65,782 research outputs found
An LSB Data Hiding Technique Using Natural Numbers
In this paper, a novel data hiding technique is proposed, as an improvement
over the Fibonacci LSB data-hiding technique proposed by Battisti et al,based
on decomposition of a number (pixel-value) in sum of natural numbers. This
particular representation again generates a different set of (virtual)
bit-planes altogether, suitable for embedding purposes. We get more bit-planes
than that we get using Prime technique.These bit-planes not only allow one to
embed secret message in higher bit-planes but also do it without much
distortion, with a much better stego-image quality, and in a reliable and
secured manner, guaranteeing efficient retrieval of secret message. A
comparative performance study between the classical Least Significant Bit(LSB)
method, the Fibonacci LSB data-hiding technique and the proposed schemes
indicate that image quality of the stego-image hidden by the technique using
the natural decomposition method improves drastically against that using Prime
and Fibonacci decomposition technique. Experimental results also illustrate
that, the stego-image is visually indistinguishable from the original
cover-image. Also we show the optimality of our technique.Comment: 6 Pages, 5 Figures, IEEE Third International Conference on
Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2007,
Nov 26-28, 2007, Kaohsiung City, Taiwan, IEEE Computer Society press, USA,
ISBN 0-7695-2994-1, pp. 473-476, 2007
Fingerprint Template Security: A Proposed Framework for Enhancing Fingerprint Authentication System Using Fragile Image Watermarking Technique
The wide use of digital media in these recent days has led to an increase of digital piracy and tampering especially for biometric identification system. This research presents the concept of information hiding and one of its sub areas is called fragile image watermarking. While the biometrics techniques offer a reliable method for personal identification, the problem of security and integrity of the biometrics data is studied. This research had proposed an architectural framework that will apply information hiding method into biometric identification system. A fingerprint watermarking method has been used to hide additional information into fingerprint images by changing the least significant bit value of a random chosen pixel of the image. The embedded information can be extracted without referencing to the original image. Table and charts are presented to show the image quality of the watermarked
fingerprint images comparing to the unwatermarked(original) images. The performance of the biometric identification system when using both kinds of images is also presented. The watermark payload that can be embedded into one image is then analyzed. This study can be use for image authentication especially to detect whether the image has been tampered by image processing intention such as noise addition and blurring
High-Throughput Covert Channels in Adaptive Rate Wireless Communication Systems
In this paper, we outline a novel, forward error correction-based information hiding technique for adaptive rate wireless communication systems. Specifically, we propose lever- aging the functionality of wireless local area network modulation and coding schemes (MCS) and link adaptation mechanisms to significantly increase covert channel throughput. After describing our generalized information hiding model, we detail implementa- tion of this technique within the IEEE 802.11ad, directional multi- Gigabit standard. Simulation results demonstrate the potential of the proposed techniques to develop reliable, high-throughput covert channels under multiple MCS rates and embedding techniques. Covert channel performance is evaluated in terms of the observed packet error ratio of the underlying communication system as well as the bit error ratio of the hidden data
Micro protocol engineering for unstructured carriers: On the embedding of steganographic control protocols into audio transmissions
Network steganography conceals the transfer of sensitive information within
unobtrusive data in computer networks. So-called micro protocols are
communication protocols placed within the payload of a network steganographic
transfer. They enrich this transfer with features such as reliability, dynamic
overlay routing, or performance optimization --- just to mention a few. We
present different design approaches for the embedding of hidden channels with
micro protocols in digitized audio signals under consideration of different
requirements. On the basis of experimental results, our design approaches are
compared, and introduced into a protocol engineering approach for micro
protocols.Comment: 20 pages, 7 figures, 4 table
Prediction-error of Prediction Error (PPE)-based Reversible Data Hiding
This paper presents a novel reversible data hiding (RDH) algorithm for
gray-scaled images, in which the prediction-error of prediction error (PPE) of
a pixel is used to carry the secret data. In the proposed method, the pixels to
be embedded are firstly predicted with their neighboring pixels to obtain the
corresponding prediction errors (PEs). Then, by exploiting the PEs of the
neighboring pixels, the prediction of the PEs of the pixels can be determined.
And, a sorting technique based on the local complexity of a pixel is used to
collect the PPEs to generate an ordered PPE sequence so that, smaller PPEs will
be processed first for data embedding. By reversibly shifting the PPE histogram
(PPEH) with optimized parameters, the pixels corresponding to the altered PPEH
bins can be finally modified to carry the secret data. Experimental results
have implied that the proposed method can benefit from the prediction procedure
of the PEs, sorting technique as well as parameters selection, and therefore
outperform some state-of-the-art works in terms of payload-distortion
performance when applied to different images.Comment: There has no technical difference to previous versions, but rather
some minor word corrections. A 2-page summary of this paper was accepted by
ACM IH&MMSec'16 "Ongoing work session". My homepage: hzwu.github.i
- …