scholarly journals DATA STEGANOGRAPHY USING EMBEDDED PRIVATE KEY

Author(s):  
Ziad Alqadi ◽  
Mohammad S. Khrisat

LSB2 method of data steganography is one of the most popular methods used to hide secret messages in digital color image. This method keeps the quality of the holding image high but it is not secure and it can be easily hacked. In this paper a method of improving the security of LSB2 method will be proposed, tested and implemented. The added security issues are simple and do require extra memory and time for execution.  An embedded key will be extracted from the holding image to encrypt the message, this key will be variable and depends on the selected covering image, selected message length and selected position in the image where to extract the embedded key; the selected position and message length will form a private key to enhance LSB2 security.

Author(s):  
Mohamad Tariq Barakat ◽  
Rushdi Abu Zneit ◽  
Ziad A. Alqadi

Multiple methods are used to hide secret messages in digital color images, and the most important and most common is the least significant bit (LSB) method. The LSB method is a known and exposed method, and anyone with programming experience can retrieve the secret message embedded in the digital image. In this paper research we will add some enhancements to improve the security level of LSB method to protect the embedded secret message from being hacked. A simple method of secret message cryptography will be used to encrypt the secret message before bedding it using LSB method. The method will be based on using color image as an image_key; this image_key will be resized to generate the needed secret private key used to encrypt-decrypt secret message. The length and the contents of the generated private key will dynamically change depending on the message length and the selected image_key. The selected image_key will be kept in secret without transmission and will be known only by the sender and receiver and it can be changed any time when needed. The proposed crypto_steganographic method will be implemented to show how it will increase the level o secret message protection.


Author(s):  
Uppuluri Sirisha ◽  
G. Lakshme Eswari

This paper briefly introduces Internet of Things(IOT) as a intellectual connectivity among the physical objects or devices which are gaining massive increase in the fields like efficiency, quality of life and business growth. IOT is a global network which is interconnecting around 46 million smart meters in U.S. alone with 1.1 billion data points per day[1]. The total installation base of IOT connecting devices would increase to 75.44 billion globally by 2025 with a increase in growth in business, productivity, government efficiency, lifestyle, etc., This paper familiarizes the serious concern such as effective security and privacy to ensure exact and accurate confidentiality, integrity, authentication access control among the devices.


Author(s):  
Ashish Dwivedi ◽  
Nirupma Tiwari

Image enhancement (IE) is very important in the field where visual appearance of an image is the main. Image enhancement is the process of improving the image in such a way that the resulting or output image is more suitable than the original image for specific task. With the help of image enhancement process the quality of image can be improved to get good quality images so that they can be clear for human perception or for the further analysis done by machines.Image enhancement method enhances the quality, visual appearance, improves clarity of images, removes blurring and noise, increases contrast and reveals details. The aim of this paper is to study and determine limitations of the existing IE techniques. This paper will provide an overview of different IE techniques commonly used. We Applied DWT on original RGB image then we applied FHE (Fuzzy Histogram Equalization) after DWT we have done the wavelet shrinkage on Three bands (LH, HL, HH). After that we fuse the shrinkage image and FHE image together and we get the enhance image.


Author(s):  
Md Equebal Hussain ◽  
Mohammad Rashid Hussain

security is one of the most important concern on cloud computing therefore institutions are hesitating to host their data over cloud. Not all data can be afforded to move on the cloud (example accounts data). The main purpose of moving data over cloud is to reduce cost (infrastructure and maintenance), faster performance, easy upgrade, storage capacity but at the same time security is major concern because cloud is not private but maintained by third party over the internet, security issues like privacy, confidentiality, authorization (what you are allowed to do), authentication (who you are) and accounting (what you actually do) will be encountered. Variety of encryption algorithms required for higher level of security. In this paper we try to provide solution for better security by proposing a combined method of key exchange algorithm with encryption technique. Data stored in cloud can be protected from hackers using proposed solution because even if transmitted key is hacked of no use without user’s private key.


Author(s):  
S. A. Kravchenko ◽  
A. I. Podberezkin

The article analyzes the interconnection of social aspects of the Internet and security issues in Russia. It shows that contemporary realities acquire global network character that has ambivalent impact on the development of civilizational and social interactions. On the one hand, social networks offer new opportunities for interaction between people living in different countries, on the other hand - they can be used for exclusion at the global level which objectively produces new risks and vulnerabilities. Special consideration is given to fabrication of global risk in social networks, which may provoke military-political conflicts and even wars. In the context of growing pragmatism and globalization of activities of agents of Western civilization the networks take on the quality of the new and highly effective weapon intended to destroy and destroy high-priority policy objectives. The authors analyze the nature of contemporary politics and the war from the perspective of social networks as policy and war tools. Overcoming new security risks and vulnerabilities authors see in the ways of changing the vector of development of scientific knowledge from a pragmatic to a humanist mode.


