scholarly journals INDIRECT INFORMATION HIDING TECHNOLOGY ON A MULTIADIC BASIS

Author(s):  
Volodymyr Barannik ◽  
Natalia Barannik ◽  
Oleksandr Slobodyanyuk

It is shown that the current direction of increasing the safety of information resources when transmitting information in info-communication systems is the use of methods of steganographic instruction in video imagery. The effectiveness of such methods is significantly increased when used in a complex of methods of concealment, which are based on the principles of inconsistent and cosmic communication. At the same time, existing methods of steganographic are used in the process of insertion of information mainly only laws, empty features of visual perception of video images. So, it is justified that the scientific and applied problem, which is to increase the density of embedded messages in the video container with a given level of their reliability, is relevant. The solution of this problem is based on the solution of the contradiction, which concerns the fact that increasing the density of embedded data leads to a decrease in the bit rate of the video container, steganalysis stability, reliability of special information, and video container. Therefore, the research aims to develop a methodology for the steganographic embedding of information, taking into account the regularities of the video container, which are generated by its structural and structural-statistical features. The solution to the posed problem of applying steganographic transformations is proposed to be realised by methods of indirectly embedding parts of the hidden message in certain conditions or functional relationships. The possibility of creating steganographic transformations regarding the indirect embedding and extraction of hidden information in a multiadic basis by modifying the underlying basis system within an admissible set is demonstrated. It is shown that the multiadic system, which is created in the spectral space of DCT transforms, has the potential to form a set of admissible modifications of basis systems.

2020 ◽  
Vol 5 (2) ◽  
pp. 291-303
Author(s):  
Edward Jonathan Turpie

This project aims to discuss drawing as a method of bridging the void between digital imaging technologies and physical drawing in the fine art domain. It does so by investigating the role of drawing and printing in contemporary portraiture. Drawn and printed silkscreen portraits are made from a synthesis of graphite marks, digital pixels and water-based ink deposited on paper surfaces. The practice-led research described here explores the materiality of the emergent image when drawing is impressed on an electronic media trace. This investigation is timely in the context of the unprecedented impact of digital technologies on contemporary culture that tend to displace the physicality of drawing. By taking an approach to portraiture whereby artist and sitter do not meet in person, the project initiates a portrait of Ed Ruscha using the medium of video images. Digital electronic images held pixel by pixel in smartphone camera and computer hard disks are interpreted into physical drawing environments to make an expressive representation of a human form. Tactile gestural mark-making is contrasted with electronic imaging to create a pensive image where techniques are blended. The process and methodology are described, and the artistic outputs are shared across the globe through digital and analogue communication systems.


2020 ◽  
Vol 2020 (1) ◽  
Author(s):  
Qiang Liu ◽  
Xuyu Xiang ◽  
Jiaohua Qin ◽  
Yun Tan ◽  
Yao Qiu

Abstract Since the concept of coverless information hiding was proposed, it has been greatly developed due to its effectiveness of resisting the steganographic tools. Most existing coverless image steganography (CIS) methods achieve excellent robustness under non-geometric attacks. However, they do not perform well under some geometric attacks. Towards this goal, a CIS algorithm based on DenseNet feature mapping is proposed. Deep learning is introduced to extract high-dimensional CNN features which are mapped into hash sequences. For the sender, a binary tree hash index is built to accelerate index speed of searching hidden information and DenseNet hash sequence, and then, all matched images are sent. For the receiver, the secret information can be recovered successfully by calculating the DenseNet hash sequence of the cover image. During the whole steganography process, the cover images remain unchanged. Experimental results and analysis show that the proposed scheme has better robust compared with the state-of-the-art methods under geometric attacks.


1994 ◽  
Vol 04 (04) ◽  
pp. 959-977 ◽  
Author(s):  
KEVIN M. SHORT

This work tests the level of security in secure communication systems based on nonlinear dynamics (NLD), or chaos. In these systems, a chaotic carrier signal is used in a type of spread-spectrum signaling system, with the added benefit that the hidden information signal is buried at something of the order of −30 dB with respect to the chaotic carrier. To investigate the level of security in such systems, an examination was conducted on a test set of chaotic carriers and hidden information signals prepared by the NLD research group at the Naval Research Lab. The hidden signals included a triangle wave, a period doubled signal, and a chaotic signal that was different from the chaotic carrier. The analysis process was to use NLD forecasting to predict the carrier dynamics, and then subtract away the predicted values to reveal the hidden signal or at least increase its signal-to-noise ratio with respect to the carrier. In each case, it was a simple task to determine the power spectrum of the hidden signal once the prediction of the carrier was removed. This was then used to create a “comb” filter to extract the correct frequencies from the FFT of the first two signals. When this was done, the hidden signals were recreated with almost perfect accuracy. In the third case, the hidden chaotic signal had a broadband component, so the spectrum was used to develop a Weiner filter which enabled the hidden signal to be reconstructed with only moderate accuracy, where the overall structure of the hidden chaotic signal was preserved, but the fine structure was lost. As a further test, the processing approach was applied to a voice signal hidden in one-dimensional Lorenz data at −35 dB. After subtracting away the carrier model, the voice signal was reconstructed with reasonable accuracy, and had the same characteristic structure. In this case, no secondary filtering was applied. The forecasting approach was then extended to allow for dynamic signal estimation using threshold detection, so that whenever a signal was detected, multiple predictions of the carrier behavior were made into the future. This was tested on a square wave embedded at −42 dB in Lorenz data. The extended approach was able to reveal the square wave with almost perfect precision, except in a few regions where it temporarily lost synchrony with the carrier. This allowed for the elimination of the secondary filtering requirement entirely. The final conclusion is that the secure communications systems based on chaotic carriers may be useful to increase privacy, but are not yet capable of providing a high level of security. The paper concludes with a discussion of measures which may be taken to improve the security of such systems so that they may be applicable to areas where higher security is required.


