726 research outputs found

    Digital watermarking : applicability for developing trust in medical imaging workflows state of the art review

    Get PDF
    Medical images can be intentionally or unintentionally manipulated both within the secure medical system environment and outside, as images are viewed, extracted and transmitted. Many organisations have invested heavily in Picture Archiving and Communication Systems (PACS), which are intended to facilitate data security. However, it is common for images, and records, to be extracted from these for a wide range of accepted practices, such as external second opinion, transmission to another care provider, patient data request, etc. Therefore, confirming trust within medical imaging workflows has become essential. Digital watermarking has been recognised as a promising approach for ensuring the authenticity and integrity of medical images. Authenticity refers to the ability to identify the information origin and prove that the data relates to the right patient. Integrity means the capacity to ensure that the information has not been altered without authorisation. This paper presents a survey of medical images watermarking and offers an evident scene for concerned researchers by analysing the robustness and limitations of various existing approaches. This includes studying the security levels of medical images within PACS system, clarifying the requirements of medical images watermarking and defining the purposes of watermarking approaches when applied to medical images

    Peningkatan Kinerja Metode Steganography Pada Video Digital Berbasis Neighbouring Similarity

    Get PDF
    Video digital adalah media yang saat ini mulai digunakan untuk keperluan steganography. Salah satu metode steganography untuk video digital adalah neighbouring similarity. Neighbouring similarity merupakan turunan dari metode histogram shifting yang mampu menghasilkan kapasitas lebih baik. Alasannya adalah karena metode neighbouring similarity mampu memanfaatkan kemiripan antar frame untuk membangkitkan suatu media penyisipan, yang kemudian disebut dengan prediction error. Tetapi, proses pembangkitan prediction error pada metode tersebut masih memiliki banyak kemungkinan untuk dikembangkan. Penelitian ini mengusulkan tiga buah metode penyisipan yang merupakan pengembangan dari metode neighbouring similarity. Pengembangan yang dilakukan adalah dengan memodifikasi arsitektur pembangkitan prediction error. Metode pertama menggunakan tiap tiga frame untuk menghasilkan dua prediction error. Metode kedua menggunakan prediction error bertingkat untuk menyisipkan pesan rahasia. Metode ketiga menggunakan skema overlap untuk memaksimalkan jumlah prediction error yang dibangkitkan. Berdasarkan uji coba yang dilakukan, dua dari tiga metode yang diusukan mampu menghasilkan kapasitas yang lebih tinggi dibandingkan metode neighbouring similarity. Metode usulan pertama mampu meningkatkan kapasitas hingga 33,56% pada video grayscale dan 33,68% pada video berwarna. Metode usulan ketiga mampu meningkatkan kapasitas hinggal 100,52% pada video grayscale dan 101,14% pada video berwarna. Untuk pengukuran PSNR, ketiga metode usulan menghasilkan nilai di bawah metode neighbouring similarity, tetapi masih mampu mempertahankan nilainya diatas 40 dB. ======================================================================================================================== Digital video is a media that used for steganography necessities now. One of steganography method for digital video is neighbouring similarity. Neighbouring similarity is a derived method from histogram shifting method that can be increased a capacity. A reason is neighbouring similarity method can utilize a similarity of digital video frames to generates an embedding media, that called prediction error. But, prediction error generation process in neighbouring similarity method has a lot of possibilities to improved. This research proposes three embedding method that inspired by neighbouring similarity. A contribution is modifying the architecture of prediction error generating process. First proposed method uses three frames to generate two prediction error. Second proposed method uses graded of prediction error to embed a secret message. Third proposed method uses overlapped scheme to maximizing amount of generated prediction error. From the experiment, two of three proposed methods is able to increased a capacity from neighbouring similarity method. First proposed method increases the capacity by 33.56% in grayscale video and 33.68% in colored video. Second proposed method increases the capacity by 100,52% in grayscale video and 101,14% in colored video. For PSNR measurement, all proposed method are producing value below neighbouring similarity method. But, all proposed method can preserve the value above 40 d

    Modifikasi Metode Histogram Shifting dan Neighbouring Similarity untuk Steganografi pada Video Digital

    Get PDF
    Steganography merupakan salah satu metode yang digunakan untuk menyembunyikan informasi. Dengan steganography, informasi akan disembunyikan dengan cara menyisipkan informasi tersebut kedalam data lain. Contoh dari steganography adalah histogram shifting dan neighbouring similarity. Histogram shifting dan neighbouring similarity memiliki sifat reversible, yang berarti video hasil penyisipan dapat dikembalikan lagi seperti semula. Pada Tugas Akhir ini dilakukan pengembangan metode histogram shifting dan neighbouring similarity dengan cara menggabungkan kedua metode tersebut serta melakukan modifikasi pada arah pergeseran bit dan letak penyisipan. Dari data hasil uji coba, jumlah payload yang bisa dimasukkan meningkat sebanyak 88% dari metode neighbouring similarity dan meningkat sebanyak 1658% dari metode histogram shifting. Nilai PSNR juga meningkat sebanyak 2,1% dari metode neighbouring similarity dan meningkat sebanyak 18,01% dari metode histogram shifting. ===========================================================================================Steganography is one of the methods used to hide information. With steganography, the information will be hidden by inserting that information into other data. An example of steganography is a histogram shifting and neighbouring similarity. Histogram shifting and neighbouring similarity have reversible properties, that mean the video result of embedding can be restored as same as before. In this Final Project, histogram shifting and neighbouring similarity is modified by combining both methods and modifying the direction and the location of the shifting. From the data of the test result, the number of payloads that can be entered increases as much as 88% of the neighbouring similarity method and increases as much as 1658% of the histogram shifting method. The PSNR score also increased by 2.1% from the neighbouring similarity method and increased by 18.01% of the histogram shifting method

