scholarly journals Application of Delaunay Triangulation and Catalan Objects in Steganography

Mathematics ◽  
2021 ◽  
Vol 9 (11) ◽  
pp. 1172
Author(s):  
Faruk Selimović ◽  
Predrag Stanimirović ◽  
Muzafer Saračević ◽  
Predrag Krtolica

This paper presents a new method of steganography based on a combination of Catalan objects and Voronoi–Delaunay triangulation. Two segments are described within the proposed method. The first segment describes the process of embedding data and generating a complex stego key. The second segment explains the extraction of a hidden message. The main goal of this paper is to transfer a message via the Internet (or some other medium) using an image so that the image remains absolutely unchanged. In this way, we prevented the potential attacker from noticing some secret message hidden in that picture. Additionally, the complex stego key consists of three completely different parts (the image, the encrypted Delaunay triangulation, and the array Rk in Base64 code), which are very difficult to relate with each other. Finally, a few security analyses of the proposed method are conducted, as well as the corresponding steganalysis.


2014 ◽  
Vol 602-605 ◽  
pp. 3363-3366
Author(s):  
Yi Ming Sun ◽  
Chun Lei Han

In order to automatically identify the mobile phones' reviews that the users comment on the mobile phone on the internet and obtain valuable information from the reviews, this paper presents the process of constructing ontology for the mobile phones' reviews and preliminarily establish a domain ontology of the mobile phones' reviews. The ontology construction adopts the Protégé tool and the Seven Steps method of Stanford University research. The ontology can provide convenience for the semantic information mining on Web mobile phones' reviews, and it can provide a new method to effectively mine the use feelings of the phone from a large number of mobile phone users' reviews.



2011 ◽  
Vol 34 (5) ◽  
pp. 635-648 ◽  
Author(s):  
Christophe Crespelle ◽  
Fabien Tarissan


2018 ◽  
Vol 7 (2) ◽  
pp. 260-265 ◽  
Author(s):  
Yulia Fatma ◽  
Harun Mukhtar ◽  
Muhammad Taufik

The internet network is growing rapidly and has a great impact on human life. The development of the internet network has enabled many people to exchange information or messages,one of tham by using email media. Apparently the internet is a path that in ni not too safe because it is a common communication media that can be used by everyone so prone to tapping information or messages. Therefore, security and confidentiality are needed in data communications. One may to keep messages safe is to use steganography technique. The steganography method used is the method of message insertion using BPCS (Bit Plane Complexity Segmentation). Before the message is inserted, the message is first encrypted using cryptography techniques. The cryptographic algorithm used is RSA algorithm. RSA algorithm consists of encryption algorithm and decryption algorithm. The confidential message is encrypted using RSA encryption algorithm and inserted using the insertion method of BPCS. With the technique of steganography on the image media then the delivery of a secret message will have a good level of security because it can not be detected directly by the senses of human vision. Keywords: cryptography, steganography, RSA, method BPCS   Abstrak Jaringan internet berkembang dengan pesat dan memberikan pengaruh besar bagi kehidupan manusia. Perkembangan jaringan Internet telah memungkinkan banyak orang untuk saling bertukar informasi atau pesan salah satunya dengan media email. Ternyata, internet merupakan jalur yang tidak terlalu aman karna merupakan media komunikasi umum yang dapat digunakan semua orang sehingga rawan penyadapan informasi atau pesan. Oleh karena itu, keamanan dan kerahasiaan sangat dibutuhkan dalam komunikasi data. Salah satu cara untuk menjaga keamanan pesan adalah menggunakan teknik steganografi. Metode steganografi yang digunakan adalah metode penyisipan pesan, dengan menggunakan metode BPCS (Bit Plane Complexity Segmentation). Sebelum pesan disisipkan terlebih dahulu pesan tersebut dienkripsi dengan menggunakan teknik kriptografi. Algoritma kriptografi yang digunakan adalah algoritma RSA. Algoritma RSA terdiri dari algoritma enkripsi dan algoritma dekripsi. Pesan rahasia disandikan menggunakan algoritma enkripsi RSA dan disisipkan menggunakan metode penyisipan BPCS. Dengan adanya teknik steganografi pada media citra maka pengiriman suatu pesan yang bersifat rahasia akan memiliki tingkat keamanan yang baik karena tidak dapat dideteksi langsung oleh indera penglihatan manusia. Keywords: Kriptografi, Steganogari, RSA, Metode BPCS



Author(s):  
Ajay Kumar ◽  

Access to the internet is fast becoming a basic right given the plethora of information available on the net these days. In the current scenario, the issue of internet shutdown has become an important concern in India. Internet shutdown affects people socially, psychologically and economically. On one hand, many democratic countries of the world are discussing about digital freedom and human rights, while on the other hand, some countries including India are continuously practicing Internet shutdowns in different parts of their countries. India has become the top country of the world in terms of the numbers of Internet shutdowns. The Internet has become such a prominent source of information for all of us that when Internet connectivity is suspended, many people are affected as they depend on the Internet services for various purposes. Internet shutdown is not only harmful to democracy and governance but also to the economy of the country. Internet shutdowns are direct violations of digital freedom and human rights. The main objective of this paper is to argue that access to internet is a basic right and highlight the problem of Internet shutdown in India and its adverse impact on the lives of Indians. In addition, this paper attempts to highlight a brief history of Internet shutdowns in India. The paper shows how frequent clampdowns on internet affects the economy, as has been the case of Union Territory of Jammu & Kashmir thereby highlighting the case for internet freedom for the survival of the economy especially in Digital India.



