12 research outputs found

    The Capability of Image Files Cover Message in Steganography

    Get PDF
    This paper is focusing on the capability of image files as cover message to send the text files. The images were classified according to their compression technique, lossless and lossy compression. The measurements are identified in order to test their capability in term of the sizeof file, the color intensity level, the integrity data and the time execution. All the measurements would be tested by using the developed tool called StegaNo. The result of the study seem to suggest BMP image as a cover message than JPEG image

    DCT domain stegasvm-shifted LSB model for highly imperceptible and robust cover-image / Hanizan Shaker Hussain

    Get PDF
    The importance of information security in protecting data and information has increased due to the increased use of computers and the Internet. Similarly, with one of its exciting subfields i.e. information hiding. Information hiding is a technology where the secret-messages are hidden inside other files (e.g image files). One of the areas that are popular now applying this technology is digital image steganography (image steganography). In image steganography, the most popular and widely usedtechniques is the least significant bit (LSB) that hide data into a cover-image in a spatial and discrete cosine transform (DCT) domain as well. Beside the LSB technique, there is other technique that is also influential i.e support vector machine (SVM) normally used to strengthen the embedding algorithm

    DCT domain Stegasvm-shifted LSB model for highly imperceptible and robust cover-image / Hanizan Shaker Hussain

    Get PDF
    The importance of information security in protecting data and information has increased due to the increased use of computers and the Internet. Similarly, with one of its exciting subfields i.e. information hiding. Information hiding is a technology where the secret-messages are hidden inside other files (e.g image files). One of the areas that are popular now applying this technology is digital image steganography (image steganography). In image steganography, the most popular and widely usedtechniques is the least significant bit (LSB) that hide data into a cover-image in a spatial and discrete cosine transform (DCT) domain as well. Beside the LSB technique, there is other technique that is also influential i.e support vector machine (SVM) normally used to strengthen the embedding algorithm. Whatever techniques used in the image steganography field,the main purpose is to keep the existence of the secret-message secret. But many of the techniques previously proposed have failed to attain this main purpose. The primary concern that contribute to this problem is the non-random changes on a cover-image that constantly occurred after the embedding process. Secondly, the non-robustness of embedding algorithm to image processing operation. Therefore in this research, the new model is proposed called StegaSVMShifted LSB model in DCT domain to preserve the imperceptibility and increase the robustness of stego-images. The StegaSVM-Shifted LSB model that has been proposed that utilize HVS and embedding technique through Shifted LSB showed a good performance. This can be seen when PSNR record high value, where it displays a good quality cover-image with 48.94dB while high quality robustness for secretmessage with NC value is about 1.0. Therefore, StegaSVM-Shifted LSB model were acceptable in which it shows a higher quality steganography, thus enhancing the performance of existing works. In extracting process, by exploiting the SVM learning ability, the right secret-bits can be recovered

    Preserve Imperceptibility and Robustness Performance on Steganography Technique based on StegaSVM-Shifted LBS Model

    Get PDF
    In image steganography, the most popular and widely used techniques is the least significant bit (LSB) that hide data into a cover-image in a spatial and discrete cosine transform (DCT) domain as well.Beside the LSB technique, there is other technique that is also influential i.e support vector machine (SVM) normally used to strengthen the embedding algorithm.Whatever techniques used in the image steganography field,the main purpose is to keep the existence of the secret-message secret.This paper designing the new model is proposed called StegaSVM-Shifted LSB model in DCT domain to preserve the imperceptibility and increase the robustness of stego-images.The StegaSVM-Shifted LSB model that has been proposed that utilize HVS and embedding technique through Shifted LSB showed a good performance

    DCT domain stegasvm-shifted LSB model for highly imperceptible and robust cover-image

