724 research outputs found

    Transparent authentication methodology in electronic education

    No full text
    In the context of on-line assessment in e-learning, a problem arises when a student taking an exam may wish to cheat by handing over personal credentials to someone else to take their place in an exam, Another problem is that there is no method for signing digital content as it is being produced in a computerized environment. Our proposed solution is to digitally sign the participant’s work by embedding voice samples in the transcript paper at regular intervals. In this investigation, we have demonstrated that a transparent stenographic methodology will provide an innovative and practical solution for achieving continuous authentication in an online educational environment by successful insertion and extraction of audio digital signatures

    Code wars: steganography, signals intelligence, and terrorism

    Get PDF
    This paper describes and discusses the process of secret communication known as steganography. The argument advanced here is that terrorists are unlikely to be employing digital steganography to facilitate secret intra-group communication as has been claimed. This is because terrorist use of digital steganography is both technically and operationally implausible. The position adopted in this paper is that terrorists are likely to employ low-tech steganography such as semagrams and null ciphers instead

    Using Transcoding for Hidden Communication in IP Telephony

    Get PDF
    The paper presents a new steganographic method for IP telephony called TranSteg (Transcoding Steganography). Typically, in steganographic communication it is advised for covert data to be compressed in order to limit its size. In TranSteg it is the overt data that is compressed to make space for the steganogram. The main innovation of TranSteg is to, for a chosen voice stream, find a codec that will result in a similar voice quality but smaller voice payload size than the originally selected. Then, the voice stream is transcoded. At this step the original voice payload size is intentionally unaltered and the change of the codec is not indicated. Instead, after placing the transcoded voice payload, the remaining free space is filled with hidden data. TranSteg proof of concept implementation was designed and developed. The obtained experimental results are enclosed in this paper. They prove that the proposed method is feasible and offers a high steganographic bandwidth. TranSteg detection is difficult to perform when performing inspection in a single network localisation.Comment: 17 pages, 16 figures, 4 table

    Securing Text Messages Using Graph Theory and Steganography

    Get PDF
    تامين البيانات يعتبر كعنصر مهم في انظمة لاتصالات وتناقل البيانات. ويكمن دوره الرئيسي في الحفاظ على المعلومات الحساسة بأمان وبشكل متكامل من المرسل إلى المتلقي ، وهناك نوعان من مبادئ الامنية هما التشفير وإخفاء المعلومات ، الأول يعمل على تغيير مظهر المعلومات ويغير من هيئتها في حين أن الثاني يخفيها من الدخلاء. النظام المصمم يقترح طريقة جديدة للتشفير باستخدام خصائص نظرية البيانات ؛ يعطي مفتاحًا تم إنشاؤه بتحويل كلمة السر الى مخطط (graph) من نوع متكامل  complete  ثم نستخرج مصفوفة التجاور adjacency matrix  للمخطط ونستخدمها كمفتاح نهائي لتشفير النص  وذلك باستخدام عملية الضرب (ضرب المصفوفات) للحصول على النص المشفر بعدها يتم استخدام طريقة البت الاقل اهمية Least Significant Bit LSB   لإخفاء الرسالة المشفرة في صورة ملونة في المكون الاخضر G من مكوناتها. وكذلك تم توظيف معادلة تحليل PSNR والتي اثبتت كفاءة النظام في اخفاء الرسالة باقل تشويش ممكن بحوالي (97-85)  dB لصورة الغلاف قبل وبعد عملية الاخفاء و MSE تتراوح بين  (4.537e-05 -5.27546e-04) و  SSIM=1.0.       Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and SSIM. These measures had proved the efficiency of the system for image quality and hiding messages with PSNR ratio more than 85 dB, MSE ranged (4.537e-05  to 5.27546e-04) and SSIM=1.0 for using a cover file with size ranged from 256×300 to 1200×760 pixels and message ranged from 16 to 300 characters.

