2,648 research outputs found
Efficient And Robust Video Steganography Algorithms For Secure Data Communication
Nowadays, the science of information hiding has gained tremendous significance due to advances in information and communication technology. The performance of any steganography method relies on the imperceptibility, embedding capacity, and robustness against attacks. This research provides solutions for the existing video steganography problems by proposing new and effective methods for digital video steganography. The key objectives of our paper are as follows: 1) a highly secure video steganography algorithm based on error correcting codes (ECC); 2) an increased payload video steganography algorithm in the discrete wavelet domain based on ECC; 3) a novel video steganography algorithm based on Kanade-Lucas-Tomasi (KLT) tracking and ECC; 4) a robust video steganography algorithm in the wavelet domain based on KLT tracking and ECC; and 5) a video steganography algorithm based on multiple object tracking and ECC. The experimental results from our research demonstrate that our proposed algorithms achieve higher embedding capacity as well as better imperceptibility of stego videos. Furthermore, the preprocessing stages increase the security and robustness of the proposed algorithms against attacks when compared to state-of-the-art steganographic methods
An Efficient Video Steganography Algorithm Based on BCH Codes
© ASEE 2015In this paper, in order to improve the security and efficiency of the steganography algorithm, we propose an efficient video steganography algorithm based on the binary BCH codes. First the pixels’ positions of the video frames’ components are randomly permuted by using a private key. Moreover, the bits’ positions of the secret message are also permuted using the same private key. Then, the secret message is encoded by applying BCH codes (n, k, t), and XORed with random numbers before the embedding process in order to protect the message from being read. The selected embedding area in each Y, U, and V frame components is randomly chosen, and will differ from frame to frame. The embedding process is achieved by hiding each of the encoded blocks into the 3-2-2 least significant bit (LSB) of the selected YUV pixels. Experimental results have demonstrated that the proposed algorithm have a high embedding efficiency, high embedding payload, and resistant against hackers
A Highly Secure Video Steganography using Hamming Code (7, 4)
Due to the high speed of internet and advances in technology, people are becoming more worried about information being hacked by attackers. Recently, many algorithms of steganography and data hiding have been proposed. Steganography is a process of embedding the secret information inside the host medium (text, audio, image and video). Concurrently, many of the powerful steganographic analysis software programs have been provided to unauthorized users to retrieve the valuable secret information that was embedded in the carrier files. Some steganography algorithms can be easily detected by steganalytical detectors because of the lack of security and embedding efficiency.
In this paper, we propose a secure video steganography algorithm based on the principle of linear block code. Nine uncompressed video sequences are used as cover data and a binary image logo as a secret message. The pixels’ positions of both cover videos and a secret message are randomly reordered by using a private key to improve the system’s security. Then the secret message is encoded by applying Hamming code (7, 4) before the embedding process to make the message even more secure. The result of the encoded message will be added to random generated values by using XOR function. After these steps that make the message secure enough, it will be ready to be embedded into the cover video frames. In addition, the embedding area in each frame is randomly selected and it will be different from other frames to improve the steganography scheme’s robustness. Furthermore, the algorithm has high embedding efficiency as demonstrated by the experimental results that we have obtained. Regarding the system’s quality, the Pick Signal to Noise Ratio (PSNR) of stego videos are above 51 dB, which is close to the original video quality. The embedding payload is also acceptable, where in each video frame we can embed 16 Kbits and it can go up to 90 Kbits without noticeable degrading of the stego video’s quality
Voltage-Controlled Optics of a Quantum Dot
We show how the optical properties of a single semiconductor quantum dot can
be controlled with a small dc voltage applied to a gate electrode. We find that
the transmission spectrum of the neutral exciton exhibits two narrow lines with
eV linewidth. The splitting into two linearly polarized
components arises through an exchange interaction within the exciton. The
exchange interaction can be turned off by choosing a gate voltage where the dot
is occupied with an additional electron. Saturation spectroscopy demonstrates
that the neutral exciton behaves as a two-level system. Our experiments show
that the remaining problem for manipulating excitonic quantum states in this
system is spectral fluctuation on a eV energy scale.Comment: 4 pages, 4 figures; content as publishe
On the existence of optimum cyclic burst-correcting codes
It is shown that for each integer b >= 1 infinitely many optimum cyclic b-burst-correcting codes exist, i.e., codes whose length n, redundancy r, and burst-correcting capability b, satisfy n = 2^{r-b+1} - 1. Some optimum codes for b = 3, 4, and 5 are also studied in detail
A Robust and Secure Video Steganography Method in DWT-DCT Domains Based on Multiple Object Tracking and ECC
Over the past few decades, the art of secretly embedding and communicating digital data has gained enormous attention because of the technological development in both digital contents and communication. The imperceptibility, hiding capacity, and robustness against attacks are three main requirements that any video steganography method should take into consideration. In this paper, a robust and secure video steganographic algorithm in discrete wavelet transform (DWT) and discrete cosine transform (DCT) domains based on the multiple object tracking (MOT) algorithm and error correcting codes is proposed. The secret message is preprocessed by applying both Hamming and Bose, Chaudhuri, and Hocquenghem codes for encoding the secret data. First, motion-based MOT algorithm is implemented on host videos to distinguish the regions of interest in the moving objects. Then, the data hiding process is performed by concealing the secret message into the DWT and DCT coefficients of all motion regions in the video depending on foreground masks. Our experimental results illustrate that the suggested algorithm not only improves the embedding capacity and imperceptibility but also enhances its security and robustness by encoding the secret message and withstanding against various attacks
Numerical simulation of multi-tubes tank heat exchanger: toward an optimized configuration
Heat recovery is the reutilization of thermal energy lost by any industrial and resident
ial application. Heat exchangers play a very effective role in recovering process. This paper deals with an optimization analysis of a suggested heat recovery heat exchanger. The suggested heat recovery heat exchanger is a multi-concentric tubes tank. This heat exchanger is designed to utilize thermal energy carried out by exhaust gases of a chimney to heat water for residential usage. The analysis is carried out numerically using a computational fluid dynamics “Comsol”software. Three configurations are considered, in which one tube, three tubes and six tubes systems are studied. The results show that in order to increase water temperature from 20°C to 70°C it requires 14 hours, 8 hours and 4 hours when using one tube, three tubes and six tubes system respectively. This makes six-tubed heat exchanger the best choice to heat the water quickly. However, one-tubed heat exchanger experiences the lowest corrosion phenomenon compared to other systems that makes one-tubed system to provide the longest lifetime
Recommended from our members
In vitro aerodynamic characterization of the dose emitted during nebulization of tobramycin high strength solution by novel and jet nebulizer delivery systems
YesBackground: Chronic infections with Pseudomonas aeruginosa are a leading cause of morbidity in patients
with cystic fibrosis (CF). The aim of tobramycin inhalation therapy in CF patients with chronic pulmonary
infection is to deliver high amounts of drug directly to the site of infection. TOBI® is a tobramycin
nebulizer solution (300 mg/5 ml) approved by FDA for maintenance therapy for patient with CF. The 20%
tobramycin sulfate solution was reported as the optimal and maximal concentration.
