scholarly journals Understandable Steganography

2018 ◽  
Vol 7 (3) ◽  
pp. 1024 ◽  
Author(s):  
Indu Maurya ◽  
S K Gupta

For hiding information in a digitalized object Steganography is an important technique. It is a special kind of scientific technique which involves the secret information communication inside suitable cover objects of multimedia like image files, audio or videos. The embedded data and its existence are hidden with the help of Steganography. It is a method of hiding data which has enormously improved the security level of confidential data with the help of special hiding mechanism and is considered as remarkable achievement in the computational power. The main aims of Steganography are; capacity of concealed data along with its robustness, lack of detection etc. These are some of the additional features which make it distinguishing from other older techniques like watermarking as well as cryptography. In this research paper, we have surveyed Steganography of digital images and cover the basic and key concepts. In spatial representation the development of image Steganographic methodology in the format of JPEG, along with that we will also debate on the modern developments as far as Steganography is concerned.For increasing Steganographic security, specifically used approaches are shortlisted and the developments made after investigations are also presented in this paper.  

Author(s):  
Nisha Manral

Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the Internet. For hiding secret information in images, there exists a large variety of steganographic techniques some are more complex than others and all of them have respective strong and weak points. Different applications have different requirements of the steganography technique used. For example, some applications may require absolute invisibility of the secret information, while others require a larger secret message to be hidden. This paper intends to give an overview of image steganography, its uses and techniques. It also attempts to identify the requirements of a good steganographic algorithm and briefly reflects on which steganographic techniques are more suitable for which applications.


2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Naived George Eapen ◽  
Debabrata Samanta ◽  
Manjit Kaur ◽  
Jehad F. Al-Amri ◽  
Mehedi Masud

The increase in computational power in recent years has opened a new door for image processing techniques. Three-dimensional object recognition, identification, pose estimation, and mapping are becoming popular. The need for real-world objects to be mapped into three-dimensional spatial representation is greatly increasing, especially considering the heap jump we obtained in the past decade in virtual reality and augmented reality. This paper discusses an algorithm to convert an array of captured images into estimated 3D coordinates of their external mappings. Elementary methods for generating three-dimensional models are also discussed. This framework will help the community in estimating three-dimensional coordinates of a convex-shaped object from a series of two-dimension images. The built model could be further processed for increasing the resemblance of the input object in terms of its shapes, contour, and texture.


2019 ◽  
Author(s):  
AWEJ-tls for Translation & Literary Studies ◽  
Fatima BENSIDHOUM

The main focus of this research paper is to study one of the key concepts of postcolonial critical theory which is “Identity and Representation”. It is based upon a textual reading and analysis of two texts as representatives of colonial literature written about British-India and French-Algeria, namely A Passage to India by E.M. Forster and La Cina by Louis Bertrand. Relying on Albert Memmi’s foundational postcolonial theory developed in his The Colonizer and the Colonized, we assume that both texts obey and reflect a similar ideological discourse. The narratives are revealed to operate through a complex system which tends to (re)fashion and to (re)mold the identity of both the colonizer and the colonized. We demonstrate that Forster and Bertrand shape the main characters into two types which Memmi labels as: ‘the Colonizer who Accepts’ and ‘the Colonizer who Refuses’. We have also showed that the writers though belonging to different imperial powers and writing in two different languages, they could not but adhere and support the colonial practices of their countries. What comes also of this study is that Forster, though most often known for his Liberalism, vehicles a racial discourse which accounts for the superiority of the British colonizer. Bertrand is much more racist and jingoist, his attitudes are reminders of what Achebe said about Conrad; ‘a bloody racist’.


2021 ◽  
pp. 4110-4120
Author(s):  
Rawaa Hamza Ali ◽  
Jamal Mohamed Kadhim

In every system of security, to keep important data confidential, we need a high degree of protection. Steganography can be defined as a way of sending confidential texts through a secure medium of communications as well as protecting the information during the process of transmission. Steganography is a technology that is used to protect users' security and privacy. Communication is majorly achieved using a network through SMS, e-mail, and so on. The presented work suggested a technology of text hiding for protecting secret texts with Unicode characters. The similarities of glyphs  provided invisibility and increased the hiding capacity. In conclusion, the proposed method succeeded in securing confidential data and achieving high payload capacity by using the Huffman compression algorithm, which was implemented on an unlimited text length. In addition, this approach has the ability to hide a single bit in every digit or letter in the cover file. Also, the approach meets the cognitive transparency and does not make the modifications apparent on the original data. The method suggested in this work increases the security level through coding a secret message before embedding it within the cover text, with the use of the Advanced Encryption Standard (AES) algorithm.


