4 research outputs found

    Efficient and Robust Video Steganography Algorithms for Secure Data Communication

    Get PDF
    Over the last two decades, the science of secretly embedding and communicating data has gained tremendous significance due to the technological advancement in communication and digital content. Steganography is the art of concealing secret data in a particular interactive media transporter such as text, audio, image, and video data in order to build a covert communication between authorized parties. Nowadays, video steganography techniques are important in many video-sharing and social networking applications such as Livestreaming, YouTube, Twitter, and Facebook because of noteworthy developments in advanced video over the Internet. The performance of any steganography method, ultimately, relies on the imperceptibility, hiding capacity, and robustness against attacks. Although many video steganography methods exist, several of them lack the preprocessing stages. In addition, less security, low embedding capacity, less imperceptibility, and less robustness against attacks are other issues that affect these algorithms. This dissertation investigates and analyzes cutting edge video steganography techniques in both compressed and raw domains. Moreover, it provides solutions for the aforementioned problems by proposing new and effective methods for digital video steganography. The key objectives of this research are to develop: 1) a highly secure video steganography algorithm based on error correcting codes (ECC); 2) an increased payload video steganography algorithm in the discrete wavelet domain based on ECC; 3) a novel video steganography algorithm based on Kanade-Lucas-Tomasi (KLT) tracking and ECC; 4) a robust video steganography algorithm in the wavelet domain based on KLT tracking and ECC; 5) a new video steganography algorithm based on the multiple object tracking (MOT) and ECC; and 6) a robust and secure video steganography algorithm in the discrete wavelet and discrete cosine transformations based on MOT and ECC. The experimental results from our research demonstrate that our proposed algorithms achieve higher embedding capacity as well as better imperceptibility of stego videos. Furthermore, the preprocessing stages increase the security and robustness of the proposed algorithms against attacks when compared to state-of-the-art steganographic methods

    A robust, reliable and deployable framework for In-vehicle security

    Full text link
    Cyber attacks on financial and government institutions, critical infrastructure, voting systems, businesses, modern vehicles, etc., are on the rise. Fully connected autonomous vehicles are more vulnerable than ever to hacking and data theft. This is due to the fact that the protocols used for in-vehicle communication i.e. controller area network (CAN), FlexRay, local interconnect network (LIN), etc., lack basic security features such as message authentication, which makes it vulnerable to a wide range of attacks including spoofing attacks. This research presents methods to protect the vehicle against spoofing attacks. The proposed methods exploit uniqueness in the electronic control unit electronic control unit (ECU) and the physical channel between transmitting and destination nodes for linking the received packet to the source. Impurities in the digital device, physical channel, imperfections in design, material, and length of the channel contribute to the uniqueness of artifacts. I propose novel techniques for electronic control unit (ECU) identification in this research to address security vulnerabilities of the in-vehicle communication. The reliable ECU identification has the potential to prevent spoofing attacks launched over the CAN due to the inconsideration of the message authentication. In this regard, my techniques models the ECU-specific random distortion caused by the imperfections in digital-to-analog converter digital to analog converter (DAC), and semiconductor impurities in the transmitting ECU for fingerprinting. I also model the channel-specific random distortion, impurities in the physical channel, imperfections in design, material, and length of the channel are contributing factors behind physically unclonable artifacts. The lumped element model is used to characterize channel-specific distortions. This research exploits the distortion of the device (ECU) and distortion due to the channel to identify the transmitter and hence authenticate the transmitter.Ph.D.College of Engineering & Computer ScienceUniversity of Michigan-Dearbornhttps://deepblue.lib.umich.edu/bitstream/2027.42/154568/1/Azeem Hafeez Final Disseration.pdfDescription of Azeem Hafeez Final Disseration.pdf : Dissertatio

    Nonparametric Steganalysis of QIM Steganography Using Approximate Entropy

    No full text
    Abstract—This paper proposes an active steganalysis method for quantization index modulation (QIM)-based steganography. The proposed nonparametric steganalysis method uses irregularity (or randomness) in the test image to distinguish between the cover image and the stego image. We have shown that plain quantization (quantization without message embedding) induces regularity in the resulting quantized object, whereas message embedding using QIM increases irregularity in the resulting QIM-stego. Approximate entropy, an algorithmic entropy measure, is used to quantify irregularity in the test image. The QIM-stego image is then analyzed to estimate secret message length. To this end, the QIM codebook is estimated from the QIM-stego image using first-order statistics of the image coefficients in the embedding domain. The estimated codebook is then used to estimate secret message. Simulation results show that the proposed scheme can successfully estimate the hidden message from the QIM-stego with very low decoding error probability. For a given cover object the decoding error probability depends on embedding rate and decreases monotonically, approaching zero as the embedding rate approaches one. Index Terms—Algorithmic entropy, approximate entropy, complexity, dither modulation, embedding rate, entropy, message recovery, quantization index modulation, steganalysis, steganography. I

    Nonparametric Steganalysis of QIM Steganography using Approximate Entropy

    No full text
    Abstract-This paper proposes an active steganalysis method for quantization index modulation (QIM) based steganography. The proposed nonparametric steganalysis method uses irregularity (or randomness) in the test-image to distinguish between the cover-image and the stego-image. We have shown that plainquantization (quantization without message embedding) induces regularity in the resulting quantized-object, whereas message embedding using QIM increases irregularity in the resulting QIMstego. Approximate entropy, an algorithmic entropy measure, is used to quantify irregularity in the test-image. The QIM-stego image is then analyzed to estimate secret message length. To this end, the QIM codebook is estimated from the QIM-stego image using first-order statistics of the image coefficients in the embedding domain. The estimated codebook is then used to estimate secret message. Simulation results show that the proposed scheme can successfully estimate the hidden message from the QIM-stego with very low decoding error probability. For a given cover-object the decoding error probability depends on embedding rate and decreases monotonically, approaching zero as the embedding rate approaches one
    corecore