scholarly journals A secure and size efficient algorithm to enhance data hiding capacity and security of cover text by using unicode

Author(s):  
Allah Ditta ◽  
Muhammad Azeem ◽  
Shahid Naseem ◽  
Khurram Gulzar Rana ◽  
Muhammad Adnan Khan ◽  
...  
Author(s):  
Abhishek Basu ◽  
Susmita Talukdar

In this paper, a saliency and phase congruency based digital image watermarking scheme has been projected. The planned technique implants data at least significant bits (LSBs) by means of adaptive replacement. Here more information is embedded into less perceptive areas within the original image determined by a combination of spectral residual saliency map and phase congruency map. The position of pixels with less perceptibility denotes the most unimportant region for data hiding from the point of visibility within an image. Therefore any modification within these regions will be less perceptible to one observer. The model gives a concept of the areas which has excellent data hiding capacity within an image. Superiority of the algorithm is tested through imperceptibility, robustness, along with data hiding capacity.


Entropy ◽  
2020 ◽  
Vol 22 (2) ◽  
pp. 145
Author(s):  
Jung-Yao Yeh ◽  
Chih-Cheng Chen ◽  
Po-Liang Liu ◽  
Ying-Hsuan Huang

Data hiding is the art of embedding data into a cover image without any perceptual distortion of the cover image. Moreover, data hiding is a very crucial research topic in information security because it can be used for various applications. In this study, we proposed a high-capacity data-hiding scheme for absolute moment block truncation coding (AMBTC) decompressed images. We statistically analyzed the composition of the secret data string and developed a unique encoding and decoding dictionary search for adjusting pixel values. The dictionary was used in the embedding and extraction stages. The dictionary provides high data-hiding capacity because the secret data was compressed using dictionary-based coding. The experimental results of this study reveal that the proposed scheme is better than the existing schemes, with respect to the data-hiding capacity and visual quality.


Author(s):  
Vinay D R, Dr. Anand Babu J

Data hiding in video streams became more popular in the present world, since there is a high frequency of data communication over the internet. Hiding the data in video streams provides more security as well as increases embedding capacity than hiding inside the images. The quantity of information to be embedded into the video increases, it can badly influence the video excellence make it inappropriate for certain appliances. The main concerns in data hiding in videos are its high visual excellence, increased hiding capacity, video stream size etc. In this paper, a new data hiding technique is proposed in compressed H.264 Video Streams. At first, the information to be embedded is encrypted using Cryptography approach. The Cryptographic approach helps to encrypt the plain information based on the elliptic points produced by choosing the large prime number. The encrypted data is embedded into the transformed DCT coefficients of I, B and P video frames. The experiment is conducted for different set of video sequences. The results shows that the proposed method yields better performance in terms of Peak signal to noise ratio (PSNR), Structural similarity index (SSIM) and Video quality measure (VQM) when compare to existing methods.


Computers ◽  
2021 ◽  
Vol 10 (11) ◽  
pp. 152
Author(s):  
Ching-Yu Yang ◽  
Ja-Ling Wu

During medical treatment, personal privacy is involved and must be protected. Healthcare institutions have to keep medical images or health information secret unless they have permission from the data owner to disclose them. Reversible data hiding (RDH) is a technique that embeds metadata into an image and can be recovered without any distortion after the hidden data have been extracted. This work aims to develop a fully reversible two-bit embedding RDH algorithm with a large hiding capacity for medical images. Medical images can be partitioned into regions of interest (ROI) and regions of noninterest (RONI). ROI is informative with semantic meanings essential for clinical applications and diagnosis and cannot tolerate subtle changes. Therefore, we utilize histogram shifting and prediction error to embed metadata into RONI. In addition, our embedding algorithm minimizes the side effect to ROI as much as possible. To verify the effectiveness of the proposed approach, we benchmarked three types of medical images in DICOM format, namely X-ray photography (X-ray), computer tomography (CT), and magnetic resonance imaging (MRI). Experimental results show that most of the hidden data have been embedded in RONI, and the performance achieves high capacity and leaves less visible distortion to ROIs.


