1,598 research outputs found

    Steganography: a Class of Algorithms having Secure Properties

    Full text link
    Chaos-based approaches are frequently proposed in information hiding, but without obvious justification. Indeed, the reason why chaos is useful to tackle with discretion, robustness, or security, is rarely elucidated. This research work presents a new class of non-blind information hidingalgorithms based on some finite domains iterations that are Devaney's topologically chaotic. The approach is entirely formalized and reasons to take place into the mathematical theory of chaos are explained. Finally, stego-security and chaos security are consequently proven for a large class of algorithms.Comment: 4 pages, published in Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2011, Dalian, China, October 14-16, 201

    Performance improvement of JPEG2000 steganography using QIM

    Get PDF
    This paper presents a modified QIM-JPEG2000 steganography which improves the previous JPEG2000 steganography using quantization index modulation (QIM). Since after-embedding changes on file size and PSNR by the modified QIM-JPEG2000 are smaller than those by the previous QIM-JPEG2000, the modified QIM-JPEG2000 should be more secure than the previous QIM-JPEG2000.4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 15-17, August, 2008, Harbin, Chin

    Development of domestic and international computer forensics

    Get PDF
    With the increasing of computer crime, instant emergence of new digital product, new computer technology and computer forensics technology is promoted, developed constantly. This paper described basic information/content of computer forensics, and elaborated the development of current computer forensics at domestic and overseas market. The trends of computer forensics are pointed out and recent hot topics of research are introduced. © 2011 IEEE.published_or_final_versionThe 7th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2011), Dalian, China, 14-16 October 2011. In Proceedings of the 7th IIH-MSP, 2011, p. 388-39

    Web-Based Benchmark for Keystroke Dynamics Biometric Systems: A Statistical Analysis

    Full text link
    Most keystroke dynamics studies have been evaluated using a specific kind of dataset in which users type an imposed login and password. Moreover, these studies are optimistics since most of them use different acquisition protocols, private datasets, controlled environment, etc. In order to enhance the accuracy of keystroke dynamics' performance, the main contribution of this paper is twofold. First, we provide a new kind of dataset in which users have typed both an imposed and a chosen pairs of logins and passwords. In addition, the keystroke dynamics samples are collected in a web-based uncontrolled environment (OS, keyboards, browser, etc.). Such kind of dataset is important since it provides us more realistic results of keystroke dynamics' performance in comparison to the literature (controlled environment, etc.). Second, we present a statistical analysis of well known assertions such as the relationship between performance and password size, impact of fusion schemes on system overall performance, and others such as the relationship between performance and entropy. We put into obviousness in this paper some new results on keystroke dynamics in realistic conditions.Comment: The Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2012), Piraeus : Greece (2012

    Lossless data hiding using bit-depth embedding for JPEG2000 compressed bit-stream

    Get PDF
    We have proposed a reversible information hiding for binary images. In this paper, we presents a lossless data hiding method for JPEG2000 compressed data based on the reversible information hiding. In JPEG2000 compression, wavelet coefficients of an image are quantized,therefore, the least significant bit plane (LSB) can be extracted. The proposed method recovers the quantized wavelet coefficients of cover images from stego images. To realize this, we embed not only secret data and the JBIG2 bit-stream of a part of the LSB plane but also the bit-depth of the quantized coefficients on some code-blocks.Experimental results demonstrate the feasibility of application of the proposed method to image alteration detection for JPEG2000 compressed data.2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 15-17 Aug. 2008, Harbin, Chin

    Tally Based Digital Audio Watermarking

    Get PDF
    In this paper, we propose a novel digital audio watermarking system inspired by the tally trade. In ordinary digital audio watermarking, a single stego signal is produced through the embedding process and the hidden message is extracted from the stego signal. In tally-based system we propose, multiple stego signals are tallied to produce and the hidden message which is extracted from the temporally mixed signal composed of the required number of stego tallies. When the extractor can’t mix the required number of stego tallies, it misses the hidden message. The system’s performances are evaluated in terms of the number of tallies (shares).Proceedings of the Thirteenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, August, 12-15, 2017, Matsue, Shimane, Japan, Part
    • 

    corecore