13 research outputs found

    Application of Stochastic Diffusion for Hiding High Fidelity Encrypted Images

    Get PDF
    Cryptography coupled with information hiding has received increased attention in recent years and has become a major research theme because of the importance of protecting encrypted information in any Electronic Data Interchange system in a way that is both discrete and covert. One of the essential limitations in any cryptography system is that the encrypted data provides an indication on its importance which arouses suspicion and makes it vulnerable to attack. Information hiding of Steganography provides a potential solution to this issue by making the data imperceptible, the security of the hidden information being a threat only if its existence is detected through Steganalysis. This paper focuses on a study methods for hiding encrypted information, specifically, methods that encrypt data before embedding in host data where the ‘data’ is in the form of a full colour digital image. Such methods provide a greater level of data security especially when the information is to be submitted over the Internet, for example, since a potential attacker needs to first detect, then extract and then decrypt the embedded data in order to recover the original information. After providing an extensive survey of the current methods available, we present a new method of encrypting and then hiding full colour images in three full colour host images with out loss of fidelity following data extraction and decryption. The application of this technique, which is based on a technique called ‘Stochastic Diffusion’ are wide ranging and include covert image information interchange, digital image authentication, video authentication, copyright protection and digital rights management of image data in general

    Steganography Using Stochastic Diffusion for the Covert Communication of Digital Images

    Get PDF
    This paper is devoted to the study of a method called Stochastic Diffusion for encrypting digital images and embedding the information in another host image or image set. We introduce the theoretical background to the method and the mathematical models upon which it is based. This includes a comprehensive study of the diffusion equation and its properties leading to a convolution model for encrypting data with a stochastic field that is fundamental to the approach considered. Two methods of implementing the approach are then considered. The first method introduces a lossy algorithm for hiding an image in a single host image which is based on the binarization of the encrypted data. The second method considers a similar approach which uses three host images to produce a near perfect reconstruction from the decrypt. In both cases, details of the algorithms developed are provide and examples given. The methods considered have applications for covert cryptography and the authentication and self-authentication of documents and full colour images

    Depression, Anxiety and Stress Level among University Students of Class Reentry Post Covid-19 Pandemic

    Get PDF
    Since the breakdown of the COVID-19, tertiary education in Malaysia is still using online classes. Returning to normal study routines might have some positive effects or opposite and causes anxiety for other students as with class reentry. Therefore, this study is evaluating the depression, anxiety, and stress in reentry classes of university students post covid-19 from all over Malaysia. Observational study was conducted using online questionnaire that was developed by adapting the Patient Health questionnaire (PHQ-9), Generalized Anxiety Disorder (GAD-7), and Perceived stress scale (PSS). The results show higher levels of anxiety and perceived stress among Malaysian university students towards class reentry which causes moderate depression. The findings revealed a significant correlation between depression, anxiety, and perceived stress. Thus, policies should be implemented by educational institutions and instructors to help understand the students’ mental strain and deal with future pandemic to overcome students’ anxiety and emotional distress

    Ethnopharmacology, Biological Evaluation, and Chemical Composition of Ziziphus spina-christi (L.) Desf.: A Review

    Get PDF
    Medicinal plants are the primary raw materials used in the production of medicinal products all over the world. As a result, more study on plants with therapeutic potential is required. The tropical tree Ziziphus spina belongs to the Rhamnaceae family. Biological reports and traditional applications including management of diabetes and treatment of malaria, digestive issues, typhoid, liver complaints, weakness, skin infections, urinary disorders, obesity, diarrhoea, and sleeplessness have all been treated with different parts of Z. spina all over the globe. The plant is identified as a rich source of diverse chemical compounds. This study is a comprehensive yet detailed review of Z. spina based on major findings from around the world regarding ethnopharmacology, biological evaluation, and chemical composition. Scopus, Web of Science, BioMed Central, ScienceDirect, PubMed, Springer Link, and Google Scholar were searched to find published articles. From the 186 research articles reviewed, we revealed the leaf extract to be significant against free radicals, microbes, parasites, inflammation-related cases, obesity, and cancer. Chemically, polyphenols/flavonoids were the most reported compounds with a composition of 66 compounds out of the total 193 compounds reported from different parts of the plant. However, the safety and efficacy of Z. spina have not been wholly assessed in humans, and further well-designed clinical trials are needed to corroborate preclinical findings. The mechanism of action of the leaf extract should be examined. The standard dose and safety of the leaf should be established