In many image processing applications, a wide range of image enhancement techniques are being proposed. Many of these techniques demanda lot of critical and advance steps, but the resultingimage perception is not satisfactory. This paper proposes a novel sharpening method which is being experimented with additional steps. In the first step, the color image is transformed into grayscale image, then edge detection process is applied using Laplacian technique. Then deduct this image from the original image. The resulting image is as expected; After performing the enhancement process,the high quality of the image can be indicated using the Tenengrad criterion. The resulting image manifested the difference in certain areas, the dimension and the depth as well. Histogram equalization technique can also be applied to change the images color.


Author(s):  
Ikponmwosa Oghogho ◽  
Dickinson C. Odikayor ◽  
Abayomi-Alli Adebayo ◽  
Samuel T. Wara

This chapter presents VoIP as a disruptive technology to GSM technology as well as the issues, controversies, and problems surrounding its deployment. It gives a general introduction of the evolution of communication systems from the POTS, to GSM, and now VoIP. Several issues that surround the deployment of VoIP such as provision of PSTN equivalent services by VoIP service providers, regulation of the service, introduction of latency and other counter measures by some operators, threat posed to PSTN providers due to emergence of VoIP, the need for technical standardization of VoIP, security issues, different cost structure, and quality of service provided were also discussed in details. Solutions and recommendations were suggested to overcome the challenges outlined. VoIP is presented as the way of the future for communication. When this finally happens depends on how fast the challenges outlined in this chapter are addressed. Future and emerging research trends in the deployment of VoIP such as locating users in a secure and reliable way, monitoring VoIP networks, as well as intrusion detection and prevention on SIP were also considered, after which, conclusion was made. This chapter is both informative and interesting.


2019 ◽  
Vol 29 (1) ◽  
pp. 1480-1495
Author(s):  
D. Khalandar Basha ◽  
T. Venkateswarlu

Abstract The image restoration (IR) technique is a part of image processing to improve the quality of an image that is affected by noise and blur. Thus, IR is required to attain a better quality of image. In this paper, IR is performed using linear regression-based support vector machine (LR-SVM). This LR-SVM has two steps: training and testing. The training and testing stages have a distinct windowing process for extracting blocks from the images. The LR-SVM is trained through a block-by-block training sequence. The extracted block-by-block values of images are used to enhance the classification process of IR. In training, the imperfections on the image are easily identified by setting the target vectors as the original images. Then, the noisy image is given at LR-SVM testing, based on the original image restored from the dictionary. Finally, the image block from the testing stage is enhanced using the hybrid Laplacian of Gaussian (HLOG) filter. The denoising of the HLOG filter provides enhanced results by using block-by-block values. This proposed approach is named as LR-SVM-HLOG. A dataset used in this LR-SVM-HLOG method is the Berkeley Segmentation Database. The performance of LR-SVM-HLOG was analyzed as peak signal-to-noise ratio (PSNR) and structural similarity index. The PSNR values of the house and pepper image (color image) are 40.82 and 36.56 dB, respectively, which are higher compared to the inter- and intra-block sparse estimation method and block matching and three-dimensional filtering for color images at 20% noise.


Sensors ◽  
2021 ◽  
Vol 21 (14) ◽  
pp. 4654
Author(s):  
Piotr Łabędź ◽  
Krzysztof Skabek ◽  
Paweł Ozimek ◽  
Mateusz Nytko

The accuracy of photogrammetric reconstruction depends largely on the acquisition conditions and on the quality of input photographs. This paper proposes methods of improving raster images that increase photogrammetric reconstruction accuracy. These methods are based on modifying color image histograms. Special emphasis was placed on the selection of channels of the RGB and CIE L*a*b* color models for further improvement of the reconstruction process. A methodology was proposed for assessing the quality of reconstruction based on premade reference models using positional statistics. The analysis of the influence of image enhancement on reconstruction was carried out for various types of objects. The proposed methods can significantly improve the quality of reconstruction. The superiority of methods based on the luminance channel of the L*a*b* model was demonstrated. Our studies indicated high efficiency of the histogram equalization method (HE), although these results were not highly distinctive for all performed tests.


Author(s):  
Mohammed Jaber Farhan

The internet and networks have broadened the electronic financial business specifically the transaction of money. The novel banking industry in Iraq countering many obstacles especially security issues. The aggressive competition among the banks to attracting more customers resulting that the quality of the services became the cornerstone. The private banks try to improve the services for the customer by using Automated Teller Machine (ATM). The purpose of this study is describing the explanatory variables for service quality in the research model and examine the effect of service quality variables on employee satisfaction. Two hypotheses were formed to verify if their effect on service quality or not. using Quantitative approach with survey method to quantifies the responses collected via questionnaire. The questionnaires distributed to employees working in the directorate of education are350 just 302was returned and after the examination only 210 questionnaire was valid. Descriptive statistics, Pearson-correlation and multiple linear regression techniques in SPSS were used to analyze quantitative data collected from the questionnaire. the findings are medium agree of ease of use ATM, moderate disagree for accessibility and moderate disagree of security. Regression model finds the service quality factors affect employee satisfaction and as result H1 hypothesis accepted. finally, Pearson-correlation showed a positive relationship to all independent variable on employee's satisfaction and mentioned the highest positive correlation was the ease of use variable.


Sign in / Sign up

Export Citation Format

Share Document