scholarly journals Análise Comparativa de Métodos para Esteganografia Digital em Imagens

Author(s):  
Diego Zanchett ◽  
Diego Haddad ◽  
Jurair Junior ◽  
Laura Assis

Sensitive information being shared on the internet is growing. Becauseof this, it is increasingly necessary to take security measureswhilst this information travels in the network. Digital steganographyallows one to send sensitive information in a hidden manner.Although there is a plethora of techniques for such a goal, findingan appropriate one is not always simple. This paper implementsand compares spatial-domain digital steganography techniques inboth RGB and grayscale images. A frequency-domain heuristic forreducing the visual impact of digital steganography in grayscaleimages is presented. As another result of this work, a dataset is alsoavailable in the Kaggle platform with 18 GB of images, containingsecret messages using the techniques under study. In addition, aPython language library was also made available in the PyPI repository,allowing for both concealment and revelation of messagesusing the presented digital steganography methods.

2021 ◽  
Vol 2137 (1) ◽  
pp. 012055
Author(s):  
Wei Yang ◽  
Caijun Zhang ◽  
Jinqiu Zhang ◽  
Kaiqiang Xian ◽  
Qianjun Wu ◽  
...  

Abstract There is confidential data in integrated online services applications. The data needs to be hidden before transmission on the Internet, and the data authenticity should be assured. Information hiding technology is an effective way of protecting the confidential data and may be used for assuring data authenticity. A Two-domain data hiding scheme (TDHS) is introduced in the paper to protect contract document authenticity in grid system. TDHS aims to embed confidential data into signature image in both spatial and frequency domain. LSB-like algorithm is used to generate a signature image Hs by embedding feature data of contract document into the original signature image H in the spatial domain. Then DCT algorithm is adopted to embed the watermark in signature image Hs in the frequency domain, and generate signature image Hs ready . The signature image Hs ready is inserted into the contract document. When received the document with signature, the recipient can verify its authenticity. The feasibility of TDHS is verified through experiments.


2020 ◽  
Vol 5 (4) ◽  
pp. 395-398
Author(s):  
Taleb Samad Obaid

To transmit sensitive information over the unsafe communication network like the internet network, the security is precarious tasks to protect this information. Always, we have much doubt that there are more chances to uncover the information that is being sent through network terminals or the internet by professional/amateur parasitical persons. To protect our information we may need a secure way to safeguard our transferred information. So, encryption/decryption, stenographic and vital cryptography may be adapted to care for the required important information. In system cryptography, the information transferred between both sides sender/receiver in the network must be scrambled using the encryption algorithm. The second side (receiver) should be outlook the original data using the decryption algorithms. Some encryption techniques applied the only one key in the cooperation of encryption and decryption algorithms. When the similar key used in both proceeds is called symmetric algorithm. Other techniques may use two different keys in encryption/decryption in transferring information which is known as the asymmetric key.  In general, the algorithms that implicated asymmetric keys are much more secure than others using one key.   RSA algorithm used asymmetric keys; one of them for encryption the message, and is known as a public key and another used to decrypt the encrypted message and is called a private key. The main disadvantage of the RSA algorithm is that extra time is taken to perform the encryption process. In this study, the MATLAB library functions are implemented to achieve the work. The software helps us to hold very big prime numbers to generate the required keys which enhanced the security of transmitted information and we expected to be difficult for a hacker to interfere with the private information. The algorithms are implemented successfully on different sizes of messages files.


Author(s):  
H. G. Kim ◽  
J. H. Son ◽  
T. Kim

In general, image mosaicking is a useful and important processing for handling images with narrow field of view. It is being used widely for images from commercial cameras as well as from aerial and satellite cameras. For mosaicking images with geometric distortion, geometric correction of each image should be performed before combining images. However, automated mosaicking images with geometric distortion is not a trivial task. The goal of this paper is the development of automated mosaicking techniques applicable to handle GOCI images. In this paper, we try to extract tie-points by using spatial domain and frequency domain matching and perform the mosaicking of GOCI. The method includes five steps. First, we classify GOCI image slots according to the existence of shorelines by spatial domain matching. Second, we perform precise geometric correction on the slots with shorelines. Third, we perform initial sensor modelling for the slots without shorelines and apply geometric correction based on the initial model. Fourth, the relative relationship between the slots without shorelines and the slots with shorelines is estimated through frequency domain matching. Lastly, mosaicking of geometrically corrected all 16 image slots is performed. The proposed method was verified by applying to real GOCI images. The proposed method was able to perform automated mosaicking even for images without shorelines, and its accuracy and processing time were satisfactory. For future research, we will improve frequency matching to generate multiple tie-points and to analyse the applicability of precise sensor modelling directly from frequency matching. It is expected that the proposed method can be applied to the follow-up sensor of the GOCI, GOCI-II, and other ocean satellite images.


