scholarly journals Hacking Anti-Shoplifting System to Hide Data within Clothes

2021 ◽  
Vol 67 (1) ◽  
pp. 659-674
Author(s):  
Al Hussien Seddik Saad ◽  
E. H. Hafez ◽  
Zubair Ahmad
Keyword(s):  
Ground Water ◽  
2010 ◽  
Vol 49 (3) ◽  
pp. 450-453 ◽  
Author(s):  
Gunnar Lorenzen ◽  
Christoph Sprenger ◽  
Asaf Pekdeger

Author(s):  
Nurmi Hidayasari ◽  
Febi Yanto

The method of steganography commonly used to hide data or information is Least Significant Bit (LSB) method. One of the relevant research is LSB using sequential Encoding - Decoding by David Pipkorn and Preston Weisbrot. In this research, an analysis of the LSB method using Sequential Encoding - Decoding by doing some testing. The tests are on the aspect of message security using tools StegSpy and enhanced LSB algorithm, testing on image quality by calculating the Peak Signal to Noise Ratio (PSNR) value and see the image histogram, testing on robustness of message by doing some image processing operations on stego image, like cropping, rotating, and etc, and then testing on capacity to check size of cover image and stego image and calculates the maximum size of data that can be hidden. From the testing process, we know that there are deficiencies in the aspects of security, robustness and capacity of a message. And then in this research we try to change the location of messages that are hidden in the image bits, which previous research used the 8th bit of each bytes, changed to the 7th bit. To be able to correct deficiencies in the security aspect. After repairing and testing like before, obtained better results in the security aspect. This can be seen from the image of the enhanced LSB algorithm process, the message is not detected, but unfortunately the image quality is reduced, with the low PSNR value generated.


2019 ◽  
Vol 8 (4) ◽  
pp. 12047-12051

Process of sending data through the Internet is vulnerable to tampering and theft, so protection has become a necessity. Many solutions have proposed to solve this problem in order to protect the sending data and conceal them in a way that cannot be penetrated or proven by nature. The paper proposes a method to hide data in a Deoxy ribonucleic acid (DNA) using Postfix conversion according to the embedded bits. The method has proved its security in concealing the information, not predicting its nature, and preserving the biological structure of the DNA sequence.


2012 ◽  
Vol 5 (1) ◽  
pp. 1-18
Author(s):  
Cynthia L. Knott ◽  
G. Steube

The importance of securing data and information is a critical issue in todays world. These are no longer stored on a central system that is easy to protect and secure. Now everyone carries around small storage devices, which make guaranteeing that the information is guarded is much more complex and uncertain. This paper builds on the previous research of Knott & Steubes in the paper Encryption and Portable Data Storage, to be published in the Spring of 2011. In the previous work we identified the potential security issues that arise from using a portable storage device such as a USB flash drive. TrueCrypt software was introduced as an option that allows users to encrypt and hide data. The TrueCrypt software, which is publically available, is particularly useful for safeguarding data on USB flash drives that are easily compromised. A survey of undergraduate students was administered which focused on their practices and attitudes about security. It was found that there were strong associations between the use of flash drives, security, and the use of passwords.


Author(s):  
Zena Ahmed Alwan ◽  
Hamid Mohammed Farhan ◽  
Siraj Qays Mahdi

Steganography is a best method for in secret communicating information during the transference of data. Images are an appropriate method that used in steganography can be used to protection the simple bits and pieces. Several systems, this one as color scale images steganography and grayscale images steganography, are used on color and store data in different techniques. These color images can have very big amounts of secret data, by using three main color modules. The different color modules, such as HSV-(hue, saturation, and value), RGB-(red, green, and blue), YCbCr-(luminance and chrominance), YUV, YIQ, etc. This paper uses unusual module to hide data: an adaptive procedure that can increase security ranks when hiding a top secret binary image in a RGB color image, which we implement the steganography in the YCbCr module space. We performed Exclusive-OR (XOR) procedures between the binary image and the RGB color image in the YCBCR module space. The converted byte stored in the 8-bit LSB is not the actual bytes; relatively, it is obtained by translation to another module space and applies the XOR procedure. This technique is practical to different groups of images. Moreover, we see that the adaptive technique ensures good results as the peak signal to noise ratio (PSNR) and stands for mean square error (MSE) are good. When the technique is compared with our previous works and other existing techniques, it is shown to be the best in both error and message capability. This technique is easy to model and simple to use and provides perfect security with unauthorized.


