Nowa wersja platformy, zawierająca wyłącznie zasoby pełnotekstowe, jest już dostępna.
Przejdź na https://bibliotekanauki.pl
Ograniczanie wyników
Czasopisma help
Lata help
Autorzy help
Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników

Znaleziono wyników: 79

Liczba wyników na stronie
first rewind previous Strona / 4 next fast forward last
Wyniki wyszukiwania
Wyszukiwano:
w słowach kluczowych:  steganography
help Sortuj według:

help Ogranicz wyniki do:
first rewind previous Strona / 4 next fast forward last
1
Content available Hidden message techniques in e-commerce
100%
EN
The rapid growth in e-commerce applications via the Internet in recent decades is the reason why both small office and corporation users have a need to protect their data transactions through the Internet. These data transactions include sensitive document transfer, digital signature authentication and digital data storage. The use of digital steganography for information security in various e-commerce applications through the Internet are discussed in detail in this article. These applications include digital signature authentication and validation of electronic documents, digital data storage as well as secure communication of multimedia data through the open channels.
2
Content available Przezroczystość danych ukrytych w sygnale audio
100%
PL
W artykule zaprezentowane zostały dwie metody ukrywania danych w sygnale dźwiękowym. W metodach tych do ukrywania wykorzystywana jest modyfikacja miar statystycznych w dziedzinie wybranej transformaty. Artykuł zawiera również badania dotyczące stopnia przezroczystości oferowanego przez opisane metody. Udowodnione zostało, że możliwe jest wprowadzanie dodatkowych danych do sygnału za pomocą wymienionych metod bez wprowadzania zauważalnych zmian.
EN
Steganographic techniques are used to hide additional data inside signals. They are widely used. With these techniques it is possible to watermark signals, realize hidden communication or attach additional control data to signals. It is very important to obtain significant level of hidden data transparency. This paper presents comparison of two steganographical methods. Both of them use modifications of statistical measures to hide additional data inside signals. To avoid obtaining similar results while hiding the same data with the same method parameters, the Monte Carlo method was applied. It enables obtaining random solutions. The signals containing hidden data obtained with the presented methods were compared to examine the introduced interference level. The various objective measures were applied. The results show that the described methods offer a low level of the introduced interference. One of the methods uses the wavelet transform as a base transformation, whereas the second one - the Fourier transform. From the investigations performed one can draw a conclusion that application of the wavelet transform allows obtaining a greater level of transparency and bigger information capacity.
EN
We propose a novel least significant bit steganography algorithm based on a Hitzl-Zele chaotic function. On the first step a pseudorandom generator is constructed for chaotic pixel selection for hiding the secret message. Exact study has been provided on the novel scheme using visual inspection, peak signal-to-noise ratio, and histogram analysis. The experimental data show excellent performance of the novel stego technique.
4
Content available remote Quantization Step Parity-based Steganography for MP3 Audio
100%
EN
Petitcolas has proposed a steganographic technique called MP3Stego which can hide secret messages in a MP3 audio. This technique is well-known because of its high capacity. However, in rare cases, the normal audio encoding process will be terminated due to the endless loop problem caused by embedding operation. In addition, the statistical undetectability of MP3Stego can be further improved. Inspired by MP3Stego, a new steganographic method for MP3 audio is proposed in this paper. The parity bit of quantization step rather than the parity bit of block size in MP3Stego is employed to embed secret messages. Compared with MP3Stego, the proposed method can avoid the endless loop problem and achieve better imperceptibility and higher security.
5
Content available Watermarking software in practical applications
100%
EN
In the recent years, several digital watermarking applications have been developed for copyright protection of digital images. In this article we have tested how they perform in practical applications. We have identified the most common operations performed by professional photographers and web developers, and tested the robustness of watermarks embedded using the applications for copyright watermarking. Our aim was to prove that commercially available software does not meet the requirements of photography and web industry. We have also identified areas in which the software should be improved in order to meet current and future requirements of the industry.
6
Content available remote Tree Structure Based Data Hiding for Progressive Transmission Images
100%
EN
Progressive image transmission (PIT) is supported by several encoders such as SPIHT, JPEG2000 and so on. However, few of data hiding scheme for progressive transmission images is designed. In this paper, tree-structure-based data hiding for set partitioning in hierarchical trees (SPIHT) images is proposed. The bit stream of SPIHT multi-stage encoded was structured of tree. The secret image can be progressively embedded into SPIHT bit trees. Experimental results showed the progressive image data hiding is achieved. The secret image is progressively embedded/extracted in SPIHT encoded images. Furthermore, a higher hiding capacity was provided in an earlier encoding which helped the secret image to be identified earlier. Also, an adaptive hiding capacity could be developed by using different tree structures. In comparison with Tsai et al.'s scheme, the proposed scheme had a higher hiding capacity and a better secret image quality.
