scholarly journals Steganographic methods in vector graphics

Radiotekhnika ◽  
2021 ◽  
pp. 32-41
Author(s):  
A.A. Kuznetsov ◽  
G.V. Kononchenko

Various steganographic techniques are used to hide information. Usually, information is hidden in images, audio and video files, text documents, and the like. The article deals with vector images consisting of various mathematical objects (points, lines, curves of the first and second order, Bezier curves, nodes, tangents, base points, etc.). Information hiding techniques alter these mathematical objects, for example, by encoding the coordinates of the base points. The most successful for carrying out steganographic transformations is the SVG vector graphics format, which, due to its structure, makes it easy to manipulate the objects of which it consists. Its broad support across platforms also allows for increased secrecy when transferring sensitive data by sending seemingly ordinary media files. The article discusses two methods (bitwise and the method of patterns) of hiding information in vector images, studied their features, advantages and disadvantages. Various affine transformations that can be used to disrupt the operation of the steganosystem were also investigated. The most common types of affine transformations are the operations of transfer, rotation, shift and scaling with possible variations (offsets along the abscissa and ordinate axes, proportional and non-proportional scaling, with compression and expansion). Most of the methods for embedding information into vector images provide a one-time resistance to affine transformations, while the repeated imposition of operations for changing the position of objects may destroy the message altogether. The methods investigated in the work (bitwise and the method of patterns) implement a higher level of resistance to various kinds of transformations when they are repeated many times, and the conducted experiments clearly demonstrate this. The results obtained show that vector images can indeed be used to hide information, but the resistance against certain affine attacks is not always high.

Electronics ◽  
2021 ◽  
Vol 10 (11) ◽  
pp. 1367
Author(s):  
Raghida El El Saj ◽  
Ehsan Sedgh Sedgh Gooya ◽  
Ayman Alfalou ◽  
Mohamad Khalil

Privacy-preserving deep neural networks have become essential and have attracted the attention of many researchers due to the need to maintain the privacy and the confidentiality of personal and sensitive data. The importance of privacy-preserving networks has increased with the widespread use of neural networks as a service in unsecured cloud environments. Different methods have been proposed and developed to solve the privacy-preserving problem using deep neural networks on encrypted data. In this article, we reviewed some of the most relevant and well-known computational and perceptual image encryption methods. These methods as well as their results have been presented, compared, and the conditions of their use, the durability and robustness of some of them against attacks, have been discussed. Some of the mentioned methods have demonstrated an ability to hide information and make it difficult for adversaries to retrieve it while maintaining high classification accuracy. Based on the obtained results, it was suggested to develop and use some of the cited privacy-preserving methods in applications other than classification.


Author(s):  
Rusul Mohammed Neamah ◽  
Jinan Ali Abed ◽  
Elaf Ali Abbood

At the moment, with the great development of information and communications technology, the transfer of confidential and sensitive data through public communications such as the Internet is very difficult to keep them from hackers and attackers. Therefore, it is necessary to work on the development of new and innovative ways to transfer such information and protect it to ensure that it reaches the desired goal. The goal of a new technique to hide information design not only hides the secret message behind the center cover, but it also provides increased security. The most common way to transfer important and confidential data is through embedding it into cover medium files in a way that does not affect the accuracy of the carrier file, which is known as hiding. In this paper, encryption and concealment techniques were used to protect data transferred from attackers. The proposed method relied on encryption of confidential information using the encryption key and the Xnor gate, after which the encrypted information was hidden in a color image using the LSB algorithm. The method of concealment depends on the extraction of chromatic channels of three RGB for each pixel and specifying the channel in which the bit of the encryption message will be hidden. Some metrics have been adopted to measure the quality of the resulting picture after hiding as PSNR and MSE, and achieve good results.


