scholarly journals Embedding information into JPEG images with distortion masking in frequency domain

Author(s):  
A. S. Melman ◽  
◽  
P. O. Petrov ◽  
A. A. Shelupanov ◽  
A. V. Aristov ◽  
...  

Steganography allows to ensure the confidentiality of information by organizing covert data transmission channels. However, the effectiveness of steganographic information protection directly depends on the invisibility of a secret message, both for the human eye and for steganalysis methods. The paper proposes an approach that allows solving the problem of vulnerability of the popular QIM embedding method to statistical steganalysis. For this, it is proposed to use a variable quantization step, which is adaptively selected for each block of the JPEG cover image. The experimental results demonstrate an increase in the security level of steganographic embedding due to the application of the proposed approach.

Author(s):  
Marwa Ahmad ◽  
Nameer N. EL-Emam ◽  
Ali F. AL-Azawi

Steganography algorithms have become a significant technique for preventing illegal users from obtaining secret data. In this paper, a deep hiding/extraction algorithm has been improved (IDHEA) to hide a secret message in colour images. The proposed algorithm has been applied to enhance the payload capacity and reduce the time complexity. Modified LSB (MLSB) is based on disseminating secret data randomly on a cover-image and has been proposed to replace a number of bits per byte (Nbpb), up to 4 bits, to increase payload capacity and make it difficult to access the hiding data. The number of levels of the IDHEA algorithm has been specified randomly; each level uses a colour image, and from one level to the next, the image size is expanded, where this algorithm starts with a small size of a cover-image and increases the size of the image gradually or suddenly at the next level, according to an enlargement ratio. Lossless image compression based on the run-length encoding algorithm and Gzip has been applied to enable the size of the data that is hiding at the next level, and data encryption using the Advanced Encryption Standard algorithm (AES) has been introduced at each level to enhance the security level. Thus, the effectiveness of the proposed IDHEA algorithm has been measured at the last level, and the performance of the proposed hiding algorithm has been checked by many statistical and visual measures in terms of the embedding capacity and imperceptibility. Comparisons between the proposed approach and previous work have been implemented; it appears that the intended approach is better than the previously modified LSB algorithms, and it works against visual and statistical attacks with excellent performance achieved by using the detection error (PE). Furthermore, the results confirmed that the stego-image with high imperceptibility has reached even a payload capacity that is large and replaces twelve bits per pixel (12-bpp). Moreover, testing is confirmed in that the proposed algorithm can embed secret data efficiently with better visual quality.


2012 ◽  
Vol 6-7 ◽  
pp. 428-433
Author(s):  
Yan Wei Li ◽  
Mei Chen Wu ◽  
Tung Shou Chen ◽  
Wien Hong

We propose a reversible data hiding technique to improve Hong and Chen’s (2010) method. Hong and Chen divide the cover image into pixel group, and use reference pixels to predict other pixel values. Data are then embedded by modifying the prediction errors. However, when solving the overflow and underflow problems, they employ a location map to record the position of saturated pixels, and these pixels will not be used to carry data. In their method, if the image has a plenty of saturated pixels, the payload is decreased significantly because a lot of saturated pixels will not joint the embedment. We improve Hong and Chen’s method such that the saturated pixels can be used to carry data. The positions of these saturated pixels are then recorded in a location map, and the location map is embedded together with the secret data. The experimental results illustrate that the proposed method has better payload, will providing a comparable image quality.


2021 ◽  
Vol 48 (4) ◽  
Author(s):  
Zainab N. Sultani ◽  
◽  
Ban N. Dhannoon ◽  

Hiding the presence of data during communication has become a pressing concern in this overly digitalized world as a consequence of illegitimate access. These concerns have led to cryptography and steganography techniques as methods for securing data. This paper presents a modified information hiding technique based on an indirect least significant bit. Instead of saving each bit of the secret message in the least significant bit (LSB) of the cover media, each bit of the secret message is compared to a mask bit in the cover media. The result is saved in the cover media’s LSB. In this paper, two steganography schemas are designed in which the cover media are image and audio, while the secret message is a text file. A simple encryption technique is used to transform the secret message into an unreadable format before the hiding process begins. The experimental results indicate that the proposed algorithm achieves promising performance


Internet of Things(IoT) is playing a pivotal role in our daily life as well as in various fields like Health, agriculture, industries etc. In the go, the data in the various IoT applications will be easily available to the physical dominion and thus the process of ensuringthe security of the data will be a major concern. For the extensive implementation of the numerous applications of IoT , the data security is a critical component. In our work, we have developed an encryption technique to secure the data of IoT. With the help of Merkle-Hellman encryption the data collected from the various IoT devices are first of all encrypted and then the secret message is generated with the help of Elliptic Curve Cryptography.


