11 research outputs found
A Novel Quantum Steganography Scheme Based on ASCII
Based on the novel enhanced quantum representation for quantum image (NEQR), a new blind quantum steganography scheme is proposed. In this scheme, an improved quantum representation of text utilizing ASCII is provided that uses two qubit sequences to store the same quantum text message. The general embedding process of the scheme is as follows: firstly, the cover image of sized
2
n
×
2
n
will be divided into eight blocks of sized
2
n
−
2
×
2
n
−
1
, and the secret quantum text of sized
2
n
−
2
×
2
n
−
1
is scrambled by Gray code transform method. Then, the disorder quantum text is embedded into the eight blocks of cover image employing the Gray code as a judgment condition. Meanwhile, the corresponding quantum circuits are drawn. Through the analysis of all quantum circuits, it can be concluded that the scheme has a lower complexity, that is, O(n). And the performance of the proposed scheme is analyzing in terms of simulation results of three items: visual quality, circuit complexity, and robustness
An efficient data masking for securing medical data using DNA encoding and chaotic system
Data security is utmost important for ubiquitous computing of medical/diagnostic data or images. Along with must consider preserving privacy of patients. Recently, deoxyribose nucleic acid (DNA) sequences and chaotic sequence are jointly used for building efficient data masking model. However, the state-of-art model are not robust against noise and cropping attack (CA). Since in existing model most digits of each pixel are not altered. This work present efficient data masking (EDM) method using chaos and DNA based encryption method for securing health care data. For overcoming research challenges effective bit scrambling method is required. Firstly, this work present an efficient bit scrambling using logistic sine map and pseudorandom sequence using chaotic system. Then, DNA substitution is performed among them to resist against differential attack (DA), statistical attack (SA) and CA. Experiment are conducted on standard considering diverse images. The outcome achieved shows proposed model efficient when compared to existing models
Research on digital image watermark encryption based on hyperchaos
The digital watermarking technique embeds meaningful information into one or more watermark images hidden in one image, in which it is known as a secret carrier. It is difficult for a hacker to extract or remove any hidden watermark from an image, and especially to crack so called digital watermark. The combination of digital watermarking technique and traditional image encryption technique is able to greatly improve anti-hacking capability, which suggests it is a good method for keeping the integrity of the original image. The research works contained in this thesis include: (1)A literature review the hyperchaotic watermarking technique is relatively more advantageous, and becomes the main subject in this programme. (2)The theoretical foundation of watermarking technologies, including the human visual system (HVS), the colour space transform, discrete wavelet transform (DWT), the main watermark embedding algorithms, and the mainstream methods for improving watermark robustness and for evaluating watermark embedding performance. (3) The devised hyperchaotic scrambling technique it has been applied to colour image watermark that helps to improve the image encryption and anti-cracking capabilities. The experiments in this research prove the robustness and some other advantages of the invented technique. This thesis focuses on combining the chaotic scrambling and wavelet watermark embedding to achieve a hyperchaotic digital watermark to encrypt digital products, with the human visual system (HVS) and other factors taken into account. This research is of significant importance and has industrial application value
An efficient quantum-classical hybrid algorithm for distorted alphanumeric character identification
An algorithm for image processing is proposed. The proposed algorithm, which
can be viewed as a quantum-classical hybrid algorithm, can transform a
low-resolution bitonal image of a character from the set of alphanumeric
characters (A-Z, 0-9) into a high-resolution image. The quantum part of the
proposed algorithm fruitfully utilizes a variant of Grover's search algorithm,
known as the fixed point search algorithm. Further, the quantum part of the
algorithm is simulated using CQASM and the advantage of the algorithm is
established through the complexity analysis. Additional analysis has also
revealed that this scheme for optical character recognition (OCR) leads to high
confidence value and generally works in a more efficient manner compared to the
existing classical, quantum, and hybrid algorithms for a similar task.Comment: A quantum-assisted algorithm for optical character recognition (OCR)
is proposed using fixed point Grover's algorith
Noise-Resistant Image Encryption Scheme for Medical Images in the Chaos and Wavelet Domain
In this paper, a noise-resistant image encryption scheme is proposed. We have used a cubic-logistic map, Discrete Wavelet Transform (DWT), and bit-plane extraction method to encrypt the medical images at the bit-level rather than pixel-level. The proposed work is divided into three sections; In the first and the last section, the image is encrypted in the spatial domain. While the middle section of the proposed algorithm is devoted to the frequency domain encryption in which DWT is incorporated. As the frequency domain encryption section is a sandwich between the two spatial domain encryption sections, we called it a ”sandwich encryption.” The proposed algorithm is lossless because it can decrypt the exact pixel values of an image. Along with this, we have also gauge the proposed scheme's performance using statistical analysis such as entropy, correlation, and contrast. The entropy values of the cipher images generated from the proposed encryption scheme are more remarkable than 7.99, while correlation values are very close to zero. Furthermore, the number of pixel change rate (NPCR) and unified average change intensity (UACI) for the proposed encryption scheme is higher than 99.4% and 33, respectively. We have also tested the proposed algorithm by performing attacks such as cropping and noise attacks on enciphered images, and we found that the proposed algorithm can decrypt the plaintext image with little loss of information, but the content of the original image is visible
Data Hiding and Its Applications
Data hiding techniques have been widely used to provide copyright protection, data integrity, covert communication, non-repudiation, and authentication, among other applications. In the context of the increased dissemination and distribution of multimedia content over the internet, data hiding methods, such as digital watermarking and steganography, are becoming increasingly relevant in providing multimedia security. The goal of this book is to focus on the improvement of data hiding algorithms and their different applications (both traditional and emerging), bringing together researchers and practitioners from different research fields, including data hiding, signal processing, cryptography, and information theory, among others
High capacity data embedding schemes for digital media
High capacity image data hiding methods and robust high capacity digital audio watermarking algorithms are studied in this thesis. The main results of this work are the development of novel algorithms with state-of-the-art performance, high capacity and transparency for image data hiding and robustness, high capacity and low distortion for audio watermarking.En esta tesis se estudian y proponen diversos métodos de data hiding de imágenes y watermarking de audio de alta capacidad. Los principales resultados de este trabajo consisten en la publicación de varios algoritmos novedosos con rendimiento a la altura de los mejores métodos del estado del arte, alta capacidad y transparencia, en el caso de data hiding de imágenes, y robustez, alta capacidad y baja distorsión para el watermarking de audio.En aquesta tesi s'estudien i es proposen diversos mètodes de data hiding d'imatges i watermarking d'àudio d'alta capacitat. Els resultats principals d'aquest treball consisteixen en la publicació de diversos algorismes nous amb rendiment a l'alçada dels millors mètodes de l'estat de l'art, alta capacitat i transparència, en el cas de data hiding d'imatges, i robustesa, alta capacitat i baixa distorsió per al watermarking d'àudio.Societat de la informació i el coneixemen
Recommended from our members
Combined robust and fragile watermarking algorithms for still images. Design and evaluation of combined blind discrete wavelet transform-based robust watermarking algorithms for copyright protection using mobile phone numbers and fragile watermarking algorithms for content authentication of digital still images using hash functions.