    Get PDF
    The importance of information security in protecting and hiding information has increased due to the increased use of computers and Internet.Information hiding technology such as Digital Image steganography embeds secret messages inside other files.Least Square Bit (LSB) is the most popular technique used in image steganography that hides data behind a cover-image in a spatial and discrete cosine transform (DCT) domain.Support Vector Machine (SVM) is another technique that is used to strengthen the embedding algorithm.The main aim of image steganography is to keep the secret-message remain secret regardless of the techniques used.But many of the previously proposed techniques failed to attain this aim.The main concerns to this problem are the non-random changes of a cover-image that constantly occurred after the embedding process and the non-robustness of the embedding algorithm to image processing operation.This study therefore proposes a new model that utilises Human Visual System (HVS) and embedding technique through shifted LSB called StegaSVM-Shifted LSB in DCT domain to preserve the imperseptibility and increase the robustness of stego-images.The proposed technique shows better performances compared to other existing techniques

    Risk and Threat via Online Social Network among Academia at Higher Education

    Get PDF
    The evolution of information and communication technologies (ICT) nowadays has changed the life style of human living.The current modern societies have adopted ICT as an important thing that they are really needed in their life, especially as a tool to be used for communications activity. However, unfortunately ICT also exposed its user in circumstances of risk, threats and vulnerability.This paper will discuss the risk and threats to the users who are using social media as a medium to communicate. In this paper, the fraction of user will be divided by two types which are gender and working experience.The data that obtained from the distributed of questionnaires among respondent will be analysed by using SPSS. Data will be analysed by using two-way ANOVA statistic in order to examine the significant level in between gender and working experience as an independent variable in this study with the level of threats in cyber security risk towards lecturers who are working in higher education institutions in Malaysia.This article also will provide an empirical data and will be referred to another researcher in the future for their further research perhaps

    LSB Algorithm based on Support Vector Machine in Digital Image Steganography

    Get PDF
    The importance of information security in protecting data and information has increased due to the increased use of computers and the Internet. It similar with the one of exciting subfields of information security called information hiding. Information hiding is a technology where the secret-messages are hidden inside other files (e.g image files). One of the areas that are popular now applying this technology is digital image steganography (image steganography). In this paper proposed StegaSVM-Shifted LSB model that has been proposed that utilize HVS and embedding technique through Shifted LSB showed a good performance. This can be seen when PSNR record high value, where it displays a good quality cover-image

    Performance Analysis on Text Steganalysis Method Using A Computational Intelligence Approach

    Get PDF
    In this paper, a critical view of the utilization ofcomputational intelligence approach from the text steganalysisperspective is presented. This paper proposes a formalization ofgenetic algorithm method in order to detect hidden message on ananalyzed text. Five metric parameters such as running time, fitnessvalue, average mean probability, variance probability, and standarddeviation probability were used to measure the detection performancebetween statistical methods and genetic algorithm methods.Experiments conducted using both methods showed that geneticalgorithm method performs much better than statistical method,especially in detecting short analyzed texts. Thus, the findings showedthat the genetic algorithm method on analyzed stego text is verypromising. For future work, several significant factors such as datasetenvironment, searching process and types of fitness values throughother intelligent methods of computational intelligence should beinvestigated

    LSB algorithm based on support vector machine in digital image steganography

    No full text
    The importance of information security in protecting data and information has increased due to the increased use of computers and the Internet. It similar with the one of exciting subfields of information security called information hiding. Information hiding is a technology where the secret-messages are hidden inside other files (e.g image files). One of the areas that are popular now applying this technology is digital image steganography (image steganography). In this paper proposed StegaSVM-Shifted LSB model that has been proposed that utilize HVS and embedding technique through Shifted LSB showed a good performance. This can be seen when PSNR record high value, where it displays a good quality cover-image

    State-of-the-art soft computing techniques in image steganography domain

    No full text
    The deaf normally considered to be disabled that do not need any mobile technology due to the inabilities of hearing and talking. However, many deaf are using mobile phone in their daily life for various purposes such as communication and learning. Many studies have attempted to identify the need of deaf people in mobile application and level of usage of the applications. This study aims in studying the recent research conducted on deaf mobile application to understand the level of importance of mobile technology for this disabled community.This paper enable identification of studies conducted are limited and the need of more research done of this disabled people to ensure their privilege of using mobile technology and its application, which leads to the identification of deaf user requirement for mobile application as future study
    corecore