67 research outputs found
Pseudo-random number generators and an improved steganographic algorithm
Steganography is the art and science of hiding secret information in a cover medium such that the presence of the hidden information cannot be detected. This thesis proposes a new method of steganography by cover modification in JPEG images. Essentially, the algorithm exercises LSB replacement using the definition for steganographic values from F5. After the nonzero quantized DCT coefficients of a cover image undergo a pseudorandom walk, the coefficients and the payload are split into an equal number of partitions and paired. Each coefficient partition is permuted again by the 1/P pseudo-random number generator until an optimal embedding efficiency for its corresponding payload is achieved. Using this method, we achieve a higher embedding efficiency than that of LSB replacement alone. We evaluate the detectability of our algorithm by creating a multi-classifier based on the output of multiple non-linear, soft-margin support vector machines trained on POMM features. We show that our algorithm performs nearly as well as the state-of-the-art nsF5 algorithm, and outperforms other state-of-the-art algorithms under most conditions
An Efficient Digital Image Watermarking Based on DCT and Advanced Image Data Embedding Method
Digital image enhancement and digital content or data image secure using DCT and advanced image data embedding method (AIDEM). AIDEM improved robustness based on particle shifting concept is reproduced secure image data and manipulated there’s a robust would like for a digital image copyright mechanism to be placed in secure image data. There’s a necessity for authentication of the content because of the owner. It’s become more accessible for malicious parties to create scalable copies of proprietary content with any compensation to the content owner. Advanced Watermarking is being viewed as a potential goal to the current downside. Astounding watermarking plans are arranged assaults on the watermarked picture are twisted and proposed to give insurance of proprietorship freedoms, information treating, and information uprightness. These methods guarantee unique information recuperation from watermarked information, while irreversible watermarking plans safeguard proprietorship freedoms. This attribute of reversible watermarking has arisen as an applicant answer for the assurance of proprietorship freedoms of information, unfortunate to alterations, for example, clinical information, genetic information, Visa, and financial balance information. These attacks are also intentional or unintentional. The attacks are classified as geometric attacks. This research presents a comprehensive and old method of these techniques that are developed and their effectiveness. Digital watermarking was developed to supply copyright protection and owners’ authentication. Digital image watermarking may be a methodology for embedding some information into digital image sequences, like text image, image data, during this research analysis on image watermarking and attacks on watermarking process time image data, classification of watermarking and applications. We aim to secure image data using advanced image data embedding method (AIDEM) improved robustness based particle shifting concept is reproduced secure image data. To develop compelling digital image watermarking methodology using mat lab tool and reliable and robust
Security of Streaming Media Communications with Logistic Map and Self-Adaptive Detection-Based Steganography
Voice over IP (VoIP) is finding its way into several applications, but its security concerns still remain. This paper
shows how a new self-adaptive steganographic method can ensure the security of covert VoIP communications over the
Internet. In this study an Active Voice Period Detection algorithm is devised for PCM codec to detect whether a VoIP packet
carries active or inactive voice data, and the data embedding location in a VoIP stream is chosen randomly according to random
sequences generated from a logistic chaotic map. The initial parameters of the chaotic map and the selection of where to
embed the message are negotiated between the communicating parties. Steganography experiments on active and inactive
voice periods were carried out using a VoIP communications system. Performance evaluation and security analysis indicates
that the proposed VoIP steganographic scheme can withstand statistical detection, and achieve secure real-time covert
communications with high speech quality and negligible signal distortion
Recommended from our members
Steganography-based secret and reliable communications: Improving steganographic capacity and imperceptibility
This thesis was submitted for the degree of Doctor of Philosophy and awarded by Brunel University.Unlike encryption, steganography hides the very existence of secret information rather than hiding its meaning only. Image based steganography is the most common system used since digital images are widely used over the Internet and Web. However, the capacity is mostly limited and restricted by the size of cover images. In addition, there is a tradeoff between both steganographic capacity and stego image quality. Therefore, increasing steganographic capacity and enhancing stego image quality are still challenges, and this is exactly our research main aim. Related to this, we also investigate hiding secret information in communication protocols, namely Simple Object Access Protocol (SOAP) message, rather than in conventional digital files.
