14 research outputs found

    A Review on Steganography Techniques

    Get PDF
    Steganography is the science of hiding a secret message in cover media, without any perceptual distortion of the cover media. Using steganography, information can be hidden in the carrier items such as images, videos, sounds files, text files, while performing data transmission. In image steganography field, it is a major concern of the researchers how to improve the capacity of hidden data into host image without causing any statistically significant modification. Therefore, this paper presents most of the recent works that have been conducted on image steganography field and analyzes them to clarify the strength and weakness points in each work separately in order to be taken in consideration for future works in such field.ย ย ย 

    Reversible data hiding scheme based on 3-Least significant bits and mix column transform

    Get PDF
    Steganography is the science of hiding a message signal in a host signal, without any perceptual distortion of the host signal. Using steganography, information can be hidden in the carrier items such as images, videos, sounds files, text files, while performing data transmission. In image steganography field, it is a major concern of the researchers how to improve the capacity of hidden data into host image without causing any statistically significant modification. In this work, we propose a reversible steganography scheme which can hide large amount of information without affecting the imperceptibility aspect of the stego-image and at the same time, it increases the security level of the system through using different method for embedding based on distinct type of transform, called Mix Column Transform. Our experimental results prove the ability of our proposed scheme in balancing among the three critical properties: capacity, security, and imperceptibility

    IDPS: an integrated intrusion handling model for cloud computing environment

    No full text
    Today, many organizations are moving their computing services towards the Cloud. This makes their computer processing available much more conveniently to users. However, it also brings new security threats and challenges about safety and reliability. In fact, Cloud Computing is an attractive and cost-saving service for buyers as it provides accessibility and reliability options for users and scalable sales for providers. In spite of being attractive, Cloud feature poses various new security threats and challenges when it comes to deploying Intrusion Detection System (IDS) in Cloud environments. Most Intrusion Detection Systems (IDSs) are designed to handle specific types of attacks. It is evident that no single technique can guarantee protection against future attacks. Hence, there is a need for an integrated scheme which can provide robust protection against a complete spectrum of threats. On the other hand, there is great need for technology that enables the network and its hosts to defend themselves with some level of intelligence in order to accurately identify and block malicious traffic and activities. In this case, it is called Intrusion prevention system (IPS). Therefore, in this paper, we emphasize on recent implementations of IDS on Cloud Computing environments in terms of security and privacy. We propose an effective and efficient model termed as the Integrated Intrusion Detection and Prevention System (IDPS) which combines both IDS and IPS in a single mechanism. Our mechanism also integrates two techniques namely, Anomaly Detection (AD) and Signature Detection (SD) that can work in cooperation to detect various numbers of attacks and stop them through the capability of IPS

    Data Hiding within Color Images Based on MCT with X-OR Operations

    No full text
    In this paper, we present an efficient scheme of color image steganography based on Mix Column Transform (MCT) on specified blocks selected according to secret key and hide the secret message within those using logical X-OR operation. Our experiments show that the security can be increased by following this method since it uses irreducible polynomial mathematics within its operational method. The results have proven increased capacity with maintaining reasonable level of imperceptibility of the hidden data inside color images. We also present the comparisons of our approach with previous related works and show the efficiency of our method

    Mix column transform based on irreducible polynomial mathematics for color image steganography: a novel approach

    No full text
    In this paper, we present a novel method for data hiding within transform domain of the color images. Our method is based on dividing an image into blocks, then applying the proposed transform on specified blocks and hiding the secret message within those. We show that the security can be increased by following this method since it depends on a different type of transform which is based on irreducible polynomial mathematics. The results and comparisons have proven high capacity alongside maintaining reasonable level of imperceptibility

    Data hiding within color images based on MCT with x-or operations

    No full text
    In this paper, we present an efficient scheme of color image steganography based on Mix Column Transform (MCT) on specified blocks selected according to secret key and hide the secret message within those using logical X-OR operation. Our experiments show that the security can be increased by following this method since it uses irreducible polynomial mathematics within its operational method. The results have proven increased capacity with maintaining reasonable level of imperceptibility of the hidden data inside color images. We also present the comparisons of our approach with previous related works and show the efficiency of our method

    A new data hiding technique based on irreducible polynomials

    No full text
    The mass diffusion of digital communication needs the special means of security. Cryptography concentrates on rendering the messages unreadable to any unauthorized person who might intercept those. In contrast, steganography is a method of concealing the existence of message to allow a secure communication in a complete undetectable manner. Digital image is the most common type of carrier used for steganography. This paper presents a new method for data hiding within transform domain of the color images which is based on dividing the image into blocks, then applying the proposed transform on specified blocks and hiding the secret message within them. In this way, the security can be increased since it depends on a different type of transform which is based on irreducible polynomial mathematics. According to our investigation in this area, our work for the first time uses this mechanism for data hiding. The results have proven increasing the capacity with maintaining reasonable level of imperceptibility

    Tackling Intruders in Wireless Mesh Networks

    No full text
    This chapter presents a different approach of tackling intruders in Wireless Mesh Networks (WMN). Traditional approach of intruder detection and prevention suggests purging out intruders immediately after their detection. In our work, we take a different approach to tackle intruder rather than purging it out of the network unless it is marked as a direct threat to the networkโ€™s operation. Our intrusion tackling model is termed โ€˜Pay-and-Stayโ€™ (PaS) model which allows a rogue node to stay in the network only with the expense of doing some traffic forwarding tasks in the network. Failing to carry out the required tasks of packet forwarding disqualifies the node permanently and eventually that rogue entity is purged out. Alongside presenting our approach, we briefly talk about other available literature, essential knowledge on wireless network intrusion detection and prevention, and status of intrusion related works for WMN
    corecore