3,208 research outputs found

    Study of Reversible Scheme for Data Hiding

    Get PDF
    Web is the prominent correspondence media now a days yet message exchange over the web is confronting a few issue, for example, copyright control, information security, information, confirmation and so forth. Information stowing away assumes a critical part in information security. It is a procedure in which mystery information or data is put away or covered up into cover media. Thus many explores are advancing on the field like web security, steganography, and cryptography. At the point when exchange the safe or private information over a shaky channel it is expected to encode cover or unique information and after that insert the protected information into that unique or, on the other hand cover picture

    ENHANCED REVERSIBLE IMAGE DATA HIDING BASED ON BLOCK HISTOGRAM SHIFTING AND PADHM

    Get PDF
    Due to the enhanced digital media on the web, information security and privacy protection issue have attracted the eye of information communication. Information hiding has become a subject of sizable im-portance. Currently each day there's very big drawback of information hacking into the networking space. There is variety of techniques offered within the trade to over-come this drawback. So, information hiding within the encrypted image is one in all the solutions, however the matter is that the original cover can't be losslessly recov-ered by this system. That’s why recently; additional and additional attention is paid to reversible information concealing in encrypted pictures however this technique drawback low hardiness. A completely unique technique is planned by reserving for embedding information be-fore encoding of the image takes place with the offered algorithmic rule. Currently the authentic person will hide the information simply on the image to produce authen-tication. The transmission and exchange of image addi-tionally desires a high security .This is the review paper regarding this reversible information hiding algorithms obtainable. As a result, because of histogram enlarge-ment and bar graph shifting embedded message and also the host image may be recovered dead. The embedding rate is enhanced and PSNR magnitude relation using novel technique

    Fusion of Steganography Digital Watermarking Data Hidden In Patient Medical Image using PPC Approach

    Get PDF
    Privacy is a critical issue when the patient message storage or processing to the medical services. Digital Image processing is the quick emerging area of medical science. The improvement of image processing was given by the technology improvement like digital visualizing, computer processor and large storage devices. Image processing allowed to compute the image in multidimensional within the system. First, the real problem becomes many severe due to the decrease of visual proofs in telehealth applications. A watermark is a protect message that message hidden into a mask message. Digital image watermarks are used for check the approval of the carrier signal for confirmation of the owners. In order to give information honesty, confidentiality and authentication various approaches are accessible like networking side cryptography, image processing side steganography and digital watermarking. To protect the patient message in telehealth, hidden into a mask message is recently used. Patient details are watermark within the cover medical image. The public and personal key cryptography (PPC) is insufficient for providing the trust a patient may attain during a face-to-face service

    Efficient Security and Authentication for Edge-Based Internet of Medical Things

    Get PDF
    Internet of Medical Things (IoMT)-driven smart health and emotional care is revolutionizing the healthcare industry by embracing several technologies related to multimodal physiological data collection, communication, intelligent automation, and efficient manufacturing. The authentication and secure exchange of electronic health records (EHRs), comprising of patient data collected using wearable sensors and laboratory investigations, is of paramount importance. In this article, we present a novel high payload and reversible EHR embedding framework to secure the patient information successfully and authenticate the received content. The proposed approach is based on novel left data mapping (LDM), pixel repetition method (PRM), RC4 encryption, and checksum computation. The input image of size MimesNM imes N is upscaled by using PRM that guarantees reversibility with lesser computational complexity. The binary secret data are encrypted using the RC4 encryption algorithm and then the encrypted data are grouped into 3-bit chunks and converted into decimal equivalents. Before embedding, these decimal digits are encoded by LDM. To embed the shifted data, the cover image is divided into 2imes22 imes 2 blocks and then in each block, two digits are embedded into the counter diagonal pixels. For tamper detection and localization, a checksum digit computed from the block is embedded into one of the main diagonal pixels. A fragile logo is embedded into the cover images in addition to EHR to facilitate early tamper detection. The average peak signal to noise ratio (PSNR) of the stego-images obtained is 41.95 dB for a very high embedding capacity of 2.25 bits per pixel. Furthermore, the embedding time is less than 0.2 s. Experimental results reveal that our approach outperforms many state-of-the-art techniques in terms of payload, imperceptibility, computational complexity, and capability to detect and localize tamper. All the attributes affirm that the proposed scheme is a potential candidate for providing better security and authentication solutions for IoMT-based smart health