Author(s):  
N.R. Zaynalov ◽  
U.Kh. Narzullaev ◽  
A.N. Muhamadiev ◽  
I.R. Rahmatullaev ◽  
R.K. Buranov

Steganography develops tools and methods for hiding the fact of message transmission. The first traces of steganographic methods are lost in ancient times. For example, there is a known method of hiding a written message: the slave's head was shaved, a message was written on the scalp, and after the hair grew back, the slave was sent to the addressee. From detective works, various methods of secret writing between the lines of ordinary text are well known: from milk to complex chemical reagents with subsequent processing. Digital steganography is based on hiding or embedding additional information in digital objects while causing some distortion of these objects. In this case, text, images, audio, video, network packets, and so on can be used as objects or containers. To embed a secret message, steganographic methods rely on redundant container information or properties that the human perception system cannot distinguish. Recently, there has been a lot of research in the field of hiding information in a text container, since many organizations widely use text documents. Based on this, here the MS Word document is considered as a medium of information. MS Word documents have different parameters, and by changing these parameters or properties, you can achieve data embedding. In the same article, we present steganography using invisible Unicode characters of the Space type, but with a different encoding.


2020 ◽  
Vol 4 (6) ◽  
pp. 15-26
Author(s):  
Abdullah Abdullah ◽  
Sardar Ali ◽  
Ramadhan Mstafa ◽  
Vaman Haji

Digital communication has become a vital part of daily life nowadays, many applications are using internet-based communication and here the importance of security rose to have a secure communication between two parties to prevent authorized access to sensitive data. These requirements led to a number of research in information security that has been done in the past two decades. Cryptography and steganography are the two main methods that are being used for information security. Cryptography refers to techniques that encrypt a message to be sent to a destination using different methods to be done. On the other hand, steganography is the science of hiding information from others using another cover message or media such as image, audio, video, and DNA sequence. This paper proposed a new method to hide information in an image using the least significant bit (LSB) based on Deoxyribonucleic Acid (DNA) sequence. To accomplish this, the proposed scheme used properties of DNA sequence when codons that consist of three nucleotides are translated to proteins. The LSB of two pixels from the image are taken to represent a codon and then translate them to protein. The secret message bits are injected into codons before the translation process which slightly distorts the image and makes the image less suspicious and hard to detect the hidden message. The experimental results indicate the effeteness of the proposed method.


2020 ◽  
Vol 10 (11) ◽  
pp. 295
Author(s):  
María Guadalupe Veytia-Bucheli ◽  
José Gómez-Galán ◽  
Diego Vergara

Communication processes are part of human life. Information and communication technologies (ICTs) and, especially, the use of smartphones have generated new forms of interaction and communication, both synchronous and asynchronous, in formal and informal spaces. One of the most used applications is WhatsApp, which allows the sending of text, documents, images, and emojis. It is important to study these new forms and languages of communication in higher education because any educational or training process is essentially communicative. This research was carried out using a mixed approach, with a nonexperimental, descriptive, and transversal design, using a technique of a survey made up of 30 items. It was applied to postgraduate university students to determine their use and value among people with a consolidated university academic career, which would allow us to determine the presence of these new languages in this context. The basic objectives were to identify the frequency of use of emojis through WhatsApp amongst Mexican graduate students and to analyze the advantages and disadvantages of their use. The results confirmed the increase of emojis in conversations conducted by WhatsApp among fellow students. As positive elements, it was determined that they favor the development of a pleasant environment, confidence, and empathy, in addition to expressing emotions, feelings, and reactions. However, emojis also have drawbacks and disadvantages. Among them is the risk that they are misunderstood since their meaning is not shared, that they divert attention from a central idea, and, in general, that they sometimes have an addictive character that implies a waste of time in a study context, such as at the university. In conclusion, it can be argued that ICTs are profoundly transforming the processes of written communication in today’s society, including the university world. New languages that present intercultural, dynamic, dialectic, and ecosystemic alternatives to speech or writing have appeared. Emojis, in the context of higher education, would be an example of this trend.


Palaeobotany ◽  
2019 ◽  
Vol 10 ◽  
pp. 5-12
Author(s):  
E. V. Karasev ◽  
N. P. Maslova ◽  
T. M. Kodrul

The advantages and disadvantages of a number of specialized computer programs for obtaining dimensional characteristics of biological objects by analysis of their digital images are considered in comparative terms. The authorial methodology of using a vector graphics editor Inkscape and a new online service SVGm (Scalable Vector Graphics measurer, https://svgm.cf) is proposed to measure the linear parameters of the objects in the images and to prepare the quantitative characteristics of objects and their different qualitative characteristics for the subsequent statistical analysis. An algorithm for working with Inkscape editor and SVGm online service is described in detail. Object images imported into Inkscape editor are measured using vector elements (lines, rectangles, circles, ellipses, polygons) and saved in the standard SVG format. Properties of vector figures of SVG files are converted by the online service SVGm in the measurement results shown in the table. The potential of the method is shown by the example of morphological measurements of various botanical objects.


