20,742 research outputs found
New Classification Methods for Hiding Information into Two Parts: Multimedia Files and Non Multimedia Files
With the rapid development of various multimedia technologies, more and more
multimedia data are generated and transmitted in the medical, commercial, and
military fields, which may include some sensitive information which should not
be accessed by or can only be partially exposed to the general users.
Therefore, security and privacy has become an important, Another problem with
digital document and video is that undetectable modifications can be made with
very simple and widely available equipment, which put the digital material for
evidential purposes under question .With the large flood of information and the
development of the digital format Information hiding considers one of the
techniques which used to protect the important information. The main goals for
this paper, provides a general overview of the New Classification Methods for
Hiding Information into Two Parts: Multimedia Files and Non Multimedia Files
Frame Selected Approach for Hiding Data within MPEG Video Using Bit Plane Complexity Segmentation
Bit Plane Complexity Segmentation (BPCS) digital picture steganography is a
technique to hide data inside an image file. BPCS achieves high embedding rates
with low distortion based on the theory that noise-like regions in an image's
bit-planes can be replaced with noise-like secret data without significant loss
in image quality. . In this framework we will propose a collaborate approach
for select frame for Hiding Data within MPEG Video Using Bit Plane Complexity
Segmentation. This approach will invent high secure data hidden using select
frame form MPEG Video and furthermore we will assign the well-built of the
approach; during this review the author will answer the question why they used
select frame steganography. In additional to the security issues we will use
the digital video as a cover to the data hidden. The reason behind opt the
video cover in this approach is the huge amount of single frames image per sec
which in turn overcome the problem of the data hiding quantity, as the
experiment result shows the success of the hidden data within select frame,
extract data from the frames sequence. These function without affecting the
quality of the video
Light Ears: Information Leakage via Smart Lights
Modern Internet-enabled smart lights promise energy efficiency and many
additional capabilities over traditional lamps. However, these connected lights
create a new attack surface, which can be maliciously used to violate users'
privacy and security. In this paper, we design and evaluate novel attacks that
take advantage of light emitted by modern smart bulbs in order to infer users'
private data and preferences. The first two attacks are designed to infer
users' audio and video playback by a systematic observation and analysis of the
multimedia-visualization functionality of smart light bulbs. The third attack
utilizes the infrared capabilities of such smart light bulbs to create a
covert-channel, which can be used as a gateway to exfiltrate user's private
data out of their secured home or office network. A comprehensive evaluation of
these attacks in various real-life settings confirms their feasibility and
affirms the need for new privacy protection mechanisms
Content-Based Video Browsing by Text Region Localization and Classification
The amount of digital video data is increasing over the world. It highlights
the need for efficient algorithms that can index, retrieve and browse this data
by content. This can be achieved by identifying semantic description captured
automatically from video structure. Among these descriptions, text within video
is considered as rich features that enable a good way for video indexing and
browsing. Unlike most video text detection and extraction methods that treat
video sequences as collections of still images, we propose in this paper
spatiotemporal. video-text localization and identification approach which
proceeds in two main steps: text region localization and text region
classification. In the first step we detect the significant appearance of the
new objects in a frame by a split and merge processes applied on binarized edge
frame pair differences. Detected objects are, a priori, considered as text.
They are then filtered according to both local contrast variation and texture
criteria in order to get the effective ones. The resulted text regions are
classified based on a visual grammar descriptor containing a set of semantic
text class regions characterized by visual features. A visual table of content
is then generated based on extracted text regions occurring within video
sequence enriched by a semantic identification. The experimentation performed
on a variety of video sequences shows the efficiency of our approach.Comment: 11 pages, 12 figures, International Journal of Video & Image
Processing and Network Security IJVIPNS-IJENS Vol:10 No: 0
On the usefulness of information hiding techniques for wireless sensor networks security
A wireless sensor network (WSN) typically consists of base stations and a
large number of wireless sensors. The sensory data gathered from the whole
network at a certain time snapshot can be visualized as an image. As a result,
information hiding techniques can be applied to this "sensory data image".
Steganography refers to the technology of hiding data into digital media
without drawing any suspicion, while steganalysis is the art of detecting the
presence of steganography. This article provides a brief review of
steganography and steganalysis applications for wireless sensor networks
(WSNs). Then we show that the steganographic techniques are both related to
sensed data authentication in wireless sensor networks, and when considering
the attacker point of view, which has not yet been investigated in the
literature. Our simulation results show that the sink level is unable to detect
an attack carried out by the nsF5 algorithm on sensed data
A Hybrid Approach to Video Source Identification
Multimedia Forensics allows to determine whether videos or images have been
captured with the same device, and thus, eventually, by the same person.