Author(s):  
K. Ramprakaash ◽  
S. Ramkumar ◽  
R. K. Santhosh ◽  
P. Shanmuga Priya

Steganography and Cryptography are two major fields which is widely used for data security. With the help of these technologies, data security is provided in banking system. In the proposed method, the online transactions are done virtually using hash function. Encryption of data is done by using the cryptographic hash function algorithm. The proposed approach implements an efficient algorithm for embedding the data in an image using steganography which provides the better security pattern for sending messages through a network. The authentication details of the sender and the receiver is hidden to achieve a secure transmission. The proposed approach provides better integrity and confidentiality. This paper implemented a novel methodology which can be used as a secure and highly efficient method of data hiding and data extracting.


2021 ◽  
Vol 7 (12) ◽  
pp. 268
Author(s):  
Ryota Motomura ◽  
Shoko Imaizumi ◽  
Hitoshi Kiya

In this paper, we propose a new framework for reversible data hiding in encrypted images, where both the hiding capacity and lossless compression efficiency are flexibly controlled. There exist two main purposes; one is to provide highly efficient lossless compression under a required hiding capacity, while the other is to enable us to extract an embedded payload from a decrypted image. The proposed method can decrypt marked encrypted images without data extraction and derive marked images. An original image is arbitrarily divided into two regions. Two different methods for reversible data hiding in encrypted images (RDH-EI) are used in our method, and each one is used for either region. Consequently, one region can be decrypted without data extraction and also losslessly compressed using image coding standards even after the processing. The other region possesses a significantly high hiding rate, around 1 bpp. Experimental results show the effectiveness of the proposed method in terms of hiding capacity and lossless compression efficiency.


Author(s):  
Ching Yu Yang ◽  
Chi-Ming Lai ◽  
Hung-Chang Lin ◽  
Ting-Ying Lin ◽  
Ruei-Long Lu

Based on two-dimensional (2D) bit-embedding/-extraction approach, we propose a simple data hiding for electrocardiogram (ECG) signal. The patient’s sensitive (diagnostic) data can be efficiently hidden into 2D ECG host via the proposed decision rules. The performance of the proposed method using various sizes of the host bundles was demonstrated. Simulations have confirmed that the average SNR of the proposed method with a host bundle of size 3 ´ 3 is superior to that of existing techniques, while our payload is competitive to theirs. In addition, our method with a host bundle of size 2 ´  2 generated the best SNR values, while that with a host bundle of size 4 ´  4 provided the largest payload among the compared methods. Moreover, the proposed method provides robustness performance better than existing ECG steganography. Namely, our method provides high hiding capacity and robust against the attacks such as cropping, inversion, scaling, translation, truncation, and Gaussian noise-addition attacks. Since the proposed method is simple, it can be employed in real-time applications such as portable biometric devices.


Symmetry ◽  
2019 ◽  
Vol 11 (9) ◽  
pp. 1146 ◽  
Author(s):  
Hu ◽  
Lo ◽  
Wu

This paper proposes a reversible data hiding technique based on the residual histogram shifting technique. To improve the hiding capacity, this study proposes a multiple-round hierarchical prediction mechanism that generates the prediction errors of each image block. The prediction errors of each block are collected to produce the residual histogram and the secret data are then embedded into the residual histogram to obtain the embedded image. Experimental results demonstrate that the proposed technique not only provides good hiding capacity, but also maintains good image quality of the embedded image. In addition, this technique can be easily extended for image integrity protection as it is capable of resisting error propagation.


2013 ◽  
Vol 9 (4) ◽  
pp. 41-57 ◽  
Author(s):  
Fong-Hao Liu ◽  
Hsiang-Fu Lo ◽  
Chun-Te Su ◽  
Der-Chyuan Lou ◽  
Wei-Tsong Lee

Reversible data hiding with predictive error-based difference expansion to conceal personal and sensitive information in mobile applications and human interaction activities through hand-held devices recently has drawn lots of interest. It can not only completely restore the original image after extraction, but also keep the protected privacy information imperceptible against the eavesdroppers. A reversible data hiding method based on prediction-error and pixel-value difference was proposed in this paper. The suitable situations for reversible algorithms and embedded value are selected depended on the differences between image regions and the characteristics of embedded data. Experimental results show that our proposed scheme provides a 57956 bits (0.24 ppb) hiding capacity and a 53.81dB PSNR on F16 image without generating noticeable visual artifacts. The proposed method is additionally applied with different predictors.


Sign in / Sign up

Export Citation Format

Share Document