scholarly journals A Secret-Key Image Steganography Technique using Random Chain Codes

2019 ◽  
Vol 10 (4) ◽  
pp. 731 ◽  
Author(s):  
Mohammed Abbas Fadhil Al-Husainy ◽  
Diaa Mohammed Uliyan
2018 ◽  
Vol 14 (6) ◽  
pp. 753-763 ◽  
Author(s):  
Mohammed A. Fadhil Al-Husainy ◽  
Hamza Abbass A. Al-Sewadi

Author(s):  
Anukul Pandey ◽  
Barjinder Singh Saini ◽  
Butta Singh ◽  
Neetu Sood

Signal processing technology comprehends fundamental theory and implementations for processing data. The processed data is stored in different formats. The mechanism of electrocardiogram (ECG) steganography hides the secret information in the spatial or transformed domain. Patient information is embedded into the ECG signal without sacrificing the significant ECG signal quality. The chapter contributes to ECG steganography by investigating the Bernoulli's chaotic map for 2D ECG image steganography. The methodology adopted is 1) convert ECG signal into the 2D cover image, 2) the cover image is loaded to steganography encoder, and 3) secret key is shared with the steganography decoder. The proposed ECG steganography technique stores 1.5KB data inside ECG signal of 60 seconds at 360 samples/s, with percentage root mean square difference of less than 1%. This advanced 2D ECG steganography finds applications in real-world use which includes telemedicine or telecardiology.


Author(s):  
Meera Tamboli

Steganography exists from many years in a variety of forms and has been used in a variety of domains. There are various types of steganographic techniques that are used to hide data in various file formats. The proposed model uses three layers of security using three algorithms namely, LSB, DES and AES. The software allows the user to encrypt the secret message which gets protected by undergoing three layers of encryption. The output of the encryption process which is the steno image can be sent across through any medium along with the secret key to decrypt. The end user then uses a unique key to extract and decrypt the secret message from the image. There are many reasons to hide data but the simplest is the need to prevent unauthorized persons from accessing the secret information.


Steganography is one of the commanding and commonly used methods for embedding data. Realizing steganography in hardware supports to speed up steganography. This work realizesthe novel approach for generation of Key, for hiding and encoding processes of image steganography using LSB and HAAR DWT.The data embedding process is realized with seven segment display pattern as a secret key with various sizes using HAAR DWT and LSB. Maximum hiding effectiveness is also attained from this work. The same is implemented in hardware using reconfigurable device Field programmable gate array to improve the speed, area and power. The proposed work is also evaluated improved PSNR using MATLAB.


Author(s):  
Priyadharshini R ◽  
Priyadharshini V ◽  
Vijeletchumi R ◽  
Beaulah David

The Aim of this paper is to bolster security of the traditional cash dispenser machine (ATM) model. So a replacement is proposed that enhances the general expertise, usability and convenience of the group action at the ATM. ATM are wide used these days by the people however its exhausting to hold their ATM card all over. The user might forget their ATM PIN number. This paper is developed for identification and authentication of ATM users so creating face as key. Options like face recognition, image steganography and mobile application management are used for sweetening of privacy of users and security of accounts. Face recognition technology helps the machine to spot each and every user unambiguously. Image steganography is the technique used for the image of user by embedding it into an another image and keep. Its one among the ways utilized to guard the image of users from malicious attacks and hackers. The mobile application helps the particular account holders to supply permission to others to do the ATM transactions. The mobile application contains options like secret key and amount withdrawal to offer confirmation. It helps folks to access another person’s ATM account in emergency with their authentication. This utterly eliminates all the possibilities of fraud thanks to larceny and duplicity of the ATM cards. Moreover, the experiment is that the method in ATM security framework to enhance security and innovative ATM group action.


Sign in / Sign up

Export Citation Format

Share Document