7
Content available Steganography usage to control multimedia stream
100%
EN
In the paper, a proposal of new application for steganography is presented. It is possible to use steganographic techniques to control multimedia stream playback. Special control markers can be included in the sound signal and the player can detect markers and modify the playback parameters according to the hidden instructions. This solution allows for remembering user preferences within the audio track as well as allowing for preparation of various versions of the same content at the production level.
8
Content available remote Reversible Data Hiding Based on Three-Circular-Pixel Difference Expansion
100%
EN
This paper proposes a reversible data hiding scheme based on three-circular-pixel (TCP) difference expansion. To embed a message in an image, the image is divided into three-pixel blocks, each of which is, then, transformed into a TCP block with two differences. When the pixel value of the largest pixel in the TCP block is increased, two differences are increased—one is between the largest and the smallest, and the other is between the largest and the middle. Expanding the two differences in the block by increasing the largest pixel value may make the image less modified. In addition, the number of pixel pairs is increased to two thirds of the number of pixels in the image. Compared to Tian's study, both the visual quality and the embedding capacity of the image are significantly improved.
9
Content available remote An Information-Hiding Scheme Based on Quantization-Based Embedding Technique
100%
EN
Information hiding is a technique that embeds secret data in digital media for using in a variety of applications, including ownership protection, authentication, access control, annotation and so on. In this paper, we propose an information hiding scheme based on quantization-based embedding technique to conceal information in gray-scale image. The proposed scheme was tested with a variety of gray images. According to the experimental results, hidden information can be extracted correctly and quickly from the stego image. In addition, the stego image has only a little distortion compared with the cover image. The proposed scheme can not only hide a large amount of information in the cover image, but can also repair the stego image such that the repaired image is almost the same as the cover image.
10
100%
EN
This paper discusses a new method of hiding ASCII characters into still cover image. It is based on finding match between the bit of the randomly selected image pixel and the data bits. Higher nibbles are used for data hiding at a position indicated in the lower nibble using a 2-bit code word. Simulation results on IEEE standard Lena image hiding 800 ASCII text characters are given. It is shown that the proposed technique achieves up to 44.7 dB PSNR as against minimum required value of 35 dB for acceptable perceptual quality along with the bounds of the change in the original pixel value in the range ۭ. Therefore the proposed method retains enhanced perceptual quality of the original cover image in spite of hiding large number of text characters and offers high robustness as compared to the LSB insertion technique [1, 2]. In addition it is less prone to attacks by eaves droppers and therefore it can be effectively used for secure multimedia transmissions.
11
Content available remote A Large Payload Data Embedding Technique for Color Images
100%
EN
This paper proposes a large payload data embedding method for color images. Under the fast advancement of digital equipments, color images have become a common medium in many applications. A color image can be represented in different color systems, for instance, RGB and YUV color systems. The proposed method modifies the blue value of the color pixel in order to imply the secret data because the blue value is an insensitive color to human eyes. Furthermore, the number of secret bits that can be embedded into a cover pixel is dynamic so the proposed method tries to embed the secret data as many as possible. The proposed method can be applied to both RGB and YUV color systems. However, for anti-stegoanalysis reason, the RGB color system is suitable for the proposed high capacity data embedding method with lower image distortion. The experimental results show that the proposed method is superior to other methods we compared in terms of embedding capacity and visual quality.
12
Content available remote Reversible Steganography for BTC-compressed Images
100%
EN
Reversible steganography becomes a popular hiding problem in recent years. A reversible steganographicmethod can reconstruct an original image without loss from the stego-image after extracting the embedded data. Unlike traditional reversible methods in which data is hidden in uncompressed images, we propose a reversible scheme for BTC (block truncation coding)- compressed images. The secret data embedded in the compressed image are more difficult to detect than in the uncompressed image. To achieve reversibility, the properties of side matching and BTCcompressed code are applied. The experimental results show that the proposed method is feasible for BTC-compressed images and can embed one more bit in each BTC-encoded block.
EN
The paper focuses on three significant aspects which can improve safety of data and also increasing privacy of users using tablets and smartphones. The chosen platforms are Android and Windows Phone. The aim of the work is to develop library independent from operating system API that enables encrypting and hiding the data stored in mobile device. Also applications that demonstrate functions of the library was developed. The library will be used in securing data from NFC modules used as RFID readers.
14
Content available remote A Novel Steganographic Method with Four-Pixel Differencing and Modulus Function
100%
EN
To improve the stego-image quality and provide a larger embedding capacity, a novel steganographic method based on four-pixel differencing and modulus function is presented. We process a block of four neighboring pixels, and form three two-pixel groups to record the information of secret data. In each group, the difference value between two pixels is exploited to estimate how many secret bits will be embedded. Two pixels will be adjusted so that the sum of the remainders of them is equal to secret data. In order to extract the secret data exactly, four pixel values in a block are adjusted synchronously by using modulus function. An optimization problem is formulated to minimize the embedding distortion. A theoretical proof is given to ensure the solvability of the problem. The experimental results show the proposed method not only has a larger embedding capacity but also provides better stego-image quality.
