scholarly journals A Two-domain Data Hiding Scheme for Data Signature in Integrated Online Services Applications

2021 ◽  
Vol 2137 (1) ◽  
pp. 012055
Author(s):  
Wei Yang ◽  
Caijun Zhang ◽  
Jinqiu Zhang ◽  
Kaiqiang Xian ◽  
Qianjun Wu ◽  
...  

Abstract There is confidential data in integrated online services applications. The data needs to be hidden before transmission on the Internet, and the data authenticity should be assured. Information hiding technology is an effective way of protecting the confidential data and may be used for assuring data authenticity. A Two-domain data hiding scheme (TDHS) is introduced in the paper to protect contract document authenticity in grid system. TDHS aims to embed confidential data into signature image in both spatial and frequency domain. LSB-like algorithm is used to generate a signature image Hs by embedding feature data of contract document into the original signature image H in the spatial domain. Then DCT algorithm is adopted to embed the watermark in signature image Hs in the frequency domain, and generate signature image Hs ready . The signature image Hs ready is inserted into the contract document. When received the document with signature, the recipient can verify its authenticity. The feasibility of TDHS is verified through experiments.

The growth rate of the Internet is exceeding that of any previous technology. As the Internet has become the major medium for transferring sensitive information, the security of the transferred message has now become the utmost priority. To ensure the security of the transmitted data, Image steganography has emerged out as an eminent tool of information hiding. The frequency of availability of image file is high and provides high capacity. In this paper, a method of secure data hiding in image is proposed that uses knight tour positions and further 8-queen positions in 8*8 pixel blocks.The cover image is divided into 8*8 pixel blocks and pixels are selected from each block corresponding to the positions of Knight in 8*8 chessboard starting from different pixel positions. 8-pixel values are selected from alternate knight position. Selected pixels values converted to 8-bit ASCII code and result in 8* 8 bit matrix. 8-Queen’s solution on 8*8 chessboard is applied on 8*8 bit matrix. The bits selected from 8-Queens positions and compared with 8-bit ASCII code of message characters. The proposed algorithm changes the LSB of only some of the pixels based on the above comparison. Based on parameters like PSNR and MSE the efficiency of the method is checked after implementation. Then the comparison done with some already proposed techniques. This is how, image steganography showed interesting and promising results when compared with other techniques.


2021 ◽  
Author(s):  
Diego Zanchett ◽  
Diego Haddad ◽  
Jurair Junior ◽  
Laura Assis

Sensitive information being shared on the internet is growing. Becauseof this, it is increasingly necessary to take security measureswhilst this information travels in the network. Digital steganographyallows one to send sensitive information in a hidden manner.Although there is a plethora of techniques for such a goal, findingan appropriate one is not always simple. This paper implementsand compares spatial-domain digital steganography techniques inboth RGB and grayscale images. A frequency-domain heuristic forreducing the visual impact of digital steganography in grayscaleimages is presented. As another result of this work, a dataset is alsoavailable in the Kaggle platform with 18 GB of images, containingsecret messages using the techniques under study. In addition, aPython language library was also made available in the PyPI repository,allowing for both concealment and revelation of messagesusing the presented digital steganography methods.


The process of hiding data and information is known to be steganography it is done to provide secure communication, in present world there is a demand of sending and displaying data in a hidden format especially when the exchange of information and data is taking place publically, and this is the reason because of which many methods have been proposed for data and information hiding. In this paper data and information are being hidden in digital image format, as it is mostly in demand on the internet. For data hiding there are so many techniques developed some are easy, some are bit tedious as compared to the other and all of these techniques have their own benefits, use and limitation. This paper mainly focuses to present Steganography overview, its demand, advantages and the techniques involved in it. In this paper there is also an attempt to identify which Steganography techniques are more useful and what are their requirements and also it shows which application will have more compatibility with which steganography technique.


2019 ◽  
Vol 68 (1) ◽  
pp. 01-07
Author(s):  
Tyler Taylor, Justin Rogers

Video Steganography is a strategy wherein we can conceal a wide range of documents with any extension into a carrying Video document. Right now, are utilizing two fundamental wording that is have host file and carrier file where host file is a hidden file (any sort of record like content document, picture document, and sound/video document) and carrier file must be a video record. The primary inspiration of this paper is to make sure about moving of information by utilizing steganography and cryptography system. It is worried about implanting data in a harmless spread media in a safe and hearty way. Right now expositions we are utilizing Forbidden Zone Data Hiding strategy where no modification is required in have signal range during information hidden procedure. To safely moving the information record, we use video information covering up and utilizing revision limit of rehash gather code with predominance of taboo zone information stowing away. Utilizing this methodology we can likewise stow away and move the enormous video record whose size is bigger than spread record in secure way. The principle favorable position of utilizing video record sequestered from everything data is the additional protection from of the outsider or unintended beneficiary because of the overall multifaceted nature of video contrasted with picture and sound document. I have effectively actualized the proposed system of video information hiding utilizing forbidden zone datahiding strategy (FZDH) on content document, picture record, sound record and video document. The exceptional element is that we can hide the bigger size video record behind the smaller size cover record.


