79 research outputs found

    Lyapunov exponent evaluation of a digital watermarking scheme proven to be secure

    Full text link
    In our previous researches, a new digital watermarking scheme based on chaotic iterations has been introduced. This scheme was both stego-secure and topologically secure. The stego-security is to face an attacker in the "watermark only attack" category, whereas the topological security concerns other categories of attacks. Its Lyapunov exponent is evaluated here, to quantify the chaos generated by this scheme. Keywords : Lyapunov exponent; Information hiding; Security; Chaotic iterations; Digital Watermarking.Comment: 10 page

    A Cryptographic Approach for Steganography

    No full text
    International audienceIn this research work, security concepts are formalized in steganography, and the common paradigms based on information theory are replaced by another ones inspired from cryptography, more practicable are closer than what is usually done in other cryptographic domains. These preliminaries lead to a first proof of a cryptographically secure information hidingscheme

    A Real-time Decision Support with Cloud Computing Based Fire Evacuation System

    Get PDF
    [[abstract]]An effective evacuation system can help people escape from building fire. Most evacuation systems consist of a indoor positioning system, a back-end database, and a display device with calculation and display software. However, very few of them can smartly determine which evacuation route is the best decision. If all the locations of the evacuating people can be simultaneously determined, the best evacuation routes can be decided to avoid congestion, and survival rate can increase. The previous radio frequency identification (RFID) based evacuation system focused on detecting the RFID tags using a mobile phone in order to determine the location of the mobile phone user so that an evacuation route can be displayed. However, the system is available for one person regardless of the number of evacuating people or exits. This study is based on the previous RFID based evacuation system investigating the best evacuation routes. The system introduces cloud computing that calculates for positioning the evacuating people and determining the optimum evacuation routes for each of them. The system will be implemented at Tamkang University on Lanyang campus.[[notice]]補正完畢[[conferencetype]]國際[[conferencedate]]20111024~20111026[[booktype]]紙本;電子版[[iscallforpapers]]Y[[conferencelocation]]Macao[[countrycodes]]MA

    Application of Steganography for Anonymity through the Internet

    Full text link
    In this paper, a novel steganographic scheme based on chaotic iterations is proposed. This research work takes place into the information hiding security framework. The applications for anonymity and privacy through the Internet are regarded too. To guarantee such an anonymity, it should be possible to set up a secret communication channel into a web page, being both secure and robust. To achieve this goal, we propose an information hiding scheme being stego-secure, which is the highest level of security in a well defined and studied category of attacks called "watermark-only attack". This category of attacks is the best context to study steganography-based anonymity through the Internet. The steganalysis of our steganographic process is also studied in order to show it security in a real test framework.Comment: 14 page

    A new secure process for steganography: CI2. Stego and topological security

    No full text
    International audienceIn this paper is proposed a novel steganographic scheme based on chaotic iterations which offer a solution facing the main limitation of the previous one. This research work takes place into the information hiding security fields. We show that the proposed scheme is stego-secure, which is the highest level of security in a well defined and studied category of attack called "watermark-only attack". Additionally, we prove that this scheme presents topological properties so that it is one of the firsts able to face, at least partially, an adversary when considering the others categories of attacks defined in the literature

    An Integrated Building Fire Evacuation System with RFID and Cloud Computing

    Get PDF
    [[abstract]]Building fire is a common disaster happening in our daily life that causes unfortunate casualties and deaths. Successfully escaping from fire depends on the design of evacuation route and time, as most of the damage of fire is caused due to lack of evacuation equipments or poor design of the emergency route. In this research work, we designed a hybrid building fire evacuation system (HBFES) on a mobile phone using Radio Frequency Identification (RFID) techniques and Cloud Computing. The system will be implemented at Tamkang University on Lanyang campus. Several existing computer or mobile phone applications, namely Viewpoint Calculator, Path planner, and MobiX3D viewer will be used on the system to rapidly calculate reliable evacuation routes when building fire takes place.[[notice]]補正完畢[[conferencetype]]國際[[conferencedate]]20111014~10111016[[ispeerreviewed]]Y[[booktype]]紙本 電子版[[iscallforpapers]]Y[[conferencelocation]]Dalian, China[[countrycodes]]CH

    Covert voice over internet protocol communications with packet loss based on fractal interpolation

    Get PDF
    The last few years have witnessed an explosive growth in the research of information hiding in multimedia objects, but few studies have taken into account packet loss in multimedia networks. As one of the most popular real-time services in the Internet, Voice over Internet Protocol (VoIP) contributes to a large part of network traffic for its advantages of real time, high flow, and low cost. So packet loss is inevitable in multimedia networks and affects the performance of VoIP communications. In this study, a fractal-based VoIP steganographic approach was proposed to realise covert VoIP communications in the presence of packet loss. In the proposed scheme, secret data to be hidden were divided into blocks after being encrypted with the block cipher, and each block of the secret data was then embedded into VoIP streaming packets. The VoIP packets went through a packet loss system based on Gilbert model which simulates a real network situation. And a prediction model based on fractal interpolation was built to decide whether a VoIP packet was suitable for data hiding. The experimental results indicated that the speech quality degradation increased with the escalating packet-loss level. The average variance of speech quality metrics (PESQ score) between the "no-embedding" speech samples and the “with-embedding” stego-speech samples was about 0.717, and the variances narrowed with the increasing packet-loss level. Both the average PESQ scores and the SNR values of stego-speech samples and the data retrieving rates had almost the same varying trends when the packet-loss level increased, indicating that the success rate of the fractal prediction model played an important role in the performance of covert VoIP communications

    Steganography: a class of secure and robust algorithms

    Full text link
    This research work presents a new class of non-blind information hiding algorithms that are stego-secure and robust. They are based on some finite domains iterations having the Devaney's topological chaos property. Thanks to a complete formalization of the approach we prove security against watermark-only attacks of a large class of steganographic algorithms. Finally a complete study of robustness is given in frequency DWT and DCT domains.Comment: Published in The Computer Journal special issue about steganograph
    corecore