3,533 research outputs found

    Study of Reversible Scheme for Data Hiding

    Get PDF
    Web is the prominent correspondence media now a days yet message exchange over the web is confronting a few issue, for example, copyright control, information security, information, confirmation and so forth. Information stowing away assumes a critical part in information security. It is a procedure in which mystery information or data is put away or covered up into cover media. Thus many explores are advancing on the field like web security, steganography, and cryptography. At the point when exchange the safe or private information over a shaky channel it is expected to encode cover or unique information and after that insert the protected information into that unique or, on the other hand cover picture

    Application of Stochastic Diffusion for Hiding High Fidelity Encrypted Images

    Get PDF
    Cryptography coupled with information hiding has received increased attention in recent years and has become a major research theme because of the importance of protecting encrypted information in any Electronic Data Interchange system in a way that is both discrete and covert. One of the essential limitations in any cryptography system is that the encrypted data provides an indication on its importance which arouses suspicion and makes it vulnerable to attack. Information hiding of Steganography provides a potential solution to this issue by making the data imperceptible, the security of the hidden information being a threat only if its existence is detected through Steganalysis. This paper focuses on a study methods for hiding encrypted information, specifically, methods that encrypt data before embedding in host data where the ‘data’ is in the form of a full colour digital image. Such methods provide a greater level of data security especially when the information is to be submitted over the Internet, for example, since a potential attacker needs to first detect, then extract and then decrypt the embedded data in order to recover the original information. After providing an extensive survey of the current methods available, we present a new method of encrypting and then hiding full colour images in three full colour host images with out loss of fidelity following data extraction and decryption. The application of this technique, which is based on a technique called ‘Stochastic Diffusion’ are wide ranging and include covert image information interchange, digital image authentication, video authentication, copyright protection and digital rights management of image data in general

    Paper Session V: Steganography and Terrorist Communications - Current Information and Trends - Tools, Analysis and Future Directions in Steganalysis in Context with Terrorists and Other Criminals

    Get PDF
    In ancient times, users communicated using steganography, “…derived from the Greek words steganos, meaning ‘covered’, and graphein, meaning ‘to write.’” (Singh, 1999, p.5) Steganography facilitates secret, undetected communication. In modern times, in the context of the Global War on Terror, national intelligence and law enforcement agencies need tools to detect hidden information (steganography) in various types of media, most specifically to uncover the placement of hidden information in images. This paper will look at steganography in general terms, presenting the theory of some common steganographic techniques and touching on some theoretical work in steganography. Then a discussion of how to utilize detection tools will shed light on the question of how to make our nation more secure in light of this technology being used by nefarious individuals and organizations. Keywords: Steganography, information hiding, computer forensics, terrorism, steganalysis, cryptograph

    MODIFIED MULTI-LEVEL STEGANOGRAPHY TO ENHANCE DATA SECURITY

    Get PDF
    Data-hiding using steganography algorithm becomes an important technique to prevent unauthorized users to have access to a secret data.  In this paper, steganography algorithm has been constructed to hide a secret data in a gray and a color images, this algorithm is named deep hiding/extraction algorithm (DHEA) to modify multi-level steganography (MLS). The suggested hiding algorithm is based on modified least significant bit (MDLSB) to scatter data in a cover-image and it utilizes a number of levels; where each level perform hiding data on a gray image except the last level that applies a color image to keep secret data. Furthermore, proper randomization approach with two layers is implemented; the first layer uses random pixels selection for hiding a secret data at each level, while the second layer implements at the last level to move randomly from segment to the others. In addition, the proposed hiding algorithm implements an effective lossless image compression using DEFLATE algorithm to make it possible to hide data into a next level. Dynamic encryption algorithm based on Advanced Encryption Standard (AES) is applied at each level by changing cipher keys (Ck) from level to the next, this approach has been applied to increase the security and working against attackers. Soft computing using a meta-heuristic approach based on artificial bee colony (ABC) algorithm has been introduced to achieve smoothing on pixels of stego-image, this approach is effective to reduce the noise caused by a hidden large amount of data and to increase a stego-image quality on the last level. The experimental result demonstrates the effectiveness of the proposed algorithm with bee colony DHA-ABC to show high-performing to hide a large amount of data up to four bits per pixel (bpp) with high security in terms of hard extraction of a secret message and noise reduction of the stego-image. Moreover, using deep hiding with unlimited levels is promising to confuse attackers and to compress a deep sequence of images into one image