EN
In this article is elaborated the 2D-steganography method in the spatial-frequency area on the basis of spectral components updating. We have fulfilled probing of quality of a method by means of two algorithms: algorithm of embedding of the stego-message in the least significant bit (LSB) of the stego-container and the algorithm of two least significant bits (2LSB) analysis of the stego-container and modification of the LSB of its countings.
16
Content available remote An Effective Message Embedding Scheme for 3D Models
88%
EN
We present an effective message embedding scheme for 3D models. We propose the unit length as the quantizer to generate an embedding order list and an embedding index list. Our scheme considers every two elements in the embedding order list as the order pair, and we embed 3 bits of 0 or 1 secret message into the index pair associated with the order pair. The message embedding is effective requiring, at most, adding 1 to, or subtracting 1 from, the index pair. This reflects a slight perturbation of a points coordinates where the magnitude of the perturbation is no greater than one unit length. Our algorithm achieves a high embedding capacity, being 4.5 times the number of points in the point cloud models. This amount of capacity allows us to convey a 502x502 resolution of the black-and-white image into a point cloud model consisting of 56,194 points for covert communication. The capacity magnitude is 50%-75%higher than that of the current state-ofthe-art algorithms, yet the model distortion due to the message embedding is smaller than that of our counterparts. Our algorithm is robust against translation, rotation, and uniformly scaling operations. It is fast, simple to implement, and the message can be extracted without referring to the original point cloud model. We believe our scheme is appropriate for most point cloud models.
EN
Steganography is a method of sending confidential information in a way that the existence of the channel in this communication remains secret. A collaborative approach between steganography and digital signature provides a high secure hidden data. Unfortunately, there are wide varieties of attacks that affect the quality of image steganography. Two issues that required to be addressed are large size of the ciphered data in digital signature and high bandwidth. The aim of the research is to propose a new method for producing a dynamic hashed message algorithm in digital signature and then embedded into image for enhancing robustness of image steganography with reduced bandwidth. A digital signature with smaller hash size than other hash algorithms was developed for authentication purposes. A hash function is used in the digital signature generation. The encoder function encoded the hashed message to generate the digital signature and then embedded into an image as a stego-image. In enhancing the robustness of the digital signature, we compressed or encoded it or performed both operations before embedding the data into the image. This encryption algorithm is also computationally efficient whereby for messages with the sizes less than 1600 bytes, the hashed file reduced the original file up to 8.51%.
18
Content available Security issues on digital watermarking algorithms
88%
EN
This paper gives a general introduction to the digital watermarking procedures and their security aspects. The first issue is to clarify unifying and differentiating properties of steganography and watermarking. Then the most important aspects of digital watermarking are reviewed by studying application, requirement and design problems. We put emphasis on the importance of digital watermark as an effective technology to protect intellectual property rights and legitimate use of digital images. In the paper we provide an overview of the most popular digital watermarking methods for still images available today. The watermarking algorithms are divided into two major categories of spatial and transform domains. Because of outstanding robustness and imperceptibility the transform domain algorithms are the mainstream of research. Popular transforms of images include the DFT (Discrete Fourier Transform) ([1, 2, 3, 4, 5]), DCT (Discrete Cosine Transform) ([1, 3, 6, 5]) and DWT (Discrete Wavelet Transform) ([1, 3, 4, 7, 6, 5]). In the paper we emphasize the advantageous features of DWT such as local time-frequency and multi-scale analysis, preserving the quality of host image and ensuring high robustness of watermark. Finally, we present three algorithms which are based on the combination of DWT and some other transformations like DFT ([4]), DCT ([6]) and the Arnold transform ([7, 6]). Finally, we discuss security requirements and possible attacks on the watermarking systems.
EN
This research proposes a method to enhance the payload message by embedding messages on the dilated edge areas by the Least Significant Bit (LSB) method. To add security aspects to messages, messages are not embedded directly on the LSB but encrypted with XOR operations with Most Significant Bit (MSB). The experimental results of the test in this study showed that the dilation process to some extent can increase the payload of 18.65% and the average bpp is 1.42 while maintaining the imperceptibilty quality of stego image with an average PSNR value of about 47 dB, SSIM is 0.9977 and MSE is 1.13.
20
88%
EN
Embedding large amounts of secret data into a cover image with low distortion is an important research issue in steganography. The proposed scheme uses two clustering technologies - similar and dissimilar clustering - to enhance hiding capacity as provided by Du and Hsu’s scheme. In general, the hiding capacity of our proposed scheme is higher than that of Du and Hsu’s scheme, about 16 Kb for the same image quality. In addition, the image quality of our proposed scheme is more than provided by the schemes of either Du and Hsu’s or Shie et al., about 2 dB. Moreover, the distortion for each test image in our proposed scheme is always less than those caused by Du and Hsu’s and Shie et al.’s schemes. Experimental results confirm that the proposed scheme is significantly better than earlier works.
first rewind previous Strona / 4 next fast forward last
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.