79 research outputs found

    An embedding traid-bit method to improve the performance of Arabic text steganography

    Get PDF
    The enormous development in the utilization of the Internet has driven by continuous improvements in the region of security. The enhanced security techniques are applied to save the intellectual property. There are numerous sorts of security mechanisms. Steganography is the art and science of concealing secret information inside a cover media without drawing any suspicion to the eavesdropper so that the secret information can only be detected by its proposed recipient. This is done along with the other steganography methods such as image, audio, video, various text steganography methods that are being presented. The text is ideal for steganography due to its ubiquity. There are many steganography methods used several languages such as English, Chines and Arabic language to embed the hidden message in the cover text. Kashida, shifting point and sharp_edges are Arabic steganography methods with high capacity. However, kashida, shifting point and sharp_edges techniques have lack of capability to embed the hidden message into the cover text. This study proposed new method called Traid-bit method by integrating three several types of methods such us kashida, shifting point and sharp_edges to evaluate the proposed method in improving the performance of embedding process. The study presents the process design of proposed method including the algorithms and the system design. The study found that the evaluation of the proposed method provides good knowledge to steganographer to improve the performance of embedding process when the Arabic text steganography method is developed

    Critical analysis on steganography technique in text domain

    Get PDF
    This papers presents several steganography method on text domain based on the perspective of researchers effort in last decade.It has been analyzed the categories of method steganography in medium of text; text steganography and linguistic steganography.The following aim on this paper is identifying the typical these two methods in order to recognize the comparison technique used in previous study.Especially, the explication techniques of text steganography which consist of word-rule based and feature-based technique is critical concern in this paper.Finally, the advantage characteristic and drawback on these techniques in generally also presented in this paper

    Embarrassingly Simple Text Watermarks

    Full text link
    We propose Easymark, a family of embarrassingly simple yet effective watermarks. Text watermarking is becoming increasingly important with the advent of Large Language Models (LLM). LLMs can generate texts that cannot be distinguished from human-written texts. This is a serious problem for the credibility of the text. Easymark is a simple yet effective solution to this problem. Easymark can inject a watermark without changing the meaning of the text at all while a validator can detect if a text was generated from a system that adopted Easymark or not with high credibility. Easymark is extremely easy to implement so that it only requires a few lines of code. Easymark does not require access to LLMs, so it can be implemented on the user-side when the LLM providers do not offer watermarked LLMs. In spite of its simplicity, it achieves higher detection accuracy and BLEU scores than the state-of-the-art text watermarking methods. We also prove the impossibility theorem of perfect watermarking, which is valuable in its own right. This theorem shows that no matter how sophisticated a watermark is, a malicious user could remove it from the text, which motivate us to use a simple watermark such as Easymark. We carry out experiments with LLM-generated texts and confirm that Easymark can be detected reliably without any degradation of BLEU and perplexity, and outperform state-of-the-art watermarks in terms of both quality and reliability

    Design of evaluation procedures for letter-based techniques in text ste ganography method

    Get PDF
    Steganography is one of information hiding area that covers the information in any medium domain such as text, image, audio and video. One of steganography categories in the medium of text is called text steganography. It conceals hidden message with embedding the text via various methods such as horizontally shifting, vertically shifting or based on the letter of text structures. Many researchers utilize the feature-based technique to cover hidden message based on uniqueness of letter. Therefore, this study intends to focus on specific type of feature-based technique which is the letter-based text steganography. However, there is still issue relating to this method which the existence of the technique in the text is easily discoverable by attackers. Literature indicated that this issue is probably rooted from the lack of verification and validation procedures during the development of the steganography method. This study aims to identify the suitable parameters for verification and validation process. In addition, the parameters will then be used in conducting evaluation on the letter-based text steganography. The outcome of this study showed that the parameters which involved in verification and validation process will be able to improve the performance and security of the technique

    A Framework for Multimedia Data Hiding (Security)

    Get PDF
    With the proliferation of multimedia data such as images, audio, and video, robust digital watermarking and data hiding techniques are needed for copyright protection, copy control, annotation, and authentication. While many techniques have been proposed for digital color and grayscale images, not all of them can be directly applied to binary document images. The difficulty lies in the fact that changing pixel values in a binary document could introduce Irregularities that is very visually noticeable. We have seen but limited number of papers proposing new techniques and ideas for document image watermarking and data hiding. In this paper, we present an overview and summary of recent developments on this important topic, and discuss important issues such as robustness and data hiding capacity of the different techniques

    A Survey on Detection of LLMs-Generated Content

    Full text link
    The burgeoning capabilities of advanced large language models (LLMs) such as ChatGPT have led to an increase in synthetic content generation with implications across a variety of sectors, including media, cybersecurity, public discourse, and education. As such, the ability to detect LLMs-generated content has become of paramount importance. We aim to provide a detailed overview of existing detection strategies and benchmarks, scrutinizing their differences and identifying key challenges and prospects in the field, advocating for more adaptable and robust models to enhance detection accuracy. We also posit the necessity for a multi-faceted approach to defend against various attacks to counter the rapidly advancing capabilities of LLMs. To the best of our knowledge, this work is the first comprehensive survey on the detection in the era of LLMs. We hope it will provide a broad understanding of the current landscape of LLMs-generated content detection, offering a guiding reference for researchers and practitioners striving to uphold the integrity of digital information in an era increasingly dominated by synthetic content. The relevant papers are summarized and will be consistently updated at https://github.com/Xianjun-Yang/Awesome_papers_on_LLMs_detection.git.Comment: We will keep updating at https://github.com/Xianjun-Yang/Awesome_papers_on_LLMs_detection.gi