To get a high steganographic capacity, two novel steganography methods were proposed. The first method was based on using 16x16 non-overlapping blocks and quantisation table for Joint Photographic Experts Group (JPEG) compression instead of 8x8. Then, the quality of JPEG stego images was enhanced by using optimised quantisation tables instead of the default tables. The second method, the hybrid method, was based on using optimised quantisation tables and two hiding techniques: JSteg along with our first proposed method. To increase the
steganographic capacity, the impact of hiding data within image chrominance was
investigated and explained. Since peak signal-to-noise ratio (PSNR) is extensively
used as a quality measure of stego images, the reliability of PSNR for stego images was also evaluated in the work described in this thesis. Finally, to eliminate any detectable traces that traditional steganography may leave in stego files, a novel and undetectable steganography method based on SOAP messages was proposed.
All methods proposed have been empirically validated as to indicate their utility
and value. The results revealed that our methods and suggestions improved the main aspects of image steganography. Nevertheless, PSNR was found not to be a
reliable quality evaluation measure to be used with stego image. On the other hand, information hiding in SOAP messages represented a distinctive way for undetectable and secret communication.The Ministry of Higher Education in Syria
and the University of Alepp
Recommended from our members
Secure digital documents using Steganography and QR Code
This thesis was submitted for the degree of Doctor of Philosophy and awarded by Brunel University LondonWith the increasing use of the Internet several problems have arisen regarding the processing of electronic documents. These include content filtering, content retrieval/search. Moreover, document security has taken a centre stage including copyright protection, broadcast monitoring etc. There is an acute need of an effective tool which can find the identity, location and the time when the document was created so that it can be determined whether or not the contents of the document were tampered with after creation. Owing the sensitivity of the large amounts of data which is processed on a daily basis, verifying the authenticity and integrity of a document is more important now than it ever was. Unsurprisingly document authenticity verification has become the centre of attention in the world of research. Consequently, this research is concerned with creating a tool which deals with the above problem. This research proposes the use of a Quick Response Code as a message carrier for Text Key-print. The Text Key-print is a novel method which employs the basic element of the language (i.e. Characters of the alphabet) in order to achieve authenticity of electronic documents through the transformation of its physical structure into a logical structured relationship. The resultant dimensional matrix is then converted into a binary stream and encapsulated with a serial number or URL inside a Quick response Code (QR code) to form a digital fingerprint mark. For hiding a QR code, two image steganography techniques were developed based upon the spatial and the transform domains. In the spatial domain, three methods were proposed and implemented based on the least significant bit insertion technique and the use of pseudorandom number generator to scatter the message into a set of arbitrary pixels. These methods utilise the three colour channels in the images based on the RGB model based in order to embed one, two or three bits per the eight bit channel which results in three different hiding capacities. The second technique is an adaptive approach in transforming domain where a threshold value is calculated under a predefined location for embedding in order to identify the embedding strength of the embedding technique. The quality of the generated stego images was evaluated using both objective (PSNR) and Subjective (DSCQS) methods to ensure the reliability of our proposed methods. The experimental results revealed that PSNR is not a strong indicator of the perceived stego image quality, but not a bad interpreter also of the actual quality of stego images. Since the visual difference between the cover and the stego image must be absolutely imperceptible to the human visual system, it was logically convenient to ask human observers with different qualifications and experience in the field of image processing to evaluate the perceived quality of the cover and the stego image. Thus, the subjective responses were analysed using statistical measurements to describe the distribution of the scores given by the assessors. Thus, the proposed scheme presents an alternative approach to protect digital documents rather than the traditional techniques of digital signature and watermarking
Secure covert communications over streaming media using dynamic steganography
Streaming technologies such as VoIP are widely embedded into commercial and industrial applications, so it is imperative to address data security issues before the problems get really serious. This thesis describes a theoretical and experimental investigation of secure covert communications over streaming media using dynamic steganography. A covert VoIP communications system was developed in C++ to enable the implementation of the work being carried out.
