119 research outputs found

    ISB watermarking embedding: a block based model

    Get PDF
    Many watermarking methods have been developed with different methodological complexity levels. Each of these methods tries to reduce exposure in different attack. In this study, the ISB watermarking method was implemented based on average of block of pixels together in order to improve the watermarking method to be more resistant against attacks than a single pixel. The results show that the quality of the images is suitable for the application of the proposed method, based on any size of block. In additional to that the robustness has been improved by increasing the size of the block for all the attacks, including the geometric transform attacks, although they were not improved when the method was applied based on only one pixel

    An overview on audio steganography techniques

    Get PDF
    Steganography is a form of security technique through obscurity; the science and art of hiding the existence of a message between sender and intended recipient. Steganography has been used to hide secret messages in various types of files, including digital images, audio and video. The three most important parameters for audio steganography are imperceptibility, payload (bit rate or capacity), and robustness. Any technique which tries to improve the payload or robustness should preserve imperceptibility. The noise which is introduced due to bit modification would limit payload. This paper presents a categorization of information hiding techniques and overviews those techniques that intend to improve payload and imperceptibility

    A novel digital watermarking technique based on ISB (Intermediate Significant Bit)

    Get PDF
    Least Significant Bit (LSB) technique is the earliest developed technique in watermarking and it is also the most simple, direct and common technique. It essentially involves embedding the watermark by replacing the least significant bit of the image data with a bit of the watermark data. The disadvantage of LSB is that it is not robust against attacks. In this study intermediate significant bit (ISB) has been used in order to improve the robustness of the watermarking system. The aim of this model is to replace the watermarked image pixels by new pixels that can protect the watermark data against attacks and at the same time keeping the new pixels very close to the original pixels in order to protect the quality of watermarked image. The technique is based on testing the value of the watermark pixel according to the range of each bit-plane

    Understanding cybercrime in Malaysia: an overview

    Get PDF
    Rapid developments of internet technology and cyber world have created new opportunities for irresponsible people to take advantage of internet users. Millions of internet users across globe have fallen victim to cybercrime. However, many issues regarding cybercrime are not fully understood yet. It is important to thoroughly understand many aspects of cybercrime for better decision making. This paper provides an overview of cybercrime in Malaysia including current state and statistics of cybercrime, common types of cybercrime, brief description of Malaysian cyber laws and describes the role of Malaysian government in responding to cyber security incidents. Hopefully, this paper will enrich current scenarios of cybercrime in Malaysia. Finally, the directions for future research were discussed

    Data hiding method based on D basic characteristics

    Get PDF
    The main target of this paper is to propose an algorithm to implement data hiding in DNA sequences to increase the complexity by using software point of view. By utilizing some intere sting features of DNA sequences, the implementation of a data hiding is applied. The algorithm which has been proposed here is based on binary coding and the complementary pair rules. Therefore, DNA reference sequence is chosen and also a secret message M is hidden into it. After applying three steps, M ´ ´ ´ is come out. Finally, M ´ ´ ´ is sent to the receiver. When the receiver takes the M ´ ´ ´, the process of identifying and extracting the original message M, which has been hidden in DNA reference sequence, begins. In addition, security issues are demonstrated to inspect the complexity of the algorithm

    Watermarking technique based on ISB (Intermediate Significant Bit)

    Get PDF
    Digital watermarking is a special case of the general information hiding problem. It inserts a perceptually transparent pattern called watermark in an image called host or cover using an embedding algorithm. The purpose of the watermark is to supply the ownership of the image or copyright protection information. The energy of the embedded data should be low enough when projected onto the human perception domain but it should be strong enough for robust machine detection. Least Significant Bit (LSB) technique is the earliest developed technique in watermarking and it is also the most simple, direct and common technique. It essentially involves embedding the watermark by replacing the least significant bit of the image data with a bit of the watermark data. The disadvantage of LSB is that it is not robust against attacks. The aim of this study is to develop a robust watermarking model using spatial domain technique and at the same time maintaining important watermarking requirements of picture quality. The new model has been developed based on intermediate significant bit (ISB) aim to replace the watermarked image pixels by new pixels that can protect the watermark data against attacks and at the same time keeping the new pixels very close to the original pixels in order to protect the quality of watermarked image. The technique is based on testing the value of the watermark pixel according to the range of each bit-plane. The main contribution of this research is replacing the classic least significant bits (LSB) technique by a new technique called intermediate significant bits ISB, which improves the robustness and maintains the quality of watermarked images

    High watermarking capacity based on spatial domain technique

    Get PDF
    Watermarking capacity refers to the amount of information we are able to insert into the image. Low signal to noise ratio is a phenomenon of watermarking channels, which severely limits the capacity. The aim of this study is to develop a digital watermarking model, which can find out the possibility to embed maximum amount of data in an image without degrading the quality of watermarked image. In this approach, the host image will be partitioned into non-overlapping blocks and passing an imaginary plane in the three critical pixels. The characteristics of this plan should not be changed after embedding message; then the same characteristics will be used to evaluate the embedded capacity in the extracting module

    Information system sophistication's for enhancing the performance of women technopreneur business

    Get PDF
    Theoretically, technopreneurs are technological based entrepreneurs who are into the core businesses involving technology-based sector.They make use of such kind of technology to come out with new or innovative products through a process of development and commercialization.The businesses are generally marked with high growth potential and high leverage of knowledge and intellectual property.Potential technopreneur must be equipped with information system (IS) sophistications where it is vital important to sustain their long live of business.Practically, there are sixth types of IS, common identified as Executive Information System (EIS), Management Information System (MIS), Decision Support System (DSS), Knowledge Information System (KWS), Marketing Information System (MKIS), and Transaction Information System (TPS) where final aimed to sustain the performance of technopreneurs business.However, there are questions arises about capability and suitability of IS resources in uses of technopreneurs business, as well as to gear-up the business performance.The objective of this paper is to overview the fundamental concept, capability and constrains of every types of IS sophistications with specific reference to capability and suitability to the technopreneurs business.Un-structured interview approach has been used to explore the insight of IS sophistications. In general, this study found that most IS sophistications have unique capability to support and manage the performances of the technopreneurs business.Specifically, DSS is seen as important IS sophistications to support decision making for execute specific decision although the DSS still lacks on certain part.The paper is suggest a guideline on how do develop and implementing the IS as important platform for the future growth of the technopreneurs business
    corecore