16 research outputs found

    A Modified Approch Audio Stagnography Based On Technique LSB Coding

    Full text link
    Information security is becoming very important part of our life now-a-days. Information hiding is the fundamental of information security. Information hiding can be achieved by steganography as well. This paper presents a modified method of audio stegnography. Audio steganography is the technique of hiding secret information in the audio files. nbspWe have presented a high capacity and high stego-signal quality audio steganography scheme based on samples comparison in DWT domain where selected coefficient of a segment are compared with pre determined threshold value T and based on comparison bits are embedded. The strength of our algorithm is depend on the segment size andnbsp their strength are enabled the algorithm to achieve very high embedding capacity for different data type that can reach up to 25%nbsp from the input audio file size with lest of 35 dBnbsp SNR for the output stego signal. Further we have tabulated the result and the conclusion is made on the basis of the obtained results

    Analisis Robustness Watermarking Citra Digital Menggunakan Contourlet Transform

    Get PDF
    ABSTRAKSI: Watermarking Citra digital merupakan salah satu metode untuk melindungi kepemilikan dari citra digital . Pada tugas akhir ini, algoritma watermarking yang digunakan adalah Contourlet Transform. Contourlet Transform Dipilih untuk proses watermarking karena kemampuannya untuk menangkap sisi direksional dan kontur. Penyisipan citra watermark dilakukan dengan skema Quantization Index Modulation(QIM). Citra Watermark disisipkan pada domain Contourlet Transform. Citra terwatermark yang dihasilkan memiliki Perceptibility yang sangat baik ditunjukkan dengan nilai PSNR yang tinggi. Citra watermark hasil ekstraksi tahan terhadap serangan resize, Kompresi JPEG dan kompresi JPEG2000. Hal ini ditunjukan dengan Nilai NC yang tinggi serta nilai BER yang rendah.Kata Kunci : Watermarking Citra Digital, Watermark, Contourlet Transform, Quantization Index ModulationABSTRACT: Digital image watermarking is one of the method that proposed to protect the ownership of digital image. In this final project, a watermaking algorithm that uses is contourlet Tansform. The contourlet transform is preferred for watermarking because of its ability ti capture the directional edge and contour. The watermark image is embedded with Quantization Index Modulation(QIM) scheme. The watermark image embedded in the contourlet domain. The result of watermarked image has a very good Perceptibility indicated by a high PSNR values. Extracted watermark image is resistant to Various attack such as resize, JPEG Compression and JPEG2000 compression. This is evidenced by the high NC value and the value of a low BER.Keyword: Watermarking Citra Digital, Watermark, Contourlet Transform, Quantization Index Modulatio

    Analysis of MHPDM algorithm for data hiding in JPEG images

    Get PDF
    In the recent years, there has been a great deal of interest in developing a secure algorithm for hiding information in images, or steganography. There has also been a lot of research in steganalysis of images, which deals with the detection of hidden information in supposedly natural images. The first section of this thesis reviews the steganography algorithms and steganalysis techniques developed in the last few years. It discusses the breadth of steganographic algorithms and steganalytic techniques, starting with the earliest, based on LSB flipping of the DCT coefficients, to more recent and sophisticated algorithms for data hiding and equally clever steganalytic techniques. The next section focuses on the steganographic algorithm, MHPDM which was first developed by Eggers and then modified by Tzschoppe, Bauml, Huber and Kaup. The MHPDM algorithm preserves the histogram of the stego image and is thus perfectly secure in terms of Cachin\u27s security definition. The MHPDM algorithm is explained in detail and implemented in MATLAB. It is then tested on numerous images and steganalysed using Dr. Fridrich\u27s recent feature-based steganalytic technique. The thesis concludes with observations about the detectibility of MHPDM using feature-based steganalysis for different payloads (embedded message lengths)