Author(s):  
Nisha Manral

Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the Internet. For hiding secret information in images, there exists a large variety of steganographic techniques some are more complex than others and all of them have respective strong and weak points. Different applications have different requirements of the steganography technique used. For example, some applications may require absolute invisibility of the secret information, while others require a larger secret message to be hidden. This paper intends to give an overview of image steganography, its uses and techniques. It also attempts to identify the requirements of a good steganographic algorithm and briefly reflects on which steganographic techniques are more suitable for which applications.



Author(s):  
Muhammad Yaasir Khodabacchus

In our global community, the Internet, the issue of copyright is increasing. The International Maritime Bureau (IMB) reported over thousands of incidents this year compared to three hundred only ten years ago. Although laws and other ways have been intended to protect the rights of content developers and describe restrictions that can be placed on copying materials, pirate users always find a way to breach the protection. Base on this fact, a new method has been implemented using biometrics as it is described in the following chapters. This paper was developed taking into consideration one of the most widely used biometrics which is the fingerprint. Precisely, the aim of the system includes embedding the fingerprint into an audio file which can only be read using the fingerprint of the registered user.



2017 ◽  
Vol 19 (1) ◽  
pp. 39-53 ◽  
Author(s):  
Julianne Webster ◽  
Jacqueline M Drew

Advance fee fraud (AFF) involves an offender using deceit to obtain a financial gain from the victim. The victim believes that by forwarding a sum of money, there will be a future ‘pay-off’. The most commonly witnessed forms of AFF perpetrated via the Internet include classic ‘Nigerian’ or ‘419’ scams, investment fraud and romance fraud. Because of the largely transnational nature of AFF offending, where the victim and offender typically reside in different parts of the world, police are adapting their traditional and reactive approaches to more innovative strategies to combat this crime more effectively. This article utilises a qualitative, semi-structured interview design to explore the experiences of police detectives involved in the implementation of an early intervention model with victims of AFF. The study highlights the challenges involved in developing effective police strategies to proactively reduce the duration and severity of this type of financial victimisation.



2021 ◽  
Vol 2021 ◽  
pp. 1-14
Author(s):  
Xinliang Bi ◽  
Xiaoyuan Yang ◽  
Chao Wang ◽  
Jia Liu

Steganography is a technique for publicly transmitting secret information through a cover. Most of the existing steganography algorithms are based on modifying the cover image, generating a stego image that is very similar to the cover image but has different pixel values, or establishing a mapping relationship between the stego image and the secret message. Attackers will discover the existence of secret communications from these modifications or differences. In order to solve this problem, we propose a steganography algorithm ISTNet based on image style transfer, which can convert a cover image into another stego image with a completely different style. We have improved the decoder so that the secret image features can be fused with style features in a variety of sizes to improve the accuracy of secret image extraction. The algorithm has the functions of image steganography and image style transfer at the same time, and the images it generates are both stego images and stylized images. Attackers will pay more attention to the style transfer side of the algorithm, but it is difficult to find the steganography side. Experiments show that our algorithm effectively increases the steganography capacity from 0.06 bpp to 8 bpp, and the generated stylized images are not significantly different from the stylized images on the Internet.



Sensors ◽  
2021 ◽  
Vol 21 (23) ◽  
pp. 8037
Author(s):  
Diego Fernando Cabrera-Castellanos ◽  
Alejandro Aragón-Zavala ◽  
Gerardo Castañón-Ávila

Access to broadband communications in different parts of the world has become a priority for some governments and regulatory authorities around the world in recent years. Building new digital roads and pursuing a connected society includes looking for easier access to the internet. In general, not all areas where people congregate are fully covered, especially in rural zones, thus restricting access to data communications and inducing inequality. In the present review article, we have comprehensively surveyed the use of three platforms to deliver broadband services to such remote and low-income areas, and they are proposed as follows: unmanned aerial vehicles (UAV), altitude platforms (AP), and low-Earth orbit (LEO) satellites. These novel strategies support the connected and accessible world hypothesis. Hence, UAVs are considered a noteworthy solution since their efficient maneuverability can solve rural coverage issues or not-spots.



Sign in / Sign up

Export Citation Format

Share Document