Currently, the most promising technology to achieve this task, exploits the
unique traces left by the camera sensor into the visual content. Anyway, image
and video source identification are still treated separately from one another.
This approach is limited and anachronistic if we consider that most of the
visual media are today acquired using smartphones, that capture both images and
videos. In this paper we overcome this limitation by exploring a new approach
that allows to synergistically exploit images and videos to study the device
from which they both come. Indeed, we prove it is possible to identify the
source of a digital video by exploiting a reference sensor pattern noise
generated from still images taken by the same device of the query video. The
proposed method provides comparable or even better performance, when compared
to the current video identification strategies, where a reference pattern is
estimated from video frames. We also show how this strategy can be effective
even in case of in-camera digitally stabilized videos, where a non-stabilized
reference is not available, by solving some state-of-the-art limitations. We
explore a possible direct application of this result, that is social media
profile linking, i.e. discovering relationships between two or more social
media profiles by comparing the visual contents - images or videos - shared
therein
Novel Architecture for 3D model in virtual communities from detected face
In this research paper we suggest how to extract a face from an image, modify
it, characterize it in terms of high-level properties, and apply it to the
creation of a personalized avatar. In this research work we tested, we
implemented the algorithm on several hundred facial images, including many
taken under uncontrolled acquisition conditions, and found to exhibit
satisfactory performance for immediate practical use.Comment: 7 page
Vast Educational Mobile Content Broadcasting using ARMrayan Multimedia Mobile CMS
The huge information flow currently available to young generation makes it
difficult for educational centers to train them as needed. Most of these
information flows occur in transportation time or while on public areas.
Competing with commercial information streams is far out of educational centers
time and budget. For creating enough mobile applications for vast educational
mobile content broadcasting that can match young spirits as well, we designed
and developed the ARMrayan Multimedia Mobile CMS as the software that helps
communities, educational, cultural or marketing centers in a way that ordinary
operators be able to create a variety of fully functional multimedia mobile
applications such as tutorials, catalogues, books, and guides in minutes
without writing even a line of code. In this paper, we present the role of our
developed software in our proposed vast educational content broadcasting system
using kiosks and Bluetooth advertising, which will lead to a great leap in
M-commerce marketing and public education solutions. Related experiences are
described and diagrams are used to illustrate the solution. Upon release of the
software, it achieved two titles and prizes in different festivals and various
cultural and commercial centers became its customers.Comment: 6 Pages, 3 figures, IEEE publication format, Keywords- mobile
education; m-commerce; mobile CMS; multimedia cms; mobile; content
broadcasting; mobile catalogue; education; J2M
A Visual Grammar Approach for TV Program Identification
Automatic identification of TV programs within TV streams is an important
task for archive exploitation. This paper proposes a new spatial-temporal
approach to identify programs in TV streams in two main steps: First, a
reference catalogue for video grammars of visual jingles is constructed. We
exploit visual grammars characterizing instances of the same program type in
order to identify the various program types in the TV stream. The role of video
grammar is to represent the visual invariants for each visual jingle using a
set of descriptors appropriate for each TV program. Secondly, programs in TV
streams are identified by examining the similarity of the video signal to the
visual grammars in the catalogue. The main idea of identification process
consists in comparing the visual similarity of the video signal signature in TV
stream to the catalogue elements. After presenting the proposed approach, the
paper overviews the encouraging experimental results on several streams
extracted from different channels and composed of several programs.Comment: 8 pages, 6 figures, (IJCNS) International Journal of Computer and
Network Security, Vol. 2, No. 9, September 201
A reversible high embedding capacity data hiding technique for hiding secret data in images
As the multimedia and internet technologies are growing fast, the
transmission of digital media plays an important role in communication. The
various digital media like audio, video and images are being transferred
through internet. There are a lot of threats for the digital data that are
transferred through internet. Also, a number of security techniques have been
employed to protect the data that is transferred through internet. This paper
proposes a new technique for sending secret messages securely, using
steganographic technique. Since the proposed system uses multiple level of
security for data hiding, where the data is hidden in an image file and the
stego file is again concealed in another image. Previously, the secret message
is being encrypted with the encryption algorithm which ensures the achievement
of high security enabled data transfer through internet.Comment: IEEE Publication format, International Journal of Computer Science
and Information Security, IJCSIS, Vol. 7 No. 3, March 2010, USA. ISSN 1947
5500, http://sites.google.com/site/ijcsis
- …