Author(s):  
H. G. Kim ◽  
J. H. Son ◽  
T. Kim

In general, image mosaicking is a useful and important processing for handling images with narrow field of view. It is being used widely for images from commercial cameras as well as from aerial and satellite cameras. For mosaicking images with geometric distortion, geometric correction of each image should be performed before combining images. However, automated mosaicking images with geometric distortion is not a trivial task. The goal of this paper is the development of automated mosaicking techniques applicable to handle GOCI images. In this paper, we try to extract tie-points by using spatial domain and frequency domain matching and perform the mosaicking of GOCI. The method includes five steps. First, we classify GOCI image slots according to the existence of shorelines by spatial domain matching. Second, we perform precise geometric correction on the slots with shorelines. Third, we perform initial sensor modelling for the slots without shorelines and apply geometric correction based on the initial model. Fourth, the relative relationship between the slots without shorelines and the slots with shorelines is estimated through frequency domain matching. Lastly, mosaicking of geometrically corrected all 16 image slots is performed. The proposed method was verified by applying to real GOCI images. The proposed method was able to perform automated mosaicking even for images without shorelines, and its accuracy and processing time were satisfactory. For future research, we will improve frequency matching to generate multiple tie-points and to analyse the applicability of precise sensor modelling directly from frequency matching. It is expected that the proposed method can be applied to the follow-up sensor of the GOCI, GOCI-II, and other ocean satellite images.


2016 ◽  
Author(s):  
Brian A. Nosek ◽  
Mahzarin R. Banaji ◽  
Anthony G. Greenwald

Differences between traditional laboratory research and Internet-based research require review of basic issues of research methodology. These differences have implications for research ethics (e.g., absence of researcher, potential exposure of confidential data and/or identity to a third-party, guaranteed debriefing) and security (e.g., confidentiality and anonymity, security of data transmission, security of data storage, and tracking subjects over time). We also review basic design issues a researcher should consider before implementing an Internet study, including the problem of subject self-selection and loss of experimental control on the Internet laboratory. An additional challenge for Internet-based research is the increased opportunity for subject misbehavior, intentional or otherwise. We discuss methods to detect and minimize these threats to the validity of Internet-based research.


Teknika ◽  
2013 ◽  
Vol 2 (1) ◽  
pp. 46-58
Author(s):  
Timothy John Pattiasina

Steganografi adalah seni dan ilmu menulis atau menyemhunyikan pesan tersembunyi dengan suatu cara sehingga selain si pengirim dan si penerima, tidak ada seorangpun yang mengetahui atau menyadari bahwa ada suatu pesan rahasia. lstilah steganografi termasuk penyemhunyian data digital dalam komputer Ada beberapa metode steganografi, salah satunya adalah metode Algorithms and Transformation. Metode menyembunyikan data dalam fungsi matematika yang disebut algoritma compression. Dua fungsi tersebut adalah Discrete Cosine Transformation (DCT) dan Wavelet Transformation. Fungsi DCT dan Wavelet yaitu untuk mentransformasikan data dari satu tempat (domain) ke tempat (domain) yang lain. Fungsi DCT yaitu mentransformasi data dari tempat spatial (spatial domain) ke tempat fiekuensi (frequency domain).


IEEE Network ◽  
2012 ◽  
Vol 26 (4) ◽  
pp. 39-45 ◽  
Author(s):  
Nicola Bui ◽  
Angelo Castellani ◽  
Paolo Casari ◽  
Michele Zorzi

Author(s):  
Francisco V. Cipolla-Ficarra ◽  
Alejandra Quiroga ◽  
Valeria M. Ficarra

The possibility that millions of users have a free access to a website to send and receive multimedia messages has contributed to the democratization of the Internet since 1995 in the south of Europe. We present how those websites in the second decade of the new millennium tend to a radial and vertical structure of online services. A heuristic and diachronical analysis of the main design categories of Yahoo Spain has been carried out in a human-computer interaction lab whose results are presented in the current research work. The informative aspects of the dynamic and/or static media have also been analyzed, especially in the content and also in the presentation of the online information, on the PC and tablet screens.


Sign in / Sign up

Export Citation Format

Share Document