244 research outputs found

    Video Steganography Techniques: A Survey

    Get PDF
    In digital world, information security is the major issue in digital communication on a network from the third party hackers. Steganography techniques play an important role in information security. These are the secure techniques, used for concealing existence of secret information in any digital cover object viz. image, audio, video files. In last several decades, significant researches have been done on video and image steganography techniques because data embedding and data extraction is very simple. However, many researchers also take the audio file as a cover object where robustness and undetectability of information is very difficult task. The main objective of steganography is hiding the existence of the embedded data in any digital cover object. Steganography technique must be robust against the various image-processing attacks. Nowadays, video files are more accepted because of large size and memory requirements. This paper intends to provide a survey on video techniques and provide the fundamental concept of the steganography and their uses

    Data hiding using integer lifting wavelet transform and DNA computing

    Get PDF
    DNA computing widely used in encryption or hiding the data. Many researchers have proposed many developments of encryption and hiding algorithms based on DNA sequence to provide new algorithms. In this paper data hiding using integer lifting wavelet transform based on DNA computing is presented. The transform is applied on blue channel of the cover image. The DNA encoding used to encode the two most significant bits of LL sub-band. The produced DNA sequence used for two purpose, firstly, it use to construct the key for encryption the secret data and secondly to select the pixels in HL, LH, HH sub-bands for hiding in them. Many measurement parameters used to evaluate the performance of the proposed method such PSNR, MSE, and SSIM. The experimental results show high performance with respect to different embedding rate

    Data Hiding with Deep Learning: A Survey Unifying Digital Watermarking and Steganography

    Full text link
    Data hiding is the process of embedding information into a noise-tolerant signal such as a piece of audio, video, or image. Digital watermarking is a form of data hiding where identifying data is robustly embedded so that it can resist tampering and be used to identify the original owners of the media. Steganography, another form of data hiding, embeds data for the purpose of secure and secret communication. This survey summarises recent developments in deep learning techniques for data hiding for the purposes of watermarking and steganography, categorising them based on model architectures and noise injection methods. The objective functions, evaluation metrics, and datasets used for training these data hiding models are comprehensively summarised. Finally, we propose and discuss possible future directions for research into deep data hiding techniques

    Information Hiding Method For Gray Images Using Motif Patterns

    Get PDF
    إخفاء المعلومات هي واحدة من مهام أمان الوسائط المتعددة التي تحتاج إلى تطويرها وتحديثها باستمرار. وبالتالي ، يعمل الباحثون في هذا المجال ويهتمون بتطوير وتحسين تقنيات إخفاء المعلومات. في هذا البحث ، يتم تقديم طريقة جديدة لتطوير طريقة البتات الاقل اهمية (LSB). تتضمن الطريقة مخططا لإخفاء بتين من النص السري في كل بكسل (البتات الأخيرة وقبل الأخيرة من البكسل) في صورة رمادية مع مراعاة أنماط الزخارف Z و U و N و C. يتم تنفيذ هذه الطريقة على صور قياسية مختلفة بحجم 512 * 512 وإخفاء أطوال نصية سرية مختلفة. تظهر التجربة والنتائج كفاءة الطريقة التي تخفي بتين في كل بكسل مقارنة مع طريقة LSB التقليدية التي تخفي بت واحد من البيانات في كل بكسل من الصورة. أظهرت النتائج أن الطريقة المقترحة تنتج دقة جيدة لصورة stego تقترب من طريقة LSB الأصلية من حيث مقياس دقة PSNR.Information hiding is one of multimedia security tasks need to develop and update in Continuously. Thus, the researchers work in this field and interest in developing and improving the information hiding techniques. In this paper, a new method for develop least significant bits (LSB) method is introduced. The method includes a schema for hiding two bits of secret text in each pixel (least and penultimate bits of pixel) in gray image considering motif Z, U, N, and C patterns. The method is implemented on different standard images with size 512*512 and hide different secret text lengths. The experimental and results show the efficiency of method that hide two bits in each pixel compare with the traditional LSB method that hide one bit of data in each pixel of image. The results show that the proposed method produces a good accuracy of stego image near to the original LSB method in terms of PSNR accuracy metric

    Secure covert communications over streaming media using dynamic steganography

    Get PDF
    Streaming technologies such as VoIP are widely embedded into commercial and industrial applications, so it is imperative to address data security issues before the problems get really serious. This thesis describes a theoretical and experimental investigation of secure covert communications over streaming media using dynamic steganography. A covert VoIP communications system was developed in C++ to enable the implementation of the work being carried out. A new information theoretical model of secure covert communications over streaming media was constructed to depict the security scenarios in streaming media-based steganographic systems with passive attacks. The model involves a stochastic process that models an information source for covert VoIP communications and the theory of hypothesis testing that analyses the adversary‘s detection performance. The potential of hardware-based true random key generation and chaotic interval selection for innovative applications in covert VoIP communications was explored. Using the read time stamp counter of CPU as an entropy source was designed to generate true random numbers as secret keys for streaming media steganography. A novel interval selection algorithm was devised to choose randomly data embedding locations in VoIP streams using random sequences generated from achaotic process. A dynamic key updating and transmission based steganographic algorithm that includes a one-way cryptographical accumulator integrated into dynamic key exchange for covert VoIP communications, was devised to provide secure key exchange for covert communications over streaming media. The discrete logarithm problem in mathematics and steganalysis using t-test revealed the algorithm has the advantage of being the most solid method of key distribution over a public channel. The effectiveness of the new steganographic algorithm for covert communications over streaming media was examined by means of security analysis, steganalysis using non parameter Mann-Whitney-Wilcoxon statistical testing, and performance and robustness measurements. The algorithm achieved the average data embedding rate of 800 bps, comparable to other related algorithms. The results indicated that the algorithm has no or little impact on real-time VoIP communications in terms of speech quality (< 5% change in PESQ with hidden data), signal distortion (6% change in SNR after steganography) and imperceptibility, and it is more secure and effective in addressing the security problems than other related algorithms
    corecore