10 research outputs found

    Image Encryption Using Huffman Coding for Steganography, Elliptic Curve Cryptography and DWT for Compression

    Get PDF
    Abstract-An abstract is a brief summary of a research article or in-depth analysis of a particular subject or discipline, and is often used to help the reader quickly ascertain the paper's purpose. Images can be encrypted in several ways, by using different techniques and different encryption methods. In this paper, I am using Huffman Coding method for image steganography, Elliptic Curve Cryptography for image encryption and Discrete Wavelet Transform for image compression. In my work I am using steganography, encryption and compression all together on the image data. After applying all these techniques on image data it results in an encryption method which is highly secure. For the implementation of the proposed work we are using Matlab software

    Contextual biometric watermarking of fingerprint images

    Get PDF
    This research presents contextual digital watermarking techniques using face and demographic text data as multiple watermarks for protecting the evidentiary integrity of fingerprint image. The proposed techniques embed the watermarks into selected regions of fingerprint image in MDCT and DWT domains. A general image watermarking algorithm is developed to investigate the application of MDCT in the elimination of blocking artifacts. The application of MDCT has improved the performance of the watermarking technique compared to DCT. Experimental results show that modifications to fingerprint image are visually imperceptible and maintain the minutiae detail. The integrity of the fingerprint image is verified through high matching score obtained from the AFIS system. There is also a high degree of correlation between the embedded and extracted watermarks. The degree of similarity is computed using pixel-based metrics and human visual system metrics. It is useful for personal identification and establishing digital chain of custody. The results also show that the proposed watermarking technique is resilient to common image modifications that occur during electronic fingerprint transmission

    Digital watermarking methods for data security and authentication

    Get PDF
    Philosophiae Doctor - PhDCryptology is the study of systems that typically originate from a consideration of the ideal circumstances under which secure information exchange is to take place. It involves the study of cryptographic and other processes that might be introduced for breaking the output of such systems - cryptanalysis. This includes the introduction of formal mathematical methods for the design of a cryptosystem and for estimating its theoretical level of securit

    Efficient and Robust Video Steganography Algorithms for Secure Data Communication

    Get PDF
    Over the last two decades, the science of secretly embedding and communicating data has gained tremendous significance due to the technological advancement in communication and digital content. Steganography is the art of concealing secret data in a particular interactive media transporter such as text, audio, image, and video data in order to build a covert communication between authorized parties. Nowadays, video steganography techniques are important in many video-sharing and social networking applications such as Livestreaming, YouTube, Twitter, and Facebook because of noteworthy developments in advanced video over the Internet. The performance of any steganography method, ultimately, relies on the imperceptibility, hiding capacity, and robustness against attacks. Although many video steganography methods exist, several of them lack the preprocessing stages. In addition, less security, low embedding capacity, less imperceptibility, and less robustness against attacks are other issues that affect these algorithms. This dissertation investigates and analyzes cutting edge video steganography techniques in both compressed and raw domains. Moreover, it provides solutions for the aforementioned problems by proposing new and effective methods for digital video steganography. The key objectives of this research are to develop: 1) a highly secure video steganography algorithm based on error correcting codes (ECC); 2) an increased payload video steganography algorithm in the discrete wavelet domain based on ECC; 3) a novel video steganography algorithm based on Kanade-Lucas-Tomasi (KLT) tracking and ECC; 4) a robust video steganography algorithm in the wavelet domain based on KLT tracking and ECC; 5) a new video steganography algorithm based on the multiple object tracking (MOT) and ECC; and 6) a robust and secure video steganography algorithm in the discrete wavelet and discrete cosine transformations based on MOT and ECC. The experimental results from our research demonstrate that our proposed algorithms achieve higher embedding capacity as well as better imperceptibility of stego videos. Furthermore, the preprocessing stages increase the security and robustness of the proposed algorithms against attacks when compared to state-of-the-art steganographic methods

