scholarly journals Implementation Of Encryption And Hidden Data Using Tiny Encryption Algorithm And End Of File

2021 ◽  
Vol 10 (3) ◽  
pp. 93-98
Author(s):  
Muhammad Alfian

Security and confidentiality of data is one important aspect of an information system. The information can be misused very large losses in high-profile cases such as vital information confidential corporate, customer data banks and etc. Information security solutions in one of them can be used with cryptography. Cryptographic algorithms used in this study is a tiny encryption algorithm. Cryptographic data security attacks can always wear can occur, with this in mind the authors added security techniques to perform data hiding with the media as a placeholder, this term is called steganography. Steganography is used in this study is the end of the file. These techniques make the process of data hiding which is located at the end of the image, so it does not affect the image quality of the reservoir. In this study, a system built using microsoft visual studio 2010 C#. This system can work well, but has a color image blur caused to the container caused by the inserted message, where the greater the size of the message was inserted then color the image blur that arises will be many more.

2018 ◽  
Vol 64 (6) ◽  
pp. 536-544 ◽  
Author(s):  
Niall McTernan ◽  
Ailbhe Spillane ◽  
Grace Cully ◽  
Eimear Cusack ◽  
Theresa O’Reilly ◽  
...  

Background: International research consistently shows evidence for an association between sensationalised and detailed media reporting, and suicidal behaviour. Aim: This study examined the quality of media reporting of suicide and adherence to media guidelines in Ireland. Methods: In accordance with the criteria outlined in the media guidelines for reporting suicide, 243 media articles were screened and analysed for quality of reporting of two high-profile cases of suicide and two cases of suicide that became high profile following a period of intense media coverage that occurred between September 2009 and December 2012. Results: A minority of articles breached the media guidelines in relation to sensationalised language (11.8%), placement of reports on the front page of the newspaper (9.5%), publishing of inappropriate photographs (4.2%) and mention of location of suicide (2.4%), while no articles disclosed the contents of a suicide note. However, in the majority of articles analysed, journalists did not refer to appropriate support services for people vulnerable to, and at risk of suicide (75.8%) or mention wider issues that are related to suicidal behaviour (53.8%). Overemphasis of community grief (48.3%) was also common. Nearly all articles (99.2%) breached at least one guideline and 58.9% of articles breached three or more guidelines. Conclusion: Overall, adherence to media guidelines on reporting suicide in Ireland improved in certain key areas from September 2009 until December 2012. Nonetheless, important challenges remain. Increased monitoring by media monitoring agencies, regulators and government departments is required. Implementation should be conducted using a pro-active approach and form part of the curriculum of journalists and editors. The inclusion of guidelines for the reporting of suicidal behaviour in press codes of conduct for journalists warrants consideration.


2012 ◽  
Vol 182-183 ◽  
pp. 1900-1903
Author(s):  
Hai Sheng Chen ◽  
Bao Lin Tang ◽  
Guang Xue Chen ◽  
Shuang Shuang Wen

In the publishing and printing applications, hidden data is embedded into images for copyright protection and ownership generally. In this paper, a reasonable data hiding method based on noise-balanced error diffusion (NBEDF) is proposed, which is applied in color halftone image. Color image is firstly separated into grayscale images from RGB color space to CMYK color space. Secondly, Floyd-Steinberg error diffusion operator is used, and halftone images will be obtained. Finally,through NBEDF, hidden data is embedded in the halftone image which contains the largest amount of information. The experimental results show that hidden information can be visible , when the corresponding decoded image overlays the color image with hidden information. The data hiding method proposed in this paper can be well applied on security printing.


2021 ◽  
Vol 11 (8) ◽  
pp. 3418
Author(s):  
Cheonshik Kim ◽  
Dongkyoo Shin ◽  
Chingnung Yang ◽  
Lu Leng

Image compression technology and copyright protection are certainly the important technologies for free exchange of multimedia. For compression of an image, we propose a color Absolute Moment Block Trucation Coding (AMBTC) method using a common bit-plane created by k-means. In addition, a data hiding method based on a color AMBTC using Optimal Pixel Adjustment Process (OPAP) was proposed for copyright protection and confidential secret communication. The number of quantization levels of the proposed color AMBTC is nine per block. Therefore, the edge of the compressed color image can be expressed more delicately. As a result of the simulation, it can be seen that the edge of the image of the color AMBTC is close to the original image. Moreover, the data hiding performance of the proposed method also obtained excellent results. For the experiment, we measured the quality of the image using the Color Difference (CD) we proposed, and the measurement result was very satisfactory.