This thesis deals with copyright protection and content authentication for still images. New blind
transform domain block based algorithms using one-level and two-level Discrete Wavelet Transform
(DWT) were developed for copyright protection. The mobile number with international code is used as
the watermarking data. The robust algorithms used the Low-Low frequency coefficients of the DWT to
embed the watermarking information. The watermarking information is embedded in the green channel of
the RGB colour image and Y channel of the YCbCr images. The watermarking information is scrambled
by using a secret key to increase the security of the algorithms. Due to the small size of the watermarking
information comparing to the host image size, the embedding process is repeated several times which
resulted in increasing the robustness of the algorithms. Shuffling process is implemented during the multi
embedding process in order to avoid spatial correlation between the host image and the watermarking
information. The effects of using one-level and two-level of DWT on the robustness and image quality
have been studied. The Peak Signal to Noise Ratio (PSNR), the Structural Similarity Index Measure
(SSIM) and Normalized Correlation Coefficient (NCC) are used to evaluate the fidelity of the images.
Several grey and still colour images are used to test the new robust algorithms. The new algorithms
offered better results in the robustness against different attacks such as JPEG compression, scaling, salt
and pepper noise, Gaussian noise, filters and other image processing compared to DCT based algorithms.
The authenticity of the images were assessed by using a fragile watermarking algorithm by using hash
function (MD5) as watermarking information embedded in the spatial domain. The new algorithm
showed high sensitivity against any tampering on the watermarked images. The combined fragile and
robust watermarking caused minimal distortion to the images. The combined scheme achieved both the
copyright protection and content authentication
Digital Watermarking for Verification of Perception-based Integrity of Audio Data
In certain application fields digital audio recordings contain sensitive content. Examples are historical archival material in public archives that preserve our cultural heritage, or digital evidence in the context of law enforcement and civil proceedings. Because of the powerful capabilities of modern editing tools for multimedia such material is vulnerable to doctoring of the content and forgery of its origin with malicious intent. Also inadvertent data modification and mistaken origin can be caused by human error. Hence, the credibility and provenience in terms of an unadulterated and genuine state of such audio content and the confidence about its origin are critical factors.
To address this issue, this PhD thesis proposes a mechanism for verifying the integrity and authenticity of digital sound recordings. It is designed and implemented to be insensitive to common post-processing operations of the audio data that influence the subjective acoustic perception only marginally (if at all). Examples of such operations include lossy compression that maintains a high sound quality of the audio media, or lossless format conversions. It is the objective to avoid de facto false alarms that would be expectedly observable in standard crypto-based authentication protocols in the presence of these legitimate post-processing. For achieving this, a feasible combination of the techniques of digital watermarking and audio-specific hashing is investigated.
At first, a suitable secret-key dependent audio hashing algorithm is developed. It incorporates and enhances so-called audio fingerprinting technology from the state of the art in contentbased audio identification. The presented algorithm (denoted as ”rMAC” message authentication code) allows ”perception-based” verification of integrity. This means classifying integrity breaches as such not before they become audible. As another objective, this rMAC is embedded and stored silently inside the audio media by means of audio watermarking technology. This approach allows maintaining the authentication code across the above-mentioned admissible post-processing operations and making it available for integrity verification at a later date. For this, an existent secret-key ependent audio watermarking algorithm is used and enhanced in this thesis work.
To some extent, the dependency of the rMAC and of the watermarking processing from a secret key also allows authenticating the origin of a protected audio. To elaborate on this security aspect, this work also estimates the brute-force efforts of an adversary attacking this combined rMAC-watermarking approach. The experimental results show that the proposed method provides a good distinction and classification
performance of authentic versus doctored audio content. It also allows the temporal localization of audible data modification within a protected audio file. The experimental evaluation finally provides recommendations about technical configuration settings of the combined watermarking-hashing approach.
Beyond the main topic of perception-based data integrity and data authenticity for audio, this PhD work provides new general findings in the fields of audio fingerprinting and digital watermarking. The main contributions of this PhD were published and presented mainly at conferences about multimedia security. These publications were cited by a number of other authors and hence had some impact on their works