226 research outputs found

    Perfectly secure steganography: hiding information in the quantum noise of a photograph

    Full text link
    We show that the quantum nature of light can be used to hide a secret message within a photograph. Using this physical principle we achieve information-theoretic secure steganography, which had remained elusive until now. The protocol is such that the digital picture in which the secret message is embedded is perfectly undistinguishable from an ordinary photograph. This implies that, on a fundamental level, it is impossible to discriminate a private communication from an exchange of photographs.Comment: 5 pages, 3 figures + appendix : 5 pages, 6 figure

    Transparent authentication methodology in electronic education

    No full text
    In the context of on-line assessment in e-learning, a problem arises when a student taking an exam may wish to cheat by handing over personal credentials to someone else to take their place in an exam, Another problem is that there is no method for signing digital content as it is being produced in a computerized environment. Our proposed solution is to digitally sign the participant’s work by embedding voice samples in the transcript paper at regular intervals. In this investigation, we have demonstrated that a transparent stenographic methodology will provide an innovative and practical solution for achieving continuous authentication in an online educational environment by successful insertion and extraction of audio digital signatures

    Edge-based image steganography

    Get PDF

    A Method of Steganography – P Message With Q Coefficient (SPMQC)

    Get PDF
    In this paper, we are going to propose a method for Steganography- which is based on deceiving χ2 algorithm. Since the cover image coefficients and stego image coefficients histograms have significant differences for purposes of statistical properties, statistical analysis of χ2-test reveals the existence of hidden messages inside stego image. We are introducing an idea for hiding messages in the cover image. It causes that DCT (Discrete Cosine Transforms) coefficient histogram not to have remarkable modification before and after embedding message. As a result, identifying the hidden message inside an image is impossible for an eavesdropper through χ2 -test. In this paper, we are proposing a better method with developing this algorithm. In fact, the capacity and the security of embedding messages increase extremely.DOI:http://dx.doi.org/10.11591/ijece.v3i2.201

    A Survey on Image Steganography & its Techniques in Spatial & Frequency Domain

    Get PDF
    Steganography is an intelligent art of communicating in a way which hides the endurance of the communication. The image steganography technique takes the asset of confined power of visual system of human being. The art of hiding information such that it averts ferreting out of hidden messages is getting very popular nowadays, which is referred as Steganography. The word Steganography has been educed from the two Greek words - Steganos, which mean covered or secret and Graphy mean writing or drawing. There have been many techniques for hiding information or messages in images in such a manner that the modifications made to the image are perceptually undetected. This paper proposes the evaluation of a few techniques of the Image Steganography in spatial domain and frequency domain. The Image Steganography techniques in spatial domain that would be discussed are Least-Significant-Bit (LSB), LSB Replacement, LSB Matching, and Bit Plane Complexity Segmentation Steganography and frequency domain techniques to be conferred in this paper are Discrete Wavelet Transform (DWT), Discrete Cosine Transform (DCT), Discrete Fourier Transform (DFT) and Singular Valued Decomposition (SVD). Steganography technique is intended to be compared with the Watermarking Technique. DOI: 10.17762/ijritcc2321-8169.15027
    corecore