The growth rate of the Internet is exceeding that of any previous technology. As the Internet has become the major medium for transferring sensitive information, the security of the transferred message has now become the utmost priority. To ensure the security of the transmitted data, Image steganography has emerged out as an eminent tool of information hiding. The frequency of availability of image file is high and provides high capacity. In this paper, a method of secure data hiding in image is proposed that uses knight tour positions and further 8-queen positions in 8*8 pixel blocks.The cover image is divided into 8*8 pixel blocks and pixels are selected from each block corresponding to the positions of Knight in 8*8 chessboard starting from different pixel positions. 8-pixel values are selected from alternate knight position. Selected pixels values converted to 8-bit ASCII code and result in 8* 8 bit matrix. 8-Queen’s solution on 8*8 chessboard is applied on 8*8 bit matrix. The bits selected from 8-Queens positions and compared with 8-bit ASCII code of message characters. The proposed algorithm changes the LSB of only some of the pixels based on the above comparison. Based on parameters like PSNR and MSE the efficiency of the method is checked after implementation. Then the comparison done with some already proposed techniques. This is how, image steganography showed interesting and promising results when compared with other techniques.


Teknika ◽  
2013 ◽  
Vol 2 (1) ◽  
pp. 46-58
Author(s):  
Timothy John Pattiasina

Steganografi adalah seni dan ilmu menulis atau menyemhunyikan pesan tersembunyi dengan suatu cara sehingga selain si pengirim dan si penerima, tidak ada seorangpun yang mengetahui atau menyadari bahwa ada suatu pesan rahasia. lstilah steganografi termasuk penyemhunyian data digital dalam komputer Ada beberapa metode steganografi, salah satunya adalah metode Algorithms and Transformation. Metode menyembunyikan data dalam fungsi matematika yang disebut algoritma compression. Dua fungsi tersebut adalah Discrete Cosine Transformation (DCT) dan Wavelet Transformation. Fungsi DCT dan Wavelet yaitu untuk mentransformasikan data dari satu tempat (domain) ke tempat (domain) yang lain. Fungsi DCT yaitu mentransformasi data dari tempat spatial (spatial domain) ke tempat fiekuensi (frequency domain).


Author(s):  
Rekha Bhatia ◽  
Manpreet Singh Gujral

Due to the ever increasing number of web services available through the Internet, the privacy as a fundamental human right is endangered. Informed consent and collection of information are two important aspects while interacting on the Internet through web services. The ease of data access and the ready availability of it through Internet, made it easier for interested parties to intrude into the individual's privacy in unprecedented ways. The regulatory and technical solutions adopted to curb this have achieved only a limited success. The main culprits in this regard are the incompatibilities in the regulatory measures and standards. This research work focuses on privacy preserving access control for sharing sensitive information in the arena of web services, provides some recent outlooks towards the critical need of privacy aware access control technologies and a comprehensive review of the existing work in this arena. Besides, a novel framework for privacy aware access to web services is also provided.


Author(s):  
Mahbubur R. Syed ◽  
Mohammad M. Nur ◽  
Robert J. Bignall

In recent years the Internet has become the most popular and useful medium for information interchange due to its wide availability, flexibility, universal standards, and distributed architecture. As an outcome of increased dependency on the Internet and networked systems, intrusions have become a major threat to Internet users. Network intrusions may be categorized into the following major types: • Stealing valuable and sensitive information • Destroying or altering information • Obstructing the availability of information by destroying the service-providing ability of a victim’s server


Author(s):  
Jeanne Chen ◽  
Tung-Shou Chen ◽  
Keh-Jian Ma ◽  
Pin-Hsin Wang

Great advancements made on information and network technologies have brought on much activity on the Internet. Traditional methods of trading and communication are so revolutionized that everything is quasi-online. Amidst the rush to be online emerge the urgent need to protect the massive volumes of data passing through the Internet daily. A highly dependable and secure Internet environment is therefore of utmost importance.


Author(s):  
Daqian He ◽  
Dahai Zhang ◽  
Congying Wang ◽  
Xirui Peng

Abstract Broadband underwater acoustic signal direction of arrival (DOA) estimation method is an important part of underwater array signal processing. The commonly used array signal DOA estimation algorithms due to the restriction of algorithm principles, are unable to process broadband array signal effectively, at the case of the arriving signals have strong correlation, small sampling snapshots or small arrival angle. Therefore, we need a new efficient algorithm to meet the increasing demand of broadband under water acoustic signal processing method. This paper makes use of the broadband acoustic signal similarity of joint sparsity in signal spatial domain received by underwater sonar arrays, establishes the whole space grid covering all broadband frequency domain slices. On the basis, the global sparsity of each frequency domain slice is combined with sparse element extraction class algorithm. By integrating the energy of signal on each slice, the spatial sparsity of each slice is obtained, from which we can get the directions of the arriving broadband wave signals. Through the simulation analysis and experimental verification on lake, we can be see that: The SDJS algorithm improves the performance and signal processing capability of the algorithm compared with the traditional algorithms. Therefore SDJS algorithm has a widely range of research value and application space.


Sign in / Sign up

Export Citation Format

Share Document