Author(s):  
Mohammad Rasoul PourArian ◽  
Ali Hanani

<p>Steganography is a method which can put data into a media without a tangible impact on the cover media. In addition, the hidden data can be extracted with minimal differences. In this paper, two-dimensional discrete wavelet transform is used for steganography in 24-bit color images. This steganography is of blind type that has no need for original images to extract the secret image. In this algorithm, by the help of a structural similarity (SSIM) and a two-dimensional correlation coefficient, it is tried to select part of sub-band cover image instead of embedding location. These sub-bands are obtained by 3-levels of applying the DWT. Also to increase the steganography resistance against cropping or insert visible watermark, two channels of color image is used simultaneously. In order to raise the security, an encryption algorithm based on Arnold transform was also added to the steganography operation. </p>


2011 ◽  
Vol 8 (3) ◽  
pp. 840-848
Author(s):  
Baghdad Science Journal

Data hiding is the process of encoding extra information in an image by making small modification to its pixels. To be practical, the hidden data must be perceptually invisible yet robust to common signal processing operations. This paper introduces a scheme for hiding a signature image that could be as much as 25% of the host image data and hence could be used both in digital watermarking as well as image/data hiding. The proposed algorithm uses orthogonal discrete wavelet transforms with two zero moments and with improved time localization called discrete slantlet transform for both host and signature image. A scaling factor ? in frequency domain control the quality of the watermarked images. Experimental results of signature image recovery after applying JPEG coding to the watermarking image are included.


2007 ◽  
Vol 20 (1) ◽  
pp. 71-83 ◽  
Author(s):  
Sang-Gyu Cho ◽  
Zoran Bojkovic ◽  
Dragorad Milovanovic ◽  
Jungsik Lee ◽  
Jae-Jeong Hwang

The objective of this work is to provide image quality evaluation for intra-only H.264/AVC High Profile (HP) standard versus JPEG2000 standard. Here, we review the structure of the two standards and the coding algorithms in the context of subjective and objective assessments. Simulations were performed on a test set of monochrome and color image. As a result of simulations, we observed that the subjective and objective image quality of H.264/AVC is superior to JPEG2000, except the blocking artifact which is inherent, since it consists of block transform rather than whole image transform. Thus, we propose a unified measurement system to properly define image quality.


Author(s):  
Mauro Barni ◽  
Franco Bartolini ◽  
Alessia De Rosa

The idea of embedding some information within a digital media, in such a way that the inserted data are intrinsically part of the media itself, has aroused a considerable interest in different fields. One of the more examined issues is the possibility of hiding the highest possible amount of information without affecting the visual quality of the host data. For such a purpose, the understanding of the mechanisms underlying human vision is a mandatory requirement. Hence, the main phenomena regulating the human Vvisual system will be firstly discussed and their exploitation in a data hiding system will be then considered.


2005 ◽  
pp. 48-74
Author(s):  
Mauro Barni ◽  
Franco Bartolini ◽  
Alessia De Rosa

The idea of embedding some information within a digital media, in such a way that the inserted data are intrinsically part of the media itself, has aroused a considerable interest in different fields. One of the more examined issues is the possibility of hiding the highest possible amount of information without affecting the visual quality of the host data. For such a purpose, the understanding of the mechanisms underlying Human Vision is a mandatory requirement. Hence, the main phenomena regulating the Human Visual System will be firstly discussed and their exploitation in a data hiding system will be then considered.


2018 ◽  
Vol 7 (2.24) ◽  
pp. 239
Author(s):  
K Dhanasekaran ◽  
P Anandan ◽  
A Manju

Securing and transmitting data through images without being hacked is important in stegnography. Identification of the hidden data without the knowledge of appropriate algorithm is beyond bounds. In this paper we propose a highly secure algorithm for hiding data using advanced encryption algorithm, wherein the hidden data could be identified by canny edge detection and appropriate hash algorithm method. Color images are converted into grayscale images and edges are retrieved and honey encryption algorithm is used for encoding and decoding process. Simulated results in Matlab exhibits high security of the proposed method over other methods on comparison.  


CCIT Journal ◽  
2014 ◽  
Vol 7 (3) ◽  
pp. 420-436
Author(s):  
Dewi Immaniar ◽  
Sudaryono Sudaryono ◽  
Ayu Ningrum

Talk about retail business can not be separated from the importance of service to consumers and good quality goods . But at the present time due to intense competition in the business world , the service and quality of goods is not enough to be able to increase revenue and attract customers loyal . This makes companies think hard to survive and stable in the business . One of them is by using a media campaign in this regard more toward print or visual media is indirectly felt the value of their effectiveness in communicating product marketing programs . PT . Times Prima Indonesia is a company engaged in the retail book with the name of the Times bookstores . Based on the analysis of the company’s problems requires additional media types supporting more varied and creatif promotion of existing ones, which will be used as a complement and a media campaign as well as to enrich the data renewal campaign design to capture the interest of consumers in which one form of the media campaign is shaped merchandise . Therefore , do Enriching ( enrich ) media campaign merchandise before it is less varied and has not formed a company image . The methodology used is the analysis, observation and design . Besides the new design has been tested with the implemented test duration for 6 months, and greatly increases the perceived contribution , this is evidenced by the chart sales increasing each month.


Sign in / Sign up

Export Citation Format

Share Document