Methods: Nebulization of high strength tobramycin solution (20% tobramycin sulfate) (HSTS) has been
assessed in this study by using different selected high performance nebulizer delivery systems: two
different designs of jet nebulizers, and three new nebulizers based on vibrating mesh technology. The
aerosol particle size distribution and output characteristics were measured for in vitro performance
assessment of the nebulizer systems. The methodology was adapted from the current European standard,
EN 13544-1:2001E.
Results: The particle size distribution characteristic measurements showed that all tested nebulizers may
be suitable for inhalation of HSTS. The mean (SD) of highest percentage of fine particles (<5 mm) was
77.64 (2.3) % for Sidestream®, at flow rate 16 L/min. The highest respirable inhaled mass was for Pari LC
Plus® combined with PariBoyN® compressor, with mean (SD) 90.85 (8.6) mg. The mean (SD) of highest
drug wastage percentage was 63.9 (3.9) % for Sidestream® jet nebulizer combined with compressed air
cylinder at flow rate 16 L/min, while the lowest was 2.3 (0.26) % for NE-U22 Omron® (high frequency).
Conclusions: The HSTS can be nebulized by all tested nebulisers but the high frequency NE-U22 Omron®
and Aeroneb Go® are more efficient. When the HSTS compared to TOBI®, the respirable inhaled dose was
increased to more than 73%
Recommended from our members
In vitro Performance Assessment of Recent Nebuliser Delivery Systems for Nebulisation of Approved Aerosolised Tobramycin (TOBI)®
YesTOBI® is a recently marketed preservative and sulphate free tobramycin formulation approved by FDA for
maintenance therapy for patient with cystic fibrosis. The performance of selected recent nebuliser delivery systems has
been assessed using the developed method to determine the optimum combinations to deliver approved tobramycin
inhaled solution (TOBI)®. A simple, sensitive and specific high performance liquid chromatographic method has been
developed and used to quantitative determination of the aminoglycoside tobramycin following pre-column derivatisation
with phenylisocyanate (PIC). The reaction time was 10 min at 80º C and the resulting derivative was stable for five days
at room temperature. The quantitative performance of the assay was further improved by using another aminoglycoside
(neomycin) as internal standard. The stable resulting PIC-tobramycin derivative was separated using a HPLC 5μm
Columbus C18 column (150x4.60 mm i.d, Phenomenex). The mobile phase was consisted of acetonitrile-glacial acetic
acid-water (450:5:545, v/v/v) and ultraviolet detection at (240 nm). The proposed method showed good validation data.
The standard curve was linear (n=5) at seven different concentrations, ranging from 20 to 140μg/ml and the correlation
coefficient (R2) of the regression line was 0.9995. The limit of detection (LOD) and limit of quantitation (LOQ) were
0.86μg/ml and 2.62μg/ml, respectively. The relative standard deviation (RSD %) was less than 0.6% for intra-day assay
(n=5) and 2.5% for inter-day assay (n=5). A number of nebuliser performance comparison studies have been
demonstrated for aerosolise TOBI® to choice the optimum combination produces high repirable inhaled mass of
tobramycin. The objective of this study was to evaluate the performance of recent nebuliser delivery systems to nebulise
approved tobramycin inhaled solution (TOBI)®
Optical detection of single electron spin resonance in a quantum dot
We demonstrate optically detected spin resonance of a single electron
confined to a self-assembled quantum dot. The dot is rendered dark by resonant
optical pumping of the spin with a coherent laser. Contrast is restored by
applying a radio frequency (rf) magnetic field at the spin resonance. The
scheme is sensitive even to rf fields of just a few micro-T. In one case, the
spin resonance behaves exactly as a driven 3-level quantum system (a
lambda-system) with weak damping. In another, the dot exhibits remarkably
strong (67% signal recovery) and narrow (0.34 MHz) spin resonances with
fluctuating resonant positions, evidence of unusual dynamic processes of
non-Markovian character.Comment: 4 pages, 5 figure
- …