    Data hiding techniques in steganography using fibonacci sequence and knight tour algorithm

    Get PDF
    The foremost priority in the information and communication technology era, is achieving an efficient and accurate steganography system for hiding information. The developed system of hiding the secret message must capable of not giving any clue to the adversaries about the hidden data. In this regard, enhancing the security and capacity by maintaining the Peak Signal-to-Noise Ratio (PSNR) of the steganography system is the main issue to be addressed. This study proposed an improved for embedding secret message into an image. This newly developed method is demonstrated to increase the security and capacity to resolve the existing problems. A binary text image is used to represent the secret message instead of normal text. Three stages implementations are used to select the pixel before random embedding to select block of (64 × 64) pixels, follows by the Knight Tour algorithm to select sub-block of (8 × 8) pixels, and finally by the random pixels selection. For secret embedding, Fibonacci sequence is implemented to decomposition pixel from 8 bitplane to 12 bitplane. The proposed method is distributed over the entire image to maintain high level of security against any kind of attack. Gray images from the standard dataset (USC-SIPI) including Lena, Peppers, Baboon, and Cameraman are implemented for benchmarking. The results show good PSNR value with high capacity and these findings verified the worthiness of the proposed method. High complexities of pixels distribution and replacement of bits will ensure better security and robust imperceptibility compared to the existing systems in the literature

    Designing Secure and Survivable Stegosystems

    Get PDF
    Steganography, the art and science of carrying out hidden communication, is an emergingsub-discipline of information security. Unlike cryptography, steganography conceals the existenceof a secret message by embedding it in an innocuous container digital media, thereby enablingunobstrusive communication over insecure channels. Detection and extraction of steganographiccontents is another challenge for the information security professional and this activity iscommonly known as steganalysis. Recent progress in steganalysis has posed a challenge fordesign and development of stegosystems with high levels of security and survivability. In thispaper, different strategies have been presented that can be used to escape detection and foilan eavesdropper having high technical capabilities as well as adequate infrastructure. Based onthe strength and weaknesses of current steganographic schemes, ideas have been progressedto make detection and destruction of hidden information more difficult

    Digital Rights Management: Improving Online Digital Images Copy Rights Management through an Enhanced Least Significant Bit Steganographic Algorithm

    Get PDF
    Digital media no doubt presents numerous advantages compared to the traditional analog media. Of the most importance is the fact that digital content (images, graphics, audio and video) can be easily copied, transmitted, retrieved and distributed over private and open access networks. The global availability of the internet- certainly the most impactful information exchange tool today- plus the numerous file sharing tools freely available have made the distribution of copyrighted digital media files simple and straightforward. Duplication of exact copies of original images, for example can be easily done and circulated without authentication. As much as this is an advantage in trying to enhance sharing of information, it certainly creates problems of ownership and authenticity and digital rights protection. There already exists copyright laws that provide for protection of all online content but the task of continuously guarding the web and correctly identifying those that infringe against these laws is increasingly becoming enormous. There is therefore need to continuously invest in development of new technologies and algorithms that will make it more and more difficult to illegally copy or use someone else content. To improve security of copyrighted online digital images, this paper proposes the use of an enhanced LSB steganographic algorithm that employs a selective and randomized approach in picking specific number of target image bits to swap with the owners signature authentication bits using a pseudo random number generator (PRNG). The carefully selected password seed is used to determine the set of selected numbers used for targeting specific image bits for the signature hiding. An experimental design is setup to determine the effectiveness of the method by comparing and analyzing the stego images’ statistical characteristics and the ability of steganalysis methods to detect the hidden signature. The experimental results indicate improved levels of imperceptibility and hence improved security against illegal copying. Keywords: Digital Media, Steganography, Copyright, Steganalysis, Stego image, imperceptibilit
    corecore