    An analysis of alphabet-based techniques in text steganography

    Get PDF
    Steganography and cryptography are methods in information hiding.Cryptography scrambles the secret message, whereas steganography conceals a secret message in a carrier medium.An audio, video, image, and text can be used as a cover medium for hiding messages in steganography. The final output of steganography is a stego object that is sent to a receiver using a stego key. Suspiciousness of a generated stego text will encourage eavesdroppers to reveal the hidden message from stego text. Having reviewed substitution, injection, and propagation techniques for steganography, this paper discovers that there is a suspicion in the generated stego text. It is also discovered that text steganography using Genetic Algorithm (GA) is less focused by researchers compared to image and audio.Accordingly, this paper proposes that the adoption of GA should be focused in future works to protect stego text from suspiciousness due to the effectiveness and efficiency used in other media.Suspiciousness against stego text is very important in steganography to avoid third parties detecting the existence of secret message

    Image watermarking, steganography, and morphological processing

    Get PDF
    With the fast development of computer technology, research in the fields of multimedia security, image processing, and robot vision have recently become popular. Image watermarking, steganogrphic system, morphological processing and shortest path planning are important subjects among them. In this dissertation, the fundamental techniques are reviewed first followed by the presentation of novel algorithms and theorems for these three subjects. The research on multimedia security consists of two parts, image watermarking and steganographic system. In image watermarking, several algorithms are developed to achieve different goals as shown below. In order to embed more watermarks and to minimize distortion of watermarked images, a novel watermarking technique using combinational spatial and frequency domains is presented. In order to correct rounding errors, a novel technique based on the genetic algorithm (GA) is developed. By separating medical images into Region of Interest (ROI) and non-ROI parts, higher compression rates can be achieved where the ROI is compressed by lossless compression and the non-ROI by lossy compression. The GA-based watermarking technique can also be considered as a fundamental platform for other fragile watermarking techniques. In order to simplify the selection and integrate different watermarking techniques, a novel adjusted-purpose digital watermarking is developed. In order to enlarge the capacity of robust watermarking, a novel robust high-capacity watermarking is developed. In steganographic system, a novel steganographic algorithm is developed by using GA to break the inspection of steganalytic system. In morphological processing, the GA-based techniques are developed to decompose arbitrary shapes of big binary structuring elements and arbitrary values of big grayscale structuring elements into small ones. The decomposition is suited for a parallel-pipelined architecture. The techniques can speed up the morphological processing and allow full freedom for users to design any type and any size of binary and grayscale structuring elements. In applications such as shortest path planning, a novel method is first presented to obtaining Euclidean distance transformation (EDT) in just two scans of image. The shortest path can be extracted based on distance maps by tracking minimum values. In order to record the motion path, a new chain-code representation is developed to allow forward and backward movements. By placing the smooth turning-angle constraint, it is possible to mimic realistic motions of cars. By using dynamically rotational morphology, it is not only guarantee collision-free in the shortest path, but also reduce time complexity dramatically. As soon as the distance map of a destination and collision-free codes have been established off-line, shortest paths of cars given any starting location toward the destination can be promptly obtained on-line

    Implementasi Steganografi Menggunakan Metode Bit Plane Complexity Segmentation (BPCS) dan Kompresi Embedded Zerotree Wavelet (EZW)<BR> Implementation of Steganography Using Bit Plane Complexity Segmentation(BPCS) and Embedded Zerotree Wavelet (EZW) Compre

