65,782 research outputs found

    An LSB Data Hiding Technique Using Natural Numbers

    Full text link
    In this paper, a novel data hiding technique is proposed, as an improvement over the Fibonacci LSB data-hiding technique proposed by Battisti et al,based on decomposition of a number (pixel-value) in sum of natural numbers. This particular representation again generates a different set of (virtual) bit-planes altogether, suitable for embedding purposes. We get more bit-planes than that we get using Prime technique.These bit-planes not only allow one to embed secret message in higher bit-planes but also do it without much distortion, with a much better stego-image quality, and in a reliable and secured manner, guaranteeing efficient retrieval of secret message. A comparative performance study between the classical Least Significant Bit(LSB) method, the Fibonacci LSB data-hiding technique and the proposed schemes indicate that image quality of the stego-image hidden by the technique using the natural decomposition method improves drastically against that using Prime and Fibonacci decomposition technique. Experimental results also illustrate that, the stego-image is visually indistinguishable from the original cover-image. Also we show the optimality of our technique.Comment: 6 Pages, 5 Figures, IEEE Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2007, Nov 26-28, 2007, Kaohsiung City, Taiwan, IEEE Computer Society press, USA, ISBN 0-7695-2994-1, pp. 473-476, 2007

    Fingerprint Template Security: A Proposed Framework for Enhancing Fingerprint Authentication System Using Fragile Image Watermarking Technique

    Get PDF
    The wide use of digital media in these recent days has led to an increase of digital piracy and tampering especially for biometric identification system. This research presents the concept of information hiding and one of its sub areas is called fragile image watermarking. While the biometrics techniques offer a reliable method for personal identification, the problem of security and integrity of the biometrics data is studied. This research had proposed an architectural framework that will apply information hiding method into biometric identification system. A fingerprint watermarking method has been used to hide additional information into fingerprint images by changing the least significant bit value of a random chosen pixel of the image. The embedded information can be extracted without referencing to the original image. Table and charts are presented to show the image quality of the watermarked fingerprint images comparing to the unwatermarked(original) images. The performance of the biometric identification system when using both kinds of images is also presented. The watermark payload that can be embedded into one image is then analyzed. This study can be use for image authentication especially to detect whether the image has been tampered by image processing intention such as noise addition and blurring

    High-Throughput Covert Channels in Adaptive Rate Wireless Communication Systems

    Get PDF
    In this paper, we outline a novel, forward error correction-based information hiding technique for adaptive rate wireless communication systems. Specifically, we propose lever- aging the functionality of wireless local area network modulation and coding schemes (MCS) and link adaptation mechanisms to significantly increase covert channel throughput. After describing our generalized information hiding model, we detail implementa- tion of this technique within the IEEE 802.11ad, directional multi- Gigabit standard. Simulation results demonstrate the potential of the proposed techniques to develop reliable, high-throughput covert channels under multiple MCS rates and embedding techniques. Covert channel performance is evaluated in terms of the observed packet error ratio of the underlying communication system as well as the bit error ratio of the hidden data

    Micro protocol engineering for unstructured carriers: On the embedding of steganographic control protocols into audio transmissions

    Full text link
    Network steganography conceals the transfer of sensitive information within unobtrusive data in computer networks. So-called micro protocols are communication protocols placed within the payload of a network steganographic transfer. They enrich this transfer with features such as reliability, dynamic overlay routing, or performance optimization --- just to mention a few. We present different design approaches for the embedding of hidden channels with micro protocols in digitized audio signals under consideration of different requirements. On the basis of experimental results, our design approaches are compared, and introduced into a protocol engineering approach for micro protocols.Comment: 20 pages, 7 figures, 4 table

    Prediction-error of Prediction Error (PPE)-based Reversible Data Hiding

    Full text link
    This paper presents a novel reversible data hiding (RDH) algorithm for gray-scaled images, in which the prediction-error of prediction error (PPE) of a pixel is used to carry the secret data. In the proposed method, the pixels to be embedded are firstly predicted with their neighboring pixels to obtain the corresponding prediction errors (PEs). Then, by exploiting the PEs of the neighboring pixels, the prediction of the PEs of the pixels can be determined. And, a sorting technique based on the local complexity of a pixel is used to collect the PPEs to generate an ordered PPE sequence so that, smaller PPEs will be processed first for data embedding. By reversibly shifting the PPE histogram (PPEH) with optimized parameters, the pixels corresponding to the altered PPEH bins can be finally modified to carry the secret data. Experimental results have implied that the proposed method can benefit from the prediction procedure of the PEs, sorting technique as well as parameters selection, and therefore outperform some state-of-the-art works in terms of payload-distortion performance when applied to different images.Comment: There has no technical difference to previous versions, but rather some minor word corrections. A 2-page summary of this paper was accepted by ACM IH&MMSec'16 "Ongoing work session". My homepage: hzwu.github.i
    • …
    corecore