Network of Spectrogram) is proposed to detect the steganography schemes of different embedding domain for AAC and MP3. The basic idea is that the steganographic modification of different embedding domain will all introduce the change of the decoded audio signal. In this paper, the spectrogram, which is the visual representation of the spectrum of frequencies of audio signal, is adopted as the input of the feature network to extract the universal features introduced by steganography schemes; Deep Neural Network Spec-ResNet is well-designed to represent the steganalysis feature; and the features extracted from different spectrogram windows are combined to fully capture the steganalysis features. The experiment results show that the proposed scheme has good detection accuracy and generality. The proposed scheme has better detection accuracy for three different AAC steganographic schemes and MP3Stego than the state-of-arts steganalysis schemes which are based on traditional hand-crafted or CNN-based feature. To the best of our knowledge, the audio steganalysis scheme based on the spectrogram and deep residual network is first proposed in this paper. The method proposed in this paper can be extended to the audio steganalysis of other codec or audio forensics.Comment: 12 pages, 11 figures, 5 table

    FontCode: Embedding Information in Text Documents using Glyph Perturbation

    Full text link
    We introduce FontCode, an information embedding technique for text documents. Provided a text document with specific fonts, our method embeds user-specified information in the text by perturbing the glyphs of text characters while preserving the text content. We devise an algorithm to chooses unobtrusive yet machine-recognizable glyph perturbations, leveraging a recently developed generative model that alters the glyphs of each character continuously on a font manifold. We then introduce an algorithm that embeds a user-provided message in the text document and produces an encoded document whose appearance is minimally perturbed from the original document. We also present a glyph recognition method that recovers the embedded information from an encoded document stored as a vector graphic or pixel image, or even on a printed paper. In addition, we introduce a new error-correction coding scheme that rectifies a certain number of recognition errors. Lastly, we demonstrate that our technique enables a wide array of applications, using it as a text document metadata holder, an unobtrusive optical barcode, a cryptographic message embedding scheme, and a text document signature

    Discrete Wavelet Transform and Gradient Difference based approach for text localization in videos

    Full text link
    The text detection and localization is important for video analysis and understanding. The scene text in video contains semantic information and thus can contribute significantly to video retrieval and understanding. However, most of the approaches detect scene text in still images or single video frame. Videos differ from images in temporal redundancy. This paper proposes a novel hybrid method to robustly localize the texts in natural scene images and videos based on fusion of discrete wavelet transform and gradient difference. A set of rules and geometric properties have been devised to localize the actual text regions. Then, morphological operation is performed to generate the text regions and finally the connected component analysis is employed to localize the text in a video frame. The experimental results obtained on publicly available standard ICDAR 2003 and Hua dataset illustrate that the proposed method can accurately detect and localize texts of various sizes, fonts and colors. The experimentation on huge collection of video databases reveal the suitability of the proposed method to video databases.Comment: Fifth International Conference on Signals and Image Processing, IEEE, DOI 10.1109/ICSIP.2014.50, pp. 280-284, held at BNMIT, Bangalore in January 201

    Lossless Secret Image Sharing Schemes

    Full text link
    Secret image sharing deals with splitting confidential images into several shares and the original image can be reconstructed from the qualified subset of the shares. Secret sharing schemes are used in transmission and storage of private medical images and military secrets. Increased confidentiality and availability are the major achievements. We propose an efficient (2, 2) scheme and (2, 3) scheme for secret image sharing. The scheme is lossless and also the share size is same as the secret size. The sharing and revealing phase uses simple modular arithmetic which can be very easily implemented. Experimental results on Binary and Gray scale images show that the proposed scheme is secure and efficient.Comment: International Journal of Computational Intelligence and Information Security Vol. 4 April 2013, ISSN: 1837-782