    A Study of Data Security on E-Governance using Steganographic Optimization Algorithms

    Get PDF
    Steganography has been used massively in numerous fields to maintain the privacy and integrity of messages transferred via the internet. The need to secure the information has augmented with the increase in e-governance usage. The wide adoption of e-governance services also opens the doors to cybercriminals for fraudulent activities in cyberspace. To deal with these cybercrimes we need optimized and advanced steganographic techniques. Various advanced optimization techniques can be applied to steganography to obtain better results for the security of information. Various optimization techniques like particle swarm optimization and genetic algorithms with cryptography can be used to protect information for e-governance services. In this study, a comprehensive review of steganographic algorithms using optimization techniques is presented. A new perspective on using this technique to protect the information for e-governance is also presented. Deep Learning might be the area that can be used to automate the steganography process in combination with other method

    Review on DNA Cryptography

    Get PDF
    Cryptography is the science that secures data and communication over the network by applying mathematics and logic to design strong encryption methods. In the modern era of e-business and e-commerce the protection of confidentiality, integrity and availability (CIA triad) of stored information as well as of transmitted data is very crucial. DNA molecules, having the capacity to store, process and transmit information, inspires the idea of DNA cryptography. This combination of the chemical characteristics of biological DNA sequences and classical cryptography ensures the non-vulnerable transmission of data. In this paper we have reviewed the present state of art of DNA cryptography.Comment: 31 pages, 12 figures, 6 table

    Evaluation Review on Effectiveness and Security Performances of Text Steganography Technique

    Get PDF
    Steganography is one of the categories in information hiding that is implemented to conceal the hidden message to ensure it cannot be recognized by human vision. This paper focuses on steganography implementation in text domain namely text steganography.Text steganography consists of two groups, which are word-rule based and feature-based techniques.This paper analysed these two categories of text steganography based on effectiveness and security evaluation because the effectiveness is critically important in order to determine that technique has the appropriate quality.Meanwhile, the security is important due to the intensity performance in securing the hidden message. The main goal of this paper is to review the evaluation of text steganography in terms of effectiveness and security that have been developed by previous research efforts. It is anticipated that this paper will identify the performance of text steganography based on effectiveness and security measurement

    Securing Data Using JPEG Image Over Mobile Phone

    Get PDF
    In recent past years, Internet and Mobile is widely used for communication. Multimedia messaging (MMS) and Short Service Messaging (SMS) are the popular services provided by the telecommunication companies. In MMS we can easily send picture with text message. In SMS we can send text only. These techniques make the communication so fast. As well as the communication became easy attention toward information security increased. Data Security is the main concern for research. Mostly used techniques for secure communication are Cryptography and Steganography. There are so many techniques for steganography and cryptography. Mostly used techniques are image steganography and there are so many algorithms for this. For the cryptography mainly AES techniques is being used. In this paper we are presenting a technique using cryptography and steganography for securing information over mobile in MMS. It is very common practice to hide data in LSB of pixel. Spatial and frequency domains are generally used for image processing. Spatial domain have so many computations comparatively frequency domain. There different transform techniques are used for transformation e.g. DCT, FFT and wavelets. Here we are using Discrete Cosine transform (DCT) for image steganography and tiny encryption algorithm for cryptography. Tiny encryption algorithm (TEA) is block cipher algorithm.It is simple and fast but best for mobile application

    A review on structured scheme representation on data security application

    Get PDF
    With the rapid development in the era of Internet and networking technology, there is always a requirement to improve the security systems, which secure the transmitted data over an unsecured channel. The needs to increase the level of security in transferring the data always become the critical issue. Therefore, data security is a significant area in covering the issue of security, which refers to protect the data from unwanted forces and prevent unauthorized access to a communication. This paper presents a review of structured-scheme representation for data security application. There are five structured-scheme types, which can be represented as dual-scheme, triple-scheme, quad-scheme, octal-scheme and hexa-scheme. These structured-scheme types are designed to improve and strengthen the security of data on the application
    corecore