    Pixel steganography method for grayscale image steganography on colour images

    Get PDF
    The process of hiding secret data within a host signal is known as steganography; its design parameters are imperceptibility, concealment capacity, and recovered data quality. A case of images, one of the existing methods based on modification of the host image pixels is called Block Pixel Hiding Method (BPHM), which has good imperceptibility and high-capacity concealment but does not guarantee the quality of the secret image recovered. This article proposes a method that improves results BPHM based on band selection and search algorithm global called Improved Pixel Hiding Method (IPHM). According to the simulations carried out, the results obtained with IPHM are better than those obtained with BPHM. They are similar to one of the more popular methods in imaging steganography known as Quantization Index Modulation (QIM). Steganography is the method of hiding hidden data within a host signal, with imperceptibility, concealment capacity, and retrieved data quality as design criteria. In the case of images, Block Pixel Hiding Method (BPHM) is one of the available methods based on modifying the host picture pixels, which has good imperceptibility and high-capacity concealment but does not guarantee the quality of the hidden picture recovered. Improved Pixel Hiding Method is a method proposed in this article that improves BPHM outcomes by using band selection and a global search algorithm (IPHM). The results obtained using IPHM are better than those achieved with BPHM, according to simulations. They're related to Quantization Index Modulation, which is one of the most widely used picture steganography techniques (QIM)

    High capacity data embedding schemes for digital media

    Get PDF
    High capacity image data hiding methods and robust high capacity digital audio watermarking algorithms are studied in this thesis. The main results of this work are the development of novel algorithms with state-of-the-art performance, high capacity and transparency for image data hiding and robustness, high capacity and low distortion for audio watermarking.En esta tesis se estudian y proponen diversos métodos de data hiding de imágenes y watermarking de audio de alta capacidad. Los principales resultados de este trabajo consisten en la publicación de varios algoritmos novedosos con rendimiento a la altura de los mejores métodos del estado del arte, alta capacidad y transparencia, en el caso de data hiding de imágenes, y robustez, alta capacidad y baja distorsión para el watermarking de audio.En aquesta tesi s'estudien i es proposen diversos mètodes de data hiding d'imatges i watermarking d'àudio d'alta capacitat. Els resultats principals d'aquest treball consisteixen en la publicació de diversos algorismes nous amb rendiment a l'alçada dels millors mètodes de l'estat de l'art, alta capacitat i transparència, en el cas de data hiding d'imatges, i robustesa, alta capacitat i baixa distorsió per al watermarking d'àudio.Societat de la informació i el coneixemen

    Privacy-preserving information hiding and its applications

    Get PDF
    The phenomenal advances in cloud computing technology have raised concerns about data privacy. Aided by the modern cryptographic techniques such as homomorphic encryption, it has become possible to carry out computations in the encrypted domain and process data without compromising information privacy. In this thesis, we study various classes of privacy-preserving information hiding schemes and their real-world applications for cyber security, cloud computing, Internet of things, etc. Data breach is recognised as one of the most dreadful cyber security threats in which private data is copied, transmitted, viewed, stolen or used by unauthorised parties. Although encryption can obfuscate private information against unauthorised viewing, it may not stop data from illegitimate exportation. Privacy-preserving Information hiding can serve as a potential solution to this issue in such a manner that a permission code is embedded into the encrypted data and can be detected when transmissions occur. Digital watermarking is a technique that has been used for a wide range of intriguing applications such as data authentication and ownership identification. However, some of the algorithms are proprietary intellectual properties and thus the availability to the general public is rather limited. A possible solution is to outsource the task of watermarking to an authorised cloud service provider, that has legitimate right to execute the algorithms as well as high computational capacity. Privacypreserving Information hiding is well suited to this scenario since it is operated in the encrypted domain and hence prevents private data from being collected by the cloud. Internet of things is a promising technology to healthcare industry. A common framework consists of wearable equipments for monitoring the health status of an individual, a local gateway device for aggregating the data, and a cloud server for storing and analysing the data. However, there are risks that an adversary may attempt to eavesdrop the wireless communication, attack the gateway device or even access to the cloud server. Hence, it is desirable to produce and encrypt the data simultaneously and incorporate secret sharing schemes to realise access control. Privacy-preserving secret sharing is a novel research for fulfilling this function. In summary, this thesis presents novel schemes and algorithms, including: • two privacy-preserving reversible information hiding schemes based upon symmetric cryptography using arithmetic of quadratic residues and lexicographic permutations, respectively. • two privacy-preserving reversible information hiding schemes based upon asymmetric cryptography using multiplicative and additive privacy homomorphisms, respectively. • four predictive models for assisting the removal of distortions inflicted by information hiding based respectively upon projection theorem, image gradient, total variation denoising, and Bayesian inference. • three privacy-preserving secret sharing algorithms with different levels of generality

    Recent Advances in Steganography

    Get PDF
    Steganography is the art and science of communicating which hides the existence of the communication. Steganographic technologies are an important part of the future of Internet security and privacy on open systems such as the Internet. This book's focus is on a relatively new field of study in Steganography and it takes a look at this technology by introducing the readers various concepts of Steganography and Steganalysis. The book has a brief history of steganography and it surveys steganalysis methods considering their modeling techniques. Some new steganography techniques for hiding secret data in images are presented. Furthermore, steganography in speeches is reviewed, and a new approach for hiding data in speeches is introduced

    A Survey of Data Mining Techniques for Steganalysis

    Get PDF
    corecore