2020 ◽  
Vol 4 (1) ◽  
pp. 157
Author(s):  
Hermansa H ◽  
Rusydi Umar ◽  
Anton Yudhana

Security in the protection of sending messages is a matter that must be considered, because the more the development of the age, the more sophisticated the technology. So that security in sending messages and data communication should be of more concern. Therefore we need a method or algorithm that can protect the message to be sent to the recipient of the message. The algorithm that can be used in encrypting is Caesar Cipher, as a cryptographic coding technique for messages so that messages that look difficult to read and solve. As for the method of inserting messages on encrypted image media using the End of File (EOF) steganography method, which is the method used directly at the end of the file. In the work of securing techniques of messages on this system, using various sizes of images or images that will be inserted a coded secret message or encryption whose capacity is not much different from the photos or images to be used. The conclusion of this study is that the application of the Caesar Cipher Algorithm can be used as a message security technique even though the algorithm is so simple but the level of security is assisted by the End of File (EOF) method to insert the encryption results from the Caesar Cipher algorithm so that the security level it has is sufficient to protect message information to be safe from eavesdroppers or hackers of the message that is not responsible or as a protection of data held.


Webology ◽  
2021 ◽  
Vol 18 (05) ◽  
pp. 1226-1235
Author(s):  
Vasuki C ◽  
Dr. Kavitha S ◽  
Bhuvaneswari S

Wireless sensor networks are greatly utilized by various applications and environments to sense and transmit the data. As wireless sensor network doesn’t have any centralized architecture, there will be various issues occurs in the network such as data transmission failure, data security issues, energy resource limitation and so on. Various authors focused these issues and published different research works to resolve these issues. In this analysis work, energy efficient and secured data transmission techniques introduced by various authors has been discussed in detailed based on their working procedure and simulation methods. And also this research work provided the overall analysis of the research work based on merits and demerits and each and every technique discussed in the literature section. And also, this research work concluded with numerical evaluation between most recent works in terms of energy consumption and security level. This numerical evaluation is done in the NS2 simulation environment.


Author(s):  
Hussein Abdulameer Abdulkadhim ◽  
Jinan Nsaif Shehab

Although variety in hiding methods used to protect data and information transmitted via channels but still need more robustness and difficulty to improve protection level of the secret messages from hacking or attacking. Moreover, hiding several medias in one media to reduce the transmission time and band of channel is the important task and define as a gain channel. This calls to find other ways to be more complexity in detecting the secret message. Therefore, this paper proposes cryptography/steganography method to hide an audio/voice message (secret message) in two different cover medias: audio and video. This method is use least significant bits (LSB) algorithm combined with 4D grid multi-wing hyper-chaotic (GMWH) system. Shuffling of an audio using key generated by GMWH system and then hiding message using LSB algorithm will provide more difficulty of extracting the original audio by hackers or attackers. According to analyses of obtained results in the receiver using peak signal-to-noise ratio (PSNR)/mean square error (MSE) and sensitivity of encryption key, the proposed method has more security level and robustness. Finally, this work will provide extra security to the mixture base of crypto-steganographic methods.


2017 ◽  
Vol 68 (2) ◽  
pp. 117-124
Author(s):  
Martin Broda ◽  
Vladimír Hajduk ◽  
Dušan Levický

Abstract Novel image steganalytic method used to detection of secret message in static images is introduced in this paper. This method is based on statistical steganalysis (SS), where statistical vector is composed by 285 statistical features (parameters) extracted from DCT (Discrete Cosine Transformation) domain and 46 features extracted mainly from DWT (Discrete Wavelet Transformation) domain. Classification process was realized by Ensemble classifier that was helpful in reduction of computational and time complexity. Proposed steganalytic method was verified by detection of popular image steganographic methods. Novel method was also compared with existing steganalytic methods by overall detection accuracy of a secret message.


Author(s):  
Н.Н. Беляев ◽  
О.А. Бебенина ◽  
В.Е. Бородкина

Предложен алгоритм распознавания, реализующий процедуры: обучения выбранных классификаторов и распознавания текстовых данных, учитывающие статистические характеристики распределения коэффициентов частотной области цифровых графических изображениях формата JPEG. The article presents an approach to development an algorithm for recognizing text data within JPEG format digital graphic images. Considered a hypothesis about influence text data content in JPEG digital graphic images on the distribution of values of the discrete cosine transformation coefficients in the frequency domain JPEG images of the format. Statistical classifiers models that provide a solution to the problem of recognition of text data in JPEG images based on analysis of its frequency domain have been determined. A recognition algorithm is proposed that implements the following procedures: training of selected classifiers and recognition of text data, taking into account the statistical characteristics of the distribution of frequency domain coefficients in JPEG format images.


2018 ◽  
pp. 703-728
Author(s):  
Pradipta Roy ◽  
Debarati Dey ◽  
Debashis De ◽  
Swati Sinha

In today's world, sensitive information like secret message, financial transaction, medical report, personal information is transferred over public communication channel. Since the advancement of communication begins, data security becomes a massive problem. The increasing rate of eavesdropping over communication channel leads the introduction of cryptography algorithm for data transmission. Different traditional cryptographic technique is adopted worldwide for protected data transmission. The recent advancement on this field is DNA based cryptography. This chapter describes the application of DNA as computational tool after the exposure of its capability was discovered by Leonard M. Adleman in 1994. Its random nature also helps the cryptography algorithm to become unbreakable. Conventional cryptography methods are sometimes susceptible to attack by the intruder. Therefore the idea of using codon based DNA as a computational tool is used in this cryptography method as an alternative method that fetches new hope in communication technology.


Sign in / Sign up

Export Citation Format

Share Document