    Privacy-preserving information hiding and its applications

    Get PDF
    The phenomenal advances in cloud computing technology have raised concerns about data privacy. Aided by the modern cryptographic techniques such as homomorphic encryption, it has become possible to carry out computations in the encrypted domain and process data without compromising information privacy. In this thesis, we study various classes of privacy-preserving information hiding schemes and their real-world applications for cyber security, cloud computing, Internet of things, etc. Data breach is recognised as one of the most dreadful cyber security threats in which private data is copied, transmitted, viewed, stolen or used by unauthorised parties. Although encryption can obfuscate private information against unauthorised viewing, it may not stop data from illegitimate exportation. Privacy-preserving Information hiding can serve as a potential solution to this issue in such a manner that a permission code is embedded into the encrypted data and can be detected when transmissions occur. Digital watermarking is a technique that has been used for a wide range of intriguing applications such as data authentication and ownership identification. However, some of the algorithms are proprietary intellectual properties and thus the availability to the general public is rather limited. A possible solution is to outsource the task of watermarking to an authorised cloud service provider, that has legitimate right to execute the algorithms as well as high computational capacity. Privacypreserving Information hiding is well suited to this scenario since it is operated in the encrypted domain and hence prevents private data from being collected by the cloud. Internet of things is a promising technology to healthcare industry. A common framework consists of wearable equipments for monitoring the health status of an individual, a local gateway device for aggregating the data, and a cloud server for storing and analysing the data. However, there are risks that an adversary may attempt to eavesdrop the wireless communication, attack the gateway device or even access to the cloud server. Hence, it is desirable to produce and encrypt the data simultaneously and incorporate secret sharing schemes to realise access control. Privacy-preserving secret sharing is a novel research for fulfilling this function. In summary, this thesis presents novel schemes and algorithms, including: • two privacy-preserving reversible information hiding schemes based upon symmetric cryptography using arithmetic of quadratic residues and lexicographic permutations, respectively. • two privacy-preserving reversible information hiding schemes based upon asymmetric cryptography using multiplicative and additive privacy homomorphisms, respectively. • four predictive models for assisting the removal of distortions inflicted by information hiding based respectively upon projection theorem, image gradient, total variation denoising, and Bayesian inference. • three privacy-preserving secret sharing algorithms with different levels of generality

    RDH in Image with Asymmetric Key Cryptography

    Get PDF
    Reversible Data Hiding technique (RDH) is an approach to embed secret data into the encrypted original cover image. The confidentiality must be there when the secret media is transmitted to the receiver via network. This paper proposes a new framework for embedding the secret data into the image with the combination of RDH technique with asymmetric key cryptography to gain high security. It achieves perfect extraction of data and quality original image retrieval on decryption process. Thus this system will gain maximum efficiency and maintain high secrecy for both data and image than the existing RDH systems

    New Watermarking/Encryption Method for Medical Imaging FULL Protection in m-Health

    Get PDF
    In this paper, we present a new method for medical images security dedicated to m-Health based on a combination between a novel semi reversible watermarking approach robust to JPEG compression, a new proposed fragile watermarking and a new proposed encryption algorithm. The purpose of the combination of these three proposed algorithms (encryption, robust and fragile watermarking) is to ensure the full protection of medical image, its information and its report in terms of confidentiality and reliability (authentication and integrity). A hardware implementation to evaluate our system is done using the Texas instrument C6416 DSK card by converting m-files to C/C++ using MATLAB coder. Our m-health security system is then run on the android platform. Experimental results show that the proposed algorithm can achieve high security with good performance

    A Framework for Multimedia Data Hiding (Security)

    Get PDF
    With the proliferation of multimedia data such as images, audio, and video, robust digital watermarking and data hiding techniques are needed for copyright protection, copy control, annotation, and authentication. While many techniques have been proposed for digital color and grayscale images, not all of them can be directly applied to binary document images. The difficulty lies in the fact that changing pixel values in a binary document could introduce Irregularities that is very visually noticeable. We have seen but limited number of papers proposing new techniques and ideas for document image watermarking and data hiding. In this paper, we present an overview and summary of recent developments on this important topic, and discuss important issues such as robustness and data hiding capacity of the different techniques
    • …
    corecore