2,648 research outputs found

    Efficient And Robust Video Steganography Algorithms For Secure Data Communication

    Get PDF
    Nowadays, the science of information hiding has gained tremendous significance due to advances in information and communication technology. The performance of any steganography method relies on the imperceptibility, embedding capacity, and robustness against attacks. This research provides solutions for the existing video steganography problems by proposing new and effective methods for digital video steganography. The key objectives of our paper are as follows: 1) a highly secure video steganography algorithm based on error correcting codes (ECC); 2) an increased payload video steganography algorithm in the discrete wavelet domain based on ECC; 3) a novel video steganography algorithm based on Kanade-Lucas-Tomasi (KLT) tracking and ECC; 4) a robust video steganography algorithm in the wavelet domain based on KLT tracking and ECC; and 5) a video steganography algorithm based on multiple object tracking and ECC. The experimental results from our research demonstrate that our proposed algorithms achieve higher embedding capacity as well as better imperceptibility of stego videos. Furthermore, the preprocessing stages increase the security and robustness of the proposed algorithms against attacks when compared to state-of-the-art steganographic methods

    An Efficient Video Steganography Algorithm Based on BCH Codes

    Get PDF
    © ASEE 2015In this paper, in order to improve the security and efficiency of the steganography algorithm, we propose an efficient video steganography algorithm based on the binary BCH codes. First the pixels’ positions of the video frames’ components are randomly permuted by using a private key. Moreover, the bits’ positions of the secret message are also permuted using the same private key. Then, the secret message is encoded by applying BCH codes (n, k, t), and XORed with random numbers before the embedding process in order to protect the message from being read. The selected embedding area in each Y, U, and V frame components is randomly chosen, and will differ from frame to frame. The embedding process is achieved by hiding each of the encoded blocks into the 3-2-2 least significant bit (LSB) of the selected YUV pixels. Experimental results have demonstrated that the proposed algorithm have a high embedding efficiency, high embedding payload, and resistant against hackers

    A Highly Secure Video Steganography using Hamming Code (7, 4)

    Get PDF
    Due to the high speed of internet and advances in technology, people are becoming more worried about information being hacked by attackers. Recently, many algorithms of steganography and data hiding have been proposed. Steganography is a process of embedding the secret information inside the host medium (text, audio, image and video). Concurrently, many of the powerful steganographic analysis software programs have been provided to unauthorized users to retrieve the valuable secret information that was embedded in the carrier files. Some steganography algorithms can be easily detected by steganalytical detectors because of the lack of security and embedding efficiency. In this paper, we propose a secure video steganography algorithm based on the principle of linear block code. Nine uncompressed video sequences are used as cover data and a binary image logo as a secret message. The pixels’ positions of both cover videos and a secret message are randomly reordered by using a private key to improve the system’s security. Then the secret message is encoded by applying Hamming code (7, 4) before the embedding process to make the message even more secure. The result of the encoded message will be added to random generated values by using XOR function. After these steps that make the message secure enough, it will be ready to be embedded into the cover video frames. In addition, the embedding area in each frame is randomly selected and it will be different from other frames to improve the steganography scheme’s robustness. Furthermore, the algorithm has high embedding efficiency as demonstrated by the experimental results that we have obtained. Regarding the system’s quality, the Pick Signal to Noise Ratio (PSNR) of stego videos are above 51 dB, which is close to the original video quality. The embedding payload is also acceptable, where in each video frame we can embed 16 Kbits and it can go up to 90 Kbits without noticeable degrading of the stego video’s quality

    Voltage-Controlled Optics of a Quantum Dot

    Full text link
    We show how the optical properties of a single semiconductor quantum dot can be controlled with a small dc voltage applied to a gate electrode. We find that the transmission spectrum of the neutral exciton exhibits two narrow lines with 2\sim 2 μ\mueV linewidth. The splitting into two linearly polarized components arises through an exchange interaction within the exciton. The exchange interaction can be turned off by choosing a gate voltage where the dot is occupied with an additional electron. Saturation spectroscopy demonstrates that the neutral exciton behaves as a two-level system. Our experiments show that the remaining problem for manipulating excitonic quantum states in this system is spectral fluctuation on a μ\mueV energy scale.Comment: 4 pages, 4 figures; content as publishe

    On the existence of optimum cyclic burst-correcting codes

    Get PDF
    It is shown that for each integer b >= 1 infinitely many optimum cyclic b-burst-correcting codes exist, i.e., codes whose length n, redundancy r, and burst-correcting capability b, satisfy n = 2^{r-b+1} - 1. Some optimum codes for b = 3, 4, and 5 are also studied in detail

    A Robust and Secure Video Steganography Method in DWT-DCT Domains Based on Multiple Object Tracking and ECC

    Get PDF
    Over the past few decades, the art of secretly embedding and communicating digital data has gained enormous attention because of the technological development in both digital contents and communication. The imperceptibility, hiding capacity, and robustness against attacks are three main requirements that any video steganography method should take into consideration. In this paper, a robust and secure video steganographic algorithm in discrete wavelet transform (DWT) and discrete cosine transform (DCT) domains based on the multiple object tracking (MOT) algorithm and error correcting codes is proposed. The secret message is preprocessed by applying both Hamming and Bose, Chaudhuri, and Hocquenghem codes for encoding the secret data. First, motion-based MOT algorithm is implemented on host videos to distinguish the regions of interest in the moving objects. Then, the data hiding process is performed by concealing the secret message into the DWT and DCT coefficients of all motion regions in the video depending on foreground masks. Our experimental results illustrate that the suggested algorithm not only improves the embedding capacity and imperceptibility but also enhances its security and robustness by encoding the secret message and withstanding against various attacks

    Numerical simulation of multi-tubes tank heat exchanger: toward an optimized configuration

    Get PDF
    Heat recovery is the reutilization of thermal energy lost by any industrial and resident ial application. Heat exchangers play a very effective role in recovering process. This paper deals with an optimization analysis of a suggested heat recovery heat exchanger. The suggested heat recovery heat exchanger is a multi-concentric tubes tank. This heat exchanger is designed to utilize thermal energy carried out by exhaust gases of a chimney to heat water for residential usage. The analysis is carried out numerically using a computational fluid dynamics “Comsol”software. Three configurations are considered, in which one tube, three tubes and six tubes systems are studied. The results show that in order to increase water temperature from 20°C to 70°C it requires 14 hours, 8 hours and 4 hours when using one tube, three tubes and six tubes system respectively. This makes six-tubed heat exchanger the best choice to heat the water quickly. However, one-tubed heat exchanger experiences the lowest corrosion phenomenon compared to other systems that makes one-tubed system to provide the longest lifetime

    Optical detection of single electron spin resonance in a quantum dot

    Full text link
    We demonstrate optically detected spin resonance of a single electron confined to a self-assembled quantum dot. The dot is rendered dark by resonant optical pumping of the spin with a coherent laser. Contrast is restored by applying a radio frequency (rf) magnetic field at the spin resonance. The scheme is sensitive even to rf fields of just a few micro-T. In one case, the spin resonance behaves exactly as a driven 3-level quantum system (a lambda-system) with weak damping. In another, the dot exhibits remarkably strong (67% signal recovery) and narrow (0.34 MHz) spin resonances with fluctuating resonant positions, evidence of unusual dynamic processes of non-Markovian character.Comment: 4 pages, 5 figure
    corecore