    Fast Steganalysis Method for VoIP Streams

    Full text link
    In this letter, we present a novel and extremely fast steganalysis method of Voice over IP (VoIP) streams, driven by the need for a quick and accurate detection of possible steganography in VoIP streams. We firstly analyzed the correlations in carriers. To better exploit the correlation in code-words, we mapped vector quantization code-words into a semantic space. In order to achieve high detection efficiency, only one hidden layer is utilized to extract the correlations between these code-words. Finally, based on the extracted correlation features, we used the softmax classifier to categorize the input stream carriers. To boost the performance of this proposed model, we incorporate a simple knowledge distillation framework into the training process. Experimental results show that the proposed method achieves state-of-the-art performance both in detection accuracy and efficiency. In particular, the processing time of this method on average is only about 0.05\% when sample length is as short as 0.1s, attaching strong practical value to online serving of steganography monitor.Comment: 5 pages, 2 figure

    Deep Learning in Information Security

    Full text link
    Machine learning has a long tradition of helping to solve complex information security problems that are difficult to solve manually. Machine learning techniques learn models from data representations to solve a task. These data representations are hand-crafted by domain experts. Deep Learning is a sub-field of machine learning, which uses models that are composed of multiple layers. Consequently, representations that are used to solve a task are learned from the data instead of being manually designed. In this survey, we study the use of DL techniques within the domain of information security. We systematically reviewed 77 papers and presented them from a data-centric perspective. This data-centric perspective reflects one of the most crucial advantages of DL techniques -- domain independence. If DL-methods succeed to solve problems on a data type in one domain, they most likely will also succeed on similar data from another domain. Other advantages of DL methods are unrivaled scalability and efficiency, both regarding the number of examples that can be analyzed as well as with respect of dimensionality of the input data. DL methods generally are capable of achieving high-performance and generalize well. However, information security is a domain with unique requirements and challenges. Based on an analysis of our reviewed papers, we point out shortcomings of DL-methods to those requirements and discuss further research opportunities

    Image in Image Steganography based on modified Advanced Encryption Standard and Lest Significant Bit Algorithms

    Get PDF
    الستيكانوغرافي هو فن لإخفاء المعلومات او البيانات أو تضمينها في وسائط رقمية مختلفة مثل الصور، الفيديو، الصوت والنصوص. وان هناك الكثير من التقنيات لتحقيق عملية الإخفاء. في هذا البحث قمنا بحماية البيانات أو أي معلومات بطريقتين: التشفير والإخفاء. الغرض الأساسي من البحث هي تقديم طريقة تشفير مطورة للرسالة أولا باستخدام خوارزمية (التشفير القياسي المتقدم)AES   هو تشفير مفتاح متماثل حيث ان لكل شفرة من الشفرات بحجم كتلة 128 بت، حيث ان الأحجام الرئيسية هي  من 128، 192، 256 بت. ثانيا نقوم بإخفاء تلك الرسالة المشفرة في الحدود الخارجية للصورة الملونة (الإطار الخارجي للصورة الغلاف) باستخدام دالة LSB (البت الأقل اهمية) في ملفات الصورة الغلاف التي تكون بامتداد (bmp) أو(Jpeg) علما ان الخوارزمية الأخيرة تتسم بالضعف تجاه الهجمات لذلك تم تطويرها وتدعيمها بخوارزمية AES لزيادة الأمن ضد اي هجوم محتمل اثناء ارسالها عبر شبكة الانترنيت من المرسل الى المستلم.Because the big grown of the digital market and the growing demand for protection to data and information which transmitted through the Internet. Steganography is the art of embedding, hiding information into different digital media, it was the main reason to increase its importance in the exponential development of the secret communication of computer and digital cloud users over the internet. There are a lot of techniques and different ways to achieve hiding data. Usually, the data embedding is obtained in communication such as image, text, voice or any multimedia content for copyright and also in military communication for authentication and many other different purposes. In this paper, we protected the information in two ways: Encryption and Steganography. The basic idea is to present a method that encrypted the message firstly by using The AES (Advanced Encryption Standard) it is a symmetric-key encryption each of these ciphers it has 128-bit the size to block, and size keys of 128, 192 and 256 bits.  Secondly, hide that encrypted message in color cover image in the Least Significant Bit (LSB) to image’s frame with (.bmp, .jpg) extensions. Our scheme is to enhance the ability of LSB algorithm to include the storage of information and images encoded and intangible sense of human vision. That two methods to increased together the security attend any attack
    corecore