Author(s):  
Jelena Jardas Antonić

Digital transformation and global trends in Smart City development have brought on serious security challenges in governing smart data assets. The implementation of two-way communication between cities and citizens requires secure communication channels and efficient data management. Fast development of information communication technologies (ICT) demands for continues investments in new security options. In this paper, the author examined the efficiency of implemented security levels in local government units (LGUs) through Data Envelopment Analysis. The Data Envelopment Analysis enables benchmarking LGUs according to obtained results. The efficient LG units were further examined and were ranked using super-efficiency analysis. The inefficient LGUs can use the obtained results to improve their performance using projections and thus reach the efficiency frontier.


Author(s):  
Vaikunth Pai T. ◽  
P.S. Aithal

Cloud computing services enabled through information communication technology delivered to a customer as services over the Internet on a leased basis have the capability to extend up or down their service requirements or needs. In this model, the infrastructure is owned by a third party vendor and the cloud computing services are delivered to the requested customers. Cloud computing model has many advantages including scalability, flexibility, elasticity, efficiency, and supports outsourcing noncore activities of an organization. Cloud computing offers an innovative business concept for organizations to adopt IT enabled services without advance investment. This model enables convenient, on-request network accessibility to a shared pool of IT computing resources like networks, servers, storage, applications, and services. Cloud computing can be quickly provisioned and released with negligible management exertion or service provider interaction. Even though organizations get many benefits of cloud computing services, many organizations are slow in accepting cloud computing service model because of security concerns and challenges associated with management of this technology. Security, being the major issues which hinder the growth of cloud computing service model due to the provision of handling confidential data by the third party is risky such that the consumers need to be more attentive in understanding the risks of data breaches in this new environment. In this paper, we have discussed the security issues, the challenges and the opportunities in the adoption and management of cloud computing services model in an organization.


2014 ◽  
Vol 41 (1) ◽  
pp. 26-31
Author(s):  
Hala Abdul Wahab ◽  
Sura Sarab

Many digital services require reliable security in storage and transmission of digital images. Due to the rapid growth of theinternet in the digital world today, the security of digital images has become more important and attracted much attention. The prevalenceof multimedia technology in our society has promoted digital images to play a more significant role than the traditional texts, whichdemand serious protection of users' privacy for all applications. Encryption techniques of digital images are very important and should beused to frustrate unauthorized access from opponents. In this paper a new approach is proposed for partial encryption in digital imagebased on dragging the longest wavelength color in digital image then input the extract color to the plasma encoding algorithm to havepartial ciphered image that can be deciphered at the recipient side using the proposed retrieve algorithm. It is possible to apply multilevelfor the proposed approach to increase the security level with less time for encryption/decryption. The new approach test appeared that theencryption/decryption processes was very flexible and efficient.


Author(s):  
Abdolreza Hatamlou ◽  
Aliasghar Erfannia ◽  
Farzaneh Mahalleh

In this article, a novel watermarking method is proposed which applies the substitution of LSB for low-value parts of the image to embed confidential data. The watermark bits are encoded before being placed. Also, the data on the diameters of the host image blocks are selected on the basis of an irregular determined algorithm that is resistant to attacks. The host image applied in the proposed algorithm should be grayscale. The proposed algorithm uses three bits to embed data that will increase the capacity. In the conventional LSB method, in host image matrix, data are stored in the consecutive numbers, but in this proposed scheme, the host image blocks are divided into separate n × n parts and the diameter of each block are placed in a vector. Then embedded watermarking bits in a vector of numbers is done, from the resulting vector a new block is created, and finally, that block is stored in a new matrix. Then the host image block is overwritten which results in a watermarked image with high capacity.


Author(s):  
Manashee Kalita ◽  
Swanirbhar Majumder

In this smart age, smart gadgets with internet connectivity have become a necessity. While enjoying these facilities, one must count the security of their private or confidential information. With due time, a lot of cryptographic methods have been developed for enforcing security. On the other hand, with the advancement of technologies, the intruders and hackers have also developed their skills and tools. Therefore, many times we fail to protect our information. To get rid of this situation, the developers have to focus on some other method besides cryptography. Steganography can be considered as the solution to overcome this problem, as it is the technique which conceals the existence of any secret information in a usual media file. Moreover, inclusion of biometric with steganography enhances the security level, as biometric systems are dominating the field of authentication. Here, various techniques of steganography, biometrics, and steganography using biometrics will be discussed. Finally, the present scenario of steganography using biometrics will be demonstrated.


10.28945/2353 ◽  
2001 ◽  
Author(s):  
Zlatko J. Kovacic

We examine how accurately the belief system or cultural concepts of Maori, the indigenous people of New Zealand, is reconstructed in the virtual world of the Internet. Nine Maori web sites were searched using a list of 44 key concepts in Maori culture. We registered how many pages within a particular web site contain each of the key concepts. These numbers were set up in a data matrix for further statistical analysis. The Multidimensional Scaling method was used to construct a spatial representation of Maori web sites in the space generated by the key concepts in Maori culture. Using the correlation coefficients between derived dimensions and the key concepts we interpreted three dimensions as General Cultural, Intra-tribe Dynamics and Educational. The position of each Maori web site in this space has been located and described.


Sign in / Sign up

Export Citation Format

Share Document