Signal and code model for hidden data transmission over the voice channel

Author(s):  
A. Sergeev
2012 ◽  
Vol 38 (1) ◽  
pp. 51-54 ◽  
Author(s):  
V. I. Ponomarenko ◽  
A. S. Karavaev ◽  
E. E. Glukhovskaya ◽  
M. D. Prokhorov

2011 ◽  
Vol 37 (7) ◽  
pp. 657-660 ◽  
Author(s):  
A. S. Karavaev ◽  
V. I. Ponomarenko ◽  
E. P. Seleznev ◽  
E. E. Glukhovskaya ◽  
M. D. Prokhorov

Author(s):  
Yevheniia Kataieva ◽  
Anton Rebrikov

The article examines the problems of protecting information from unwanted access, which have tried to solve throughout the existence of mankind. Nowadays, the widespread use of electronic means of communication, electronic eavesdropping and fraud, a variety of computer viruses and other electronic hazards, electronic systems place high demands on the protection of information. Thus, the study of digital steganography is an urgent task. There are two main areas of hidden data transmission: cryptography and steganography. The purpose of cryptography is to restrict access to information by encrypting it. Unlike cryptography, steganography allows you to hide the very fact of the presence of hidden data. The study examined the main methods of covert data transmission using computer steganography, namely: the method of using system-reserved areas of digital data formats, methods of hiding information by special formatting of text files, which include the use of word, sentence or paragraph shift, selection certain positions of letters in the text or the use of properties of system fields that are not displayed on the screen, the method of using simulation functions, methods of using unused disk sectors, the method of using redundant media files (audio, photo and video). Currently, due to the growth of information and increasing the bandwidth of communication channels, the issue of hiding information in video sequences is becoming increasingly important. The transmission of digital video in recent years is a typical event and does not arouse suspicion. In the course of the research the peculiarities of hiding information in video files are considered, the comparison of existing algorithms of computer video steganography is made. The task is to develop your own algorithm for embedding information in the blue color channel of video files. The object of research is the transfer of hidden data in digital media files. The subject of research is the transmission of hidden data in the video stream. The purpose of research is to review the subject area, to examine the available methods of embedding information in media files in general and specifically in video files, to identify the advantages and disadvantages of existing algorithms, to develop their own algorithm of video steganography based on previously obtained research results. Research methods - methods of information theory, probability theory and mathematical statistics; methods of digital processing of signals, static images and video files; methods of vector analysis. The results of research - an overview of the features of hiding information in video files, compared existing algorithms of computer video steganography.


2021 ◽  
Vol 11 (2) ◽  
pp. 396-405
Author(s):  
Dr.V. Vennila ◽  
L.I. Poomani ◽  
S. Thaaranya

In the field of computer networks, cryptography and steganography are the well-known features for best security purpose. The main idea is to transmit the data securely. So, providing acceptable level of security is essential for data transmission. Also it should reduce the time complexity of the security algorithm. Here we have employed the “Elliptic Curve Cryptography” scheme to encrypt the data and image. A “Least Significant Bit” steganography algorithm is used to insert the encrypted data to be hidden inside the image in order to send the data securely. The encrypted data from the image is then decrypted by the decryption algorithm. Finally the hidden data is taken from the decrypted data. Then the image is compressed before sending through the internet. MATLAB is utilized to mimic outcomes which show that it has great inserting limit and security.


2021 ◽  
Vol 15 (1) ◽  
pp. 1-23
Author(s):  
Peng Li ◽  
Chao Xu ◽  
He Xu

In order to solve the problem that the privacy preserving algorithm based on slicing technology is incapable of dealing with packet loss, this paper presents the redundancy algorithm for privacy preserving. The algorithm guarantees privacy by combining disturbance data and ensures redundancy via carrying hidden data. It also selects the routing tree that is generated by the CTP protocol as the routing path for data transmission. Through division at the source node, the method adds hidden information and disturbance data. This algorithm uses hidden data and adds perturbation data to improve the privacy preserving. Nonetheless, it can restore the original data when data are partly lost. According to the simulation via TOSSIM (TinyOS simulator), in the case of partial packet loss, the algorithm can completely restore the original data. Furthermore, the authors compared accuracy of proposed algorithm, probability of data reduction, data fitting degree, communication overhead, and PLR. As a result, it improves the reliability and privacy of data transmission while ensuring data redundancy.


2019 ◽  
Vol 298 ◽  
pp. 00110
Author(s):  
Ilya Kovalev ◽  
Michael Babin ◽  
Petr Nikishechkin

The problem of industrial espionage is very common in the modern world. Existing complex systems are difficult to configure and turnkey solutions are created from integrator firms. In many enterprises, both industrial and civilian, wireless is a less secure area. The proposed solution, which is used as an addition to existing security systems, is able to detect not only created networks with the usual parameters, but also detect hidden data networks and signal unregistered wireless data networks to send information to a special server. The paper presents the architecture of the hardware-software complex, presents the first prototype and conducts test tests.


Sign in / Sign up

Export Citation Format

Share Document