Author(s):  
Harbi S. Jamila ◽  
Nabeel N. Zeyad

Steganography is the art and science that enables you to hide the data in certain communication such as (video, Audio, and image). Here it doesn't scramble the data and send it, but we hide it using a color image to hide the data at the Human skin color and doing that using the cropping phrase to get the required area to hide data. In this paper, we will use the Wavelet and slant, let to process the hiding in the blue band of the RGB image and apply the DWT (discrete wavelet transformation) to get the decomposed bounds of the Cover image to use it to hide the data of the (stage) image.


Author(s):  
Ahlam R. Khekan ◽  
Hiba Mohammed Wajeh Majeed ◽  
Omer F. Ahmed Adeeb

<span>With the increasing technological and electronic development, methods have been developed to hide important information using text steganography as a new technology, since it is not noticeable and easy to send and receive. The use of the Arabic language is one of the new methods used to hide data. In this work, we preview our method that depends to use the part of Arabic language properties to embed the secret English message in to cover text to create text steganography. More than half of the Arabic characters contain dots. Several characters have upper dots and others have lower dots. Some have one dot others have two dots. Few have even three dots. In this new idea, we will use the dots of charters to embed the English secret message. First, we will compress the secret message by using the 5-Bit Encoding (T-5BE) to make the cover text able to embed more bits of the secret message by 37.5%. Then we start using the Arabic semantic dictionary to correct the hiding path and enhancement the stego-cover text to eliminate errors caused by switching words. In this research, we were able to extract experimental results that show that the proposed model achieves high masking accuracy in addition to the storage capacity of the cover text.</span>


2020 ◽  
Vol 11 (05) ◽  
pp. 700-709
Author(s):  
Thomas A. Lasko ◽  
David A. Owens ◽  
Daniel Fabbri ◽  
Jonathan P. Wanderer ◽  
Julian Z. Genkins ◽  
...  

Abstract Background Suboptimal information display in electronic health records (EHRs) is a notorious pain point for users. Designing an effective display is difficult, due in part to the complex and varied nature of clinical practice. Objective This article aims to understand the goals, constraints, frustrations, and mental models of inpatient medical providers when accessing EHR data, to better inform the display of clinical information. Methods A multidisciplinary ethnographic study of inpatient medical providers. Results Our participants' primary goal was usually to assemble a clinical picture around a given question, under the constraints of time pressure and incomplete information. To do so, they tend to use a mental model of multiple layers of abstraction when thinking of patients and disease; they prefer immediate pattern recognition strategies for answering clinical questions, with breadth-first or depth-first search strategies used subsequently if needed; and they are sensitive to data relevance, completeness, and reliability when reading a record. Conclusion These results conflict with the ubiquitous display design practice of separating data by type (test results, medications, notes, etc.), a mismatch that is known to encumber efficient mental processing by increasing both navigation burden and memory demands on users. A popular and obvious solution is to select or filter the data to display exactly what is presumed to be relevant to the clinical question, but this solution is both brittle and mistrusted by users. A less brittle approach that is more aligned with our users' mental model could use abstraction to summarize details instead of filtering to hide data. An abstraction-based approach could allow clinicians to more easily assemble a clinical picture, to use immediate pattern recognition strategies, and to adjust the level of displayed detail to their particular needs. It could also help the user notice unanticipated patterns and to fluidly shift attention as understanding evolves.


Sign in / Sign up

Export Citation Format

Share Document