    Steganography Using Stochastic Diffusion for the Covert Communication of Digital Images

    Get PDF
    This paper is devoted to the study of a method called Stochastic Diffusion for encrypting digital images and embedding the information in another host image or image set. We introduce the theoretical background to the method and the mathematical models upon which it is based. This includes a comprehensive study of the diffusion equation and its properties leading to a convolution model for encrypting data with a stochastic field that is fundamental to the approach considered. Two methods of implementing the approach are then considered. The first method introduces a lossy algorithm for hiding an image in a single host image which is based on the binarization of the encrypted data. The second method considers a similar approach which uses three host images to produce a near perfect reconstruction from the decrypt. In both cases, details of the algorithms developed are provide and examples given. The methods considered have applications for covert cryptography and the authentication and self-authentication of documents and full colour images

    Image Authentication Using Stochastic Diffusion

    Get PDF
    This paper considers an approach to encrypted information hiding based on Stochastic Diffusion for encrypting digital images coupled with the application of a Least Significant Bit (LSB) method for information embedding. After providing a brief summary of various information hiding methods based on spatial and transform domain techniques, two new methods are introduced. The first of these considers a binary image watermarking algorithm for hiding an image in a single host image which is based on binarization of the encrypted data. The second method extends this approach to solving the problem of 24-bit image hiding in three host images which generates a near perfect reconstruction after decryption. Both methods make use of a ‘hidden code’ technique to randomize the order of the embedded bits and the location (in the image plane) of the LSBs which make the embedded information more robust to attack. Details of the algorithms developed are provided and examples are given, which have application in the field of covert cryptography and the authentication of full colour images for copyright protection and Data Rights Management

    Multi-Channel Audio Information Hiding

    Get PDF
    We consider a method of hiding many audio channels in one host signal. The purpose of this is to provide a ‘mix’ that incorporates information on all the channels used to produce it, thereby allowing all, or, at least some channels to be stored in the mix for later use. After providing an overview of some recently published audio water marking schemes in the time and transform domains, we present a method that is based on using a four least significant bits scheme to embed five MP3 files into a single 16-bit host stereo WAV file without incurring any perceptual audio distortions in the host data. The hostWAV file is taken to be the final mix associated with the original data before applying ‘lose MP3’ compression or alternatively an arbitrary host audio signal into which other multichannel audio data is hidden. Further, the embedded information can be encrypted and/or the embedding locations randomized on a channel by channel basis depending on the protocol desired by the user. The method is illustrated by providing example m-code for interested readers to investigate and reproduce the results obtained to date and as a basis for further development

    Anatomical landscape of oral squamous cell carcinoma: A single cancer center study in UAE

    No full text
    Objectives: This study aimed to present demographic and clinicopathological aspects of OSCC identified in Pathology service in the UAE over a 13-year period and compare these findings to a cohort of 523 cases of Head and neck squamous cell carcinoma using the Cancer Genome Atlas's cBioPortal database (http://cbioportal.org). Material and methods: Histological examination of all hematoxylin and eosin-stained slides and assessment of all demographic and clinical information from laboratory records were performed on all OSCC diagnosed between 2005 and 2018. Results: Males made up 71.4% of the sample of 231 OSCCs that were evaluated. The patients' average age was 55.38 years. The two most prevalent afflicted sites were the anterior two-thirds of the tongue (57.6%) and the cheek (28.1%). The most prevalent site among smokers were the floor of mouth, cheek, and jaw bones. There was a link between tumor size and numerous anatomical subsites that was shown to be highly significant. OSCC in the FOM was associated with a 25% mortality rate. Patients with OSCC of the anterior tongue and cheek had the best prognosis, with only 15.7% and 15.3% of patients dying during follow-up. Conclusion: The present investigation found a correlation between the diverse clinicopathological characteristics of the various anatomical subsites in OSCC. Different anatomical subsites also displayed varying degrees of gene mutation
    corecore