A new information theoretical model of secure covert communications over streaming media was constructed to depict the security scenarios in streaming media-based steganographic systems with passive attacks. The model involves a stochastic process that models an information source for covert VoIP communications and the theory of hypothesis testing that analyses the adversary‘s detection performance.
The potential of hardware-based true random key generation and chaotic interval selection for innovative applications in covert VoIP communications was explored. Using the read time stamp counter of CPU as an entropy source was designed to generate true random numbers as secret keys for streaming media steganography. A novel interval selection algorithm was devised to choose randomly data embedding locations in VoIP streams using random sequences generated from achaotic process.
A dynamic key updating and transmission based steganographic algorithm that includes a one-way cryptographical accumulator integrated into dynamic key exchange for covert VoIP communications, was devised to provide secure key exchange for covert communications over streaming media. The discrete logarithm problem in mathematics and steganalysis using t-test revealed the algorithm has the advantage of being the most solid method of key distribution over a public channel.
The effectiveness of the new steganographic algorithm for covert communications over streaming media was examined by means of security analysis, steganalysis using non parameter Mann-Whitney-Wilcoxon statistical testing, and performance and robustness measurements. The algorithm achieved the average data embedding rate of 800 bps, comparable to other related algorithms. The results indicated that the algorithm has no or little impact on real-time VoIP communications in terms of speech quality (< 5% change in PESQ with hidden data), signal distortion (6% change in SNR after steganography) and imperceptibility, and it is more secure and effective in addressing the security problems than other related algorithms
Performance Evaluation of Exponential Discriminant Analysis with Feature Selection for Steganalysis
The performance of supervised learning-based seganalysis depends on the choice of both classifier and features which represent the image. Features extracted from images may contain irrelevant and redundant features which makes them inefficient for machine learning. Relevant features not only decrease the processing time to train a classifier but also provide better generalisation. Linear discriminant classifier which is commonly used for classification may not be able to classify in better way non-linearly separable data. Recently, exponential discriminant analysis, a variant of linear discriminant analysis (LDA), is proposed which transforms the scatter matrices to a new space by distance diffusion mapping. This provides exponential discriminant analysis (EDA) much more discriminant power to classify non-linearly separable data and helps in improving classification accuracy in comparison to LDA. In this paper, the performance of EDA in conjunction with feature selection methods has been investigated. For feature selection, Kullback divergence, Chernoff distance measures and linear regression measures are used to determine relevant features from higher-order statistics of images. The performance is evaluated in terms classification error and computation time. Experimental results show that exponential discriminate analysis in conjunction with linear regression significantly performs better in terms of both classification error and compilation time of training classifier.Defence Science Journal, 2012, 62(1), pp.19-24, DOI:http://dx.doi.org/10.14429/dsj.62.143
Hybrid Information Hiding Technique Using Parametric Spline and DFT
Information hiding is a means to conical and transmitting information usingapparently innocent carrier without depiction any suspicions. This paper presents anew means for information hiding based images by using Hybrid of ParametricSpline and DFT. A set of control points, which represents secret key, are selectsrandomly from the carrier , and a curve pass by the selected control points isimplement using B-Spline. A hiding process for the secret message bits tacksplace on the spectral real part of the intensity pixels where the B-Spline curvepasses by using LSB technique, followed by the IDFT. The paper also presents theinformation hiding features, and techniques for images, and Interpolationtechniques. The Objective fidelity criteria are depicts the improvements inalgorithm with an application example
- …