    STEGANOGRAFI CITRA PADA KARAKTER KHUSUS AKSARA JAWA MENGGUNAKAN METODE DISCRETE COSINE TRANSFORM

    Get PDF
    Penyadapan informasi adalah salah satu dampak negatif dari kemudahan proses bertukar data melalui internet. Terbongkarnya sebuah rahasia atau bahkan hilangnya sejumlah materi merupakan akibat dari informasi penting yang tidak terlindungi secara baik. Oleh karena itu, butuh suatu teknik untuk melindungi data dari hacker maupun cracker. Steganografi adalah salah satu teknik mengamankan data dengan menyisipkan data ke sebuah file multimedia. Pada penelitian tugas akhir ini, dibuat sebuah sistem steganografi untuk menyisipkan pesan teks pada citra Aksara Jawa (.bmp) menggunakan metode DCT (Discrete Cosine Transform). Pada praktiknya, sebuah file citra Aksara Jawa (.bmp) disegmentasi untuk diambil bagian karakter khusus dari Aksara Jawa, yaitu karakter yang terletak di atas aksara utama atau disebut dengan Aksara Nglegena. Setiap karakter khusus akan dihitung rata-rata koefisien DCT-nya, kemudian nilai rata-rata yang didapat akan dikalikan dengan suatu koefisien tertentu untuk dijadikan threshold. Koordinat-koordinat piksel yang mempunyai nilai koefisien DCT di bawah threshold, akan disimpan sebagai koordinat-koordinat tempat penyisipan. Pesan teks yang telah diubah ke biner sesuai dengan standar ASCII, kemudian disisipkan ke dalam beberapa piksel yang koordinatnya telah disimpan. Untuk mengetahui keberhasilan proses penyisipan, dilakukan proses ekstraksi untuk mendapatkan isi pesan. Hasil penelitian tugas akhir ini adalah sebuah sistem yang dapat menyisipkan pesan teks ke dalam karakter khusus citra Aksara Jawa. Untuk analisis kualitas citra stego, digunakan analisis secara subyektif dan obyektif. Analisis secara subyektif dilakukan dengan menggunakan parameter MOS sedangkan untuk analisis secara obyektif dilakukan dengan menggunakan parameter MSE dan PSNR. Sedangkan untuk analisis kualitas pesan rahasia dilakukan dengan menghitung BER dan CER. Kata kunci : Steganografi, Aksara Jawa, DCT, Bitmap, MOS, MSE, PSNR, BER,CE

    Free vibration of symmetric angly-plane layered truncated conical shells under classical theory

    Get PDF
    Truncated conical shell finds wide ranging of engineering applications. They are used in space crafts, robots, shelters, domes, tanks, nozzles and in machinery devices. Thus, the study of their vibrational characteristics has long been of interest for the designers. The use of the lamination for the structures leads to design with the maximum reliability and minimum weight. Moreover, the study of free vibration of laminated conical shells has been treated by a number of researchers. Irie et al. (1982) studied free vibration of conical shells with variable thickness using Rayleigh-Ritz method of solution. Wu and Wu (2000) provided 3D elasticity solutions for the free vibration analysis of laminated conical shells by an asymptotic approach. Wu and Lee (2001) studied the natural frequencies of laminated conical shells with variable stiffness using the differential quadrature method under first-order shear deformation theory (FSDT). Tripathi et al. (2007) studied the free vibration of composite conical shells with random material properties of the finite element method. Civalek (2007) used the Discrete Singular Convolution (DSC) to investigate the frequency response of orthotropic conical and cylindrical shells. Sofiyez et al. (2009) studied the vibrations of orthotropic non-homogeneous conical shells with free boundary conditions. Ghasemi et al. (2012) presented their study of free vibration of composite conical shells which was investigated under various boundary conditions using the solution of beam function and Galerkin method. Viswanathan et al. (2007, 2011) studied free vibration of laminated cross-ply plates, including shear deformation, symmetric angle-ply laminated cylindrical shells of variable thickness with shear deformation theory using the spline collocation method. In the present work, free vibration of symmetric angle-ply laminated truncated conical shells is analyzed and displacement functions are approximated using cubic and quantic spline and collocation procedure is applied to obtain a set of field equations. The field equations along with the equations of boundary conditions yield a system of homogeneous simultaneous algebraic equations on the assumed spline coefficients which resulting to the generalized eigenvalue problem. This eigenvalue problem is solved using eigensolution technique to get as many eigenfrequencies as required. The effect of circumferential mode number, length ratio, cone angle, ply angles and number of layers under two boundary conditions on the frequency parameter is studied for three- and five- layered conical shells consisting of two types of layered materials
    corecore