2021 ◽  
Vol 2021 (1) ◽  
Author(s):  
Zuwei Tian ◽  
Hengfu Yang

AbstractPE (portable executable) file has the characteristics of diversity, uncertainty of file size, complexity of file structure, and singleness of file format, which make it easy to be a carrier of information hiding, especially for that of large hiding capacity. This paper proposes an information-hiding algorithm based on PE file function migration, which utilizes disassembly engine to disassemble code section of PE file, processes function recognition, and shifts the whole codes of system or user-defined functions to the last section of PE file. Then it hides information in the original code space. The hidden information is combined with the main functions of the PE file, and the hidden information is coupled with the key codes of the program, which further enhances the concealment performance and anti-attack capability of the system.


Author(s):  
Balaji Jayaraman ◽  
S. M. Abdullah Al-Mamun ◽  
Chen Lu

Sparse recovery of fluid flows using data-driven proper orthogonal decomposition (POD) basis is systematically explored in this work. Fluid flows are manifestations of nonlinear multiscale PDE dynamical systems with inherent scale separation that impact the system dimensionality. Given that sparse reconstruction is inherently an ill-posed problem, the most successful approaches require the knowledge of the underlying basis space spanning the manifold in which the system resides. In this study, we employ an approach that learns basis from singular value decomposition (SVD) of training data to reconstruct sparsely sensed information. This results in a set of four control parameters for sparse recovery, namely, the choice of basis, system dimension required for sufficiently accurate reconstruction, sensor budget and their placement. The choice of control parameters implicitly determines the choice of algorithm as either $l_2$ minimization reconstruction or sparsity promoting $l_1$ norm minimization reconstruction. In this work, we systematically explore the implications of these control parameters on reconstruction accuracy so that practical recommendations can be identified. We observe that greedy-smart sensor placement provides the best balance of computational complexity and robust reconstruction for marginally oversampled cases which happens to be the most challenging regime in the explored parameter design space.


Author(s):  
Ali Mohammed Ahmed ◽  
Ibrahim Mahmood Rashid

The ability to hide plays a vital role in effective secret communication. This is achieved by hiding information (Steganography). The science of concealing information is the science of concealing information in other information so that it appears that hidden information is not something to the human eye. There are many ways to hide information within an image, audio / video, document, etc. But hiding information in pictures has its own characteristics and is the most popular among others. This paper provides a review of several methods, such as image field and conversion field algorithms available to implement image information hiding (Steganography). In this paper, high-capacity information hidings schemes are analyzed for different file formats. Secret communication is done before Password encryption to protect information. The intended recipient will decrypt the information using this password.


2019 ◽  
Vol 4(59) ◽  
pp. 5-13
Author(s):  
Volodymyr Barannik ◽  
◽  
Anton Sorokun ◽  
Yurii Babenko ◽  
Oleksandr Yakovenko ◽  
...  

Author(s):  
Masharipov Otaboy Matyoqubovich, Et. al.

The article describes the methodology of weighted modelling to increase the reliability of redundant fibre-optic communication systems. In a specific example, a network graph of a many-node fibre-optic communication system is considered. Applying general ideas to determine the reliability characteristics of systems consisting of a large number of different types of elements with different functional relationships between them is quite a difficult task. The materials presented in this article are intended to solve this problem. Along with their relative simplicity, they are highly accurate. The numerical examples in this chapter show that the use of these methods for highly reliable systems can reduce the variance of the estimate by several orders of magnitude compared to the direct modelling method, and thus reduce the time required for calculations on electronic computers by several orders of magnitude. The purpose of the study is to increase the reliability of fibre-optic communication systems. The research methodology is based on models with a limited number of monotonous failure chains, which is available for visual enumeration of the reliability of highly reliable systems. As a result, it is proposed to obtain an approximate formula for assessing the reliability of a highly reliable system, both by modelling and analytically, and calculations using it can be performed using the quadrature method or moment methods. This allows you to build a model according to the block principle, including full-scale blocks or records of the results of their tests, simplifies the interpretation of the results, and creates convenience in software implementation.


Author(s):  
MIAO QI ◽  
JUN KONG ◽  
YINGHUA LU ◽  
NING DU ◽  
ZHIQIANG MA

Recently, the use of information hiding techniques to protect biometric data has been an active topic. This paper proposes a novel image hiding approach based on correlation analysis to protect network-based transmitted biometric image for identification. Firstly, the correlation between the biometric image and the cover image is analyzed using principal component analysis (PCA) and genetic algorithm (GA). The purpose of correlation analysis is to enable the cover image to represent the secret image in content as much as possible, not just as a carrier of hidden information. Then, the unrepresented part of the biometric image, as the secret image, is encrypted and hidden into the middle-significant-bit plane (MSB) of the cover image redundantly. Extensive experimental results demonstrate that the proposed hiding approach not only gains good imperceptibility, but also resists some common attacks validated by the biometric identification accuracy.


2018 ◽  
Vol 47 (32) ◽  
pp. 11264-11271 ◽  
Author(s):  
Mengxiao Li ◽  
Yu Feng ◽  
Qingyong Tian ◽  
Weijing Yao ◽  
Li Liu ◽  
...  

Different information could be hidden and read under 365 nm and 254 nm light excitation, respectively. Moreover, the hidden information still can be identified after being exposed to an ambient environment for as long as 90 days.


Sign in / Sign up

Export Citation Format

Share Document