    MPEG-4 AVC stream watermarking by m -QIM techniques

    Full text link

    Verifying RADAR Data Using Two-Dimensional QIM-based Data Hiding

    Full text link
    Modern vehicles have evolved into supporting advanced internal networks and connecting System Based Chips (SBC), System in a Package (SiP) solutions or traditional micro controllers to foster an electronic ecosystem for high speed data transfers, precision and real-time control. The use of Controller Area Networks (CAN) is widely adopted as the backbone of internal vehicle communication infrastructure. Automotive applications such as ADAS, autonomous driving, battery management systems, power train systems, telematics and infotainment, all utilize CAN transmissions directly or through gateway management. The network transmissions lack robust integrity verification mechanisms to validate authentic data payloads, making it vulnerable to packet replay, spoofing, insertion, deletion and denial of service attacks. Additional methods exist to secure network data such as traditional cryptography. Utilizing this method will increase the computational complexity, processing latency and increase overall system cost. This thesis proposes a robust, light and adaptive solution to validate the authenticity of automotive sensor data using CAN network protocol. We propose using a two-dimensional Quantization Index Modulation (QIM) data hiding technique, to create a means of verification. Analysis of the proposed framework will be conducted in a sensor transmission scenario for RADAR sensors in an autonomous vehicle setting. The detection and effects of distortion on the application are tested through the implementation of sensor fusion algorithms and the results are observed and analyzed. The proposed framework offers a needed capability to maintain transmission integrity without the compromise of data quality and low design complexity. This framework could also be applied to different network architectures, as well as its operational scope could be modified to operate with more abstract types of data.MSEElectrical Engineering, College of Engineering & Computer ScienceUniversity of Michigan-Dearbornhttp://deepblue.lib.umich.edu/bitstream/2027.42/167354/1/Brandon Fedoruk - Final Thesis.pd

    Audio watermarking under desynchronization and additive noise attacks

    Full text link

    On the data hiding theory and multimedia content security applications

    Get PDF
    This dissertation is a comprehensive study of digital steganography for multimedia content protection. With the increasing development of Internet technology, protection and enforcement of multimedia property rights has become a great concern to multimedia authors and distributors. Watermarking technologies provide a possible solution for this problem. The dissertation first briefly introduces the current watermarking schemes, including their applications in video,, image and audio. Most available embedding schemes are based on direct Spread Sequence (SS) modulation. A small value pseudo random signature sequence is embedded into the host signal and the information is extracted via correlation. The correlation detection problem is discussed at the beginning. It is concluded that the correlator is not optimum in oblivious detection. The Maximum Likelihood detector is derived and some feasible suboptimal detectors are also analyzed. Through the calculation of extraction Bit Error Rate (BER), it is revealed that the SS scheme is not very efficient due to its poor host noise suppression. The watermark domain selection problem is addressed subsequently. Some implications on hiding capacity and reliability are also studied. The last topic in SS modulation scheme is the sequence selection. The relationship between sequence bandwidth and synchronization requirement is detailed in the work. It is demonstrated that the white sequence commonly used in watermarking may not really boost watermark security. To address the host noise suppression problem, the hidden communication is modeled as a general hypothesis testing problem and a set partitioning scheme is proposed. Simulation studies and mathematical analysis confirm that it outperforms the SS schemes in host noise suppression. The proposed scheme demonstrates improvement over the existing embedding schemes. Data hiding in audio signals are explored next. The audio data hiding is believed a more challenging task due to the human sensitivity to audio artifacts and advanced feature of current compression techniques. The human psychoacoustic model and human music understanding are also covered in the work. Then as a typical audio perceptual compression scheme, the popular MP3 compression is visited in some length. Several schemes, amplitude modulation, phase modulation and noise substitution are presented together with some experimental results. As a case study, a music bitstream encryption scheme is proposed. In all these applications, human psychoacoustic model plays a very important role. A more advanced audio analysis model is introduced to reveal implications on music understanding. In the last part, conclusions and future research are presented
    corecore