    Get PDF
    ABSTRAKSI: Steganografi pada citra digital adalah teknik menyembunyikan suatu informasi rahasia pada suatu media digital agar tidak terlihat seperti semestinya. Salah satu metode steganografi adalah Bit Plane Complexity Segmentation (BPCS). BPCS memanfaatkan karakteristik dari human vision system yaitu manusia tidak melihat informasi visual dalam area yang mengandung noise dalam sebuah citra. Kelebihan metode ini adalah memiliki rasio penyisipan yang besar jika dibandingkan menggunakan metode Least Significant Bit. Saat ini metode BPCS baru diterapkan pada dokumen citra dengan format bitmap pada domain spasial, dan tidak pada dokumen citra terkompresi (setelah penyisipan data rahasia pada suatu citra dilakukan kompresi). Pengkompresian citra bertujuan memperkecil ukuran data. Permasalahan yang timbul saat ini jika teknik lossy kompresi diterapkan pada steganografi mengakibatkan data yang disisipkan akan kehilangan informasi. Untuk mengatasi hal tersebut digunakan kompresi berbasis wavelet yang dapat digunakan untuk melakukan kompresi lossy dan lossles.Pada Tugas Akhir ini akan dibahas mengenai steganografi dengan metode Bit-Plane Complexity Segmentation dan Kompresi Embedded Zerotree Wavelet (EZW). EZW bertujuan mengkuantisasi citra sekaligus mengkompresi citra. Parameter performansi yang digunakan adalah Peak Signal to Noise Ratio (PSNR) dan rasio kompresi untuk citra steganografi serta Bit Error Rate (BER) untuk data rahasia. Pengujian dilakukan dengan menganalisis kualitas citra steganografi serta kualitas citra steganografi hasil ekstraksi setelah diberikan serangan berupa penambahan Gaussian noise dan kompresi lossless ataupun lossy menggunakan EZW.Hasil yang diperoleh dari Tugas Akhir adalah dengan menggunakan steganografi BPCS, data yang disisipkan pada domain wavelet dapat dikompres menggunakan kompresi berbasis wavelet. Citra cover dapat menampung data sekitar 25% dari ukuran citra cover. Dengan rasio kompresi sekitar 20% dari citra cover dengan PSNR diatas 30dB serta nilai BER citra data 0. Rasio kompresi masih dapat bertambah apabila threshold kompresi bertambah.Kata Kunci : Steganografi, BPCS, Kompresi , Wavelet, PSNR, Rasio, BER.ABSTRACT: Steganography in digital images is a technique to hide secret information in a digital media as an intermediary so as not to look like it should. One method of steganography is Bit Plane Complexity Segmentation (BPCS). BPCS utilize the characteristics of human vision system the human visual do not see the information contained in the noise in the area of an image. The advantages of this method is to have a large insertion ratio compared using Least Significant Bit. Currently BPCS method applied on the document image with a bitmap format at a spatial domain, and not on a compressed image of the document (after embedding secret data, then steganography image is compressed). Compressiom aims to reduce the size of the image data. The problems that arise at this time if lossy compression techniques applied to steganography inserted data will result in loss of information. To overcome this used wavelet-based compression can be used to perform lossy compression and lossles.In this Final Task will be discussed on steganographic methods Bit-Plane Complexity Segmentation and Compression Embedded Zerotree Wavelet (EZW). EZW aims quantization image while compressing the image. Performance parameters used are Peak Signal to Noise Ratio (PSNR) and compression ratio for image steganography, and Bit Error Rate (BER) for confidential data. Testing is done by analyzing the image quality of the image steganography and steganography extraction result after such an attack given the addition of Gaussian noise and lossless or lossy compression using the EZW.Results obtained from the implementation using BPCS steganography, data is inserted in the wavelet domain can be compressed using a wavelet-based compression cover image can hold data about 25% of the size of the cover image with a compression ratio of about 20% with a PSNR above 30dB and BER image data 0, the compression ratio can still be increased if the threshold of compression increases.Keyword: Steganography, BPCS, Compression, Wavelet, PSNR, Ratio, BER

    Study and Implementation of Watermarking Algorithms

    Get PDF
    Water Making is the process of embedding data called a watermark into a multimedia object such that watermark can be detected or extracted later to make an assertion about the object. The object may be an audio, image or video. A copy of a digital image is identical to the original. This has in many instances, led to the use of digital content with malicious intent. One way to protect multimedia data against illegal recording and retransmission is to embed a signal, called digital signature or copyright label or watermark that authenticates the owner of the data. Data hiding, schemes to embed secondary data in digital media, have made considerable progress in recent years and attracted attention from both academia and industry. Techniques have been proposed for a variety of applications, including ownership protection, authentication and access control. Imperceptibility, robustness against moderate processing such as compression, and the ability to hide many bits are the basic but rat..
    corecore