2021 ◽  
Vol 14 (4) ◽  
pp. 7-22
Author(s):  
Katarina Alexius

This study conducts an analysis of the rights in article 8 of the ECHR and the application of the proportionality principle when Swedish care orders may be regarded as a necessary interference in family life. The study has been based on an interdisciplinary approach. Text documents were studied through socio-legal methods and perspectives, by combining knowledge from legal sources and social sciences research through a content analysis derived from formal and substantive legal certainty. The article concludes that reasoning in Swedish administrative courts should routinely consider proportionality in cases of neglect, and sets out to sketch a theoretical framework for the principle of proportionality in decisions on care orders. The results show that, since decisions in child welfare cases cannot be made completely uniform and predictable, the focus of decisions in social child welfare work must be to satisfy the objectives and values of substantive legal certainty, instead of unrealistically striving for formal legal certainty through equal treatment and predictability. The results also show that, by requiring those who exercise public authority to present their assessments based on proportionality, new demands are made for the quality and efficiency of involuntary out-of-home placements. Child welfare investigations should nowadays include impact assessments that clarify the advantages and disadvantages of the care in relation to the risk of harm from the original home conditions. Abuse and neglect in out-of-home placements will therefore be of growing importance in decisions on care orders in the future.


2020 ◽  
Vol 3 (2) ◽  
Author(s):  
Silvana Tomić Rotim ◽  
Višnja Komnenić

Different reports show that organizations face a number of hurdles in their efforts to better protect sensitive data. Most frequently mentioned is the challenge of enforcing security policy across the data lifecycle (57%), followed by lack of expert staff (50%), and lack of budget (48%). This article includes the statistics regarding cybersecurity threats and attacks, professionals’ shortage and the expected knowledge, skills and experience for doing this kind of job. Also the article offers some possible solutions for solving this problem, as well as the advantages and disadvantages of different options.


2020 ◽  
Vol 4 (6) ◽  
pp. 15-26
Author(s):  
Abdullah Ahmed Abdullah ◽  
Sardar Hasen Ali ◽  
Ramadhan J. Mstafa ◽  
Vaman Mohammed Haji

Digital communication has become a vital part of daily life nowadays, many applications are using internet-based communication and here the importance of security rose to have a secure communication between two parties to prevent authorized access to sensitive data. These requirements led to a number of research in information security that has been done in the past two decades. Cryptography and steganography are the two main methods that are being used for information security. Cryptography refers to techniques that encrypt a message to be sent to a destination using different methods to be done. On the other hand, steganography is the science of hiding information from others using another cover message or media such as image, audio, video, and DNA sequence. This paper proposed a new method to hide information in an image using the least significant bit (LSB) based on Deoxyribonucleic Acid (DNA) sequence. To accomplish this, the proposed scheme used properties of DNA sequence when codons that consist of three nucleotides are translated to proteins. The LSB of two pixels from the image are taken to represent a codon and then translate them to protein. The secret message bits are injected into codons before the translation process which slightly distorts the image and makes the image less suspicious and hard to detect the hidden message. The experimental results indicate the effeteness of the proposed method.


Complexity ◽  
2020 ◽  
Vol 2020 ◽  
pp. 1-9
Author(s):  
Lina Yu ◽  
Chunwei Wang ◽  
Huixian Chang ◽  
Sheng Shen ◽  
Fang Hou ◽  
...  

Classification and gradation system adopts different security protection schemes for different types of data by implementing classification and gradation management of data, which is an important pretechnical means for data security protection and prevention of data leakage. This paper introduces artificial intelligence classification, machine learning, and other means to learn and train enterprise documents according to the characteristics of enterprise sensitive data. The generated training model can intelligently identify and classify file streams, improving work efficiency and accuracy of classification and gradation. At the same time, the differences, advantages, and disadvantages of K-NN (K-Nearest Neighbors), DT (Decision Tree), and LinearSVC algorithms are compared. The experimental data shows that LinearSVC algorithm is applicable to high-dimensional data, with discrete, sparse data features and large number of features, which is more suitable for classification of sensitive data of enterprises.


Sign in / Sign up

Export Citation Format

Share Document