scholarly journals Difference of Watermarking & Steganography

In the current world, the sensitive data are being transferred from source to destination in a much secured way in a common internet is inexorable. There are various technological aspects involved among the data world to protect the sensitive information or data hiding. Watermarking and Steganography are such important techniques which plays a prominent role in such data hiding. Earlier various techniques are been widely used like finger printing, Cryptography for encryption and decryption etc. But in the recent days the Digital Watermarking and Steganography are two range of techniques in such information hiding in a covered or secret way embedding to any host data which can be extracted with proper algorithms after the receiver receives the information. The combination of all these techniques can also bring a change in the internet industry. The information can be concealed and send across in a platform to the receiver with all these hidden techniques whereas the receiver of the data also need to know on the extraction techniques so that the information is been securely sent and received in a two-way communication. This paper deals about the comparing the common factors or attributes among the Watermarking and Steganography techniques.

The growth rate of the Internet is exceeding that of any previous technology. As the Internet has become the major medium for transferring sensitive information, the security of the transferred message has now become the utmost priority. To ensure the security of the transmitted data, Image steganography has emerged out as an eminent tool of information hiding. The frequency of availability of image file is high and provides high capacity. In this paper, a method of secure data hiding in image is proposed that uses knight tour positions and further 8-queen positions in 8*8 pixel blocks.The cover image is divided into 8*8 pixel blocks and pixels are selected from each block corresponding to the positions of Knight in 8*8 chessboard starting from different pixel positions. 8-pixel values are selected from alternate knight position. Selected pixels values converted to 8-bit ASCII code and result in 8* 8 bit matrix. 8-Queen’s solution on 8*8 chessboard is applied on 8*8 bit matrix. The bits selected from 8-Queens positions and compared with 8-bit ASCII code of message characters. The proposed algorithm changes the LSB of only some of the pixels based on the above comparison. Based on parameters like PSNR and MSE the efficiency of the method is checked after implementation. Then the comparison done with some already proposed techniques. This is how, image steganography showed interesting and promising results when compared with other techniques.


2021 ◽  
Vol 27 (7) ◽  
pp. 650-666
Author(s):  
Xabier Larrucea ◽  
Micha Moffie ◽  
Dan Mor

Since the emergence of GDPR, several industries and sectors are setting informatics solutions for fulfilling these rules. The Health sector is considered a critical sector within the Industry 4.0 because it manages sensitive data, and National Health Services are responsible for managing patients’ data. European NHS are converging to a connected system allowing the exchange of sensitive information cross different countries. This paper defines and implements a set of tools for extending the reference architectural model industry 4.0 for the healthcare sector, which are used for enhancing GDPR compliance. These tools are dealing with data sensitivity and data hiding tools A case study illustrates the use of these tools and how they are integrated with the reference architectural model.


Data Encryption, in the present time, is used to deter malicious parties from accessing sensitive data, allowing the access to only authorized parties as it uses the key to safeguard the sensitive information to be transferred. Various cryptography techniques are used to maintain confidentiality and integrity of the data, and this paper proposes the hybrid scheme of using four layers of encryption including steganography to safeguard the authenticity of the information to be transferred. In this paper, three conventional key cryptography algorithms, which are Fibonacci series, XOR cipher and PN sequence encryption, are used along with RSA cryptography which is a public key cryptography algorithm. In addition to it, steganography technique is also used in the last two layers of our proposed model. Firstly, the whole of the encrypted string, obtained after the above cryptography algorithms, is hidden inside the first image. Now this encrypted host image is further hidden inside another image by using one bit LSB algorithm. This model offers the double security of the data as here the data is not only encrypted but also hidden in an image which again is hidden inside another image making it very hard even to detect the data.


2017 ◽  
Vol 10 (1) ◽  
pp. 24-32
Author(s):  
Mamta Padole ◽  
Pratik Kanani

Encryption, itself doesn’t prevent interception, but denies the message content to the interceptor. For technical reasons, an encryption scheme usually uses a pseudo-random encryption key generated by an algorithm. It is impossible to decrypt the message without possessing the key, but, for a well-designed encryption scheme, large computational resources and skills are required to decrypt it. An authorized recipient can easily decrypt the message with the key provided by the originator to recipients, but not to unauthorized interceptors. Data hiding is the skill of hiding messages in such a ways the only the sender and the receiver of the message knows that the message has been hidden. In the context of secured information transmission and reception, efficient techniques for data encryption and decryption are very much essential. In this paper, a message transfer application is developed which mainly focusses on secret message transfer between two parties. Used scheme not only focusses on text but also the encryption of images and videos. A unique algorithm i-Se4GE is used for the transfer of keys required for the encryption and decryption of messages. This algorithm makes use of a set of random numbers, timestamp of the two users, a set of public keys and dynamic keys. The algorithm uses a two-step authentication request-reply process which provides it a double layer security.


2020 ◽  
Vol 8 (6) ◽  
pp. 5334-5337

In recent times, most the people are using internet where they are going to share sensitive information with other individual or with an organization like hospital, banking sector or business companies. So such huge amount of information will be stored on cloud. The attackers may try to hack the sensitive data and will try to misuse that data. So here the security for data comes first. There are numerous methods available to provide security for the data that is being shared among individuals or organizations. Most of the organizations take enough precautions to secure data that is shared with third party organizations. In recent times providing privacy for the sensitive data is high priority. The objective of this research is to discover the various data masking solutions for different applications for providing security to the data. Established data privacy method like AES or DES encryption technique proves to be proficient but time consuming. In order to avoid time consumption and to provide privacy for the data being shared, this paper proposes a information hiding method based on format-preserving encryption for sensitive data. This method will masquerade only sensitive data and make sure the encrypted data is still in the original format where it doesn’t consume much memory space. Organization like hospitals or banking sector or any business companies can use this format-preserving method to enhance the security of the data being shared. Tested the information on Spark illustrate that information hiding method based on format-preserving encryption can provide data privacy for sensitive data and preserve data format.


At present Cloud computing is a very successful paradigm for data computing and storage. It Increases the concerns about data security and privacy in the cloud. Paper covers cloud security and privacy research, while focusing on the works that protect data confidentiality and privacy for sensitive data being stored and queried in the cloud. As Survey enlist all the research carried out related to data security and users privacy preserving techniques in detail. Data sharing can be achieved with sensitive information hiding with remote data integrity auditing, propose a new concept called identity based shared data integrity auditing with sensitive information hiding for secure cloud storage. Initially every data would be outsourced to the cloud only after authorized or activated by the proxy. The key would be generated to the file randomly by the key generation Centre. The transaction details such as key mismatch, file upload and download, hacking details would be shown to the proxy and cloud server. If the match occurs, automatically file would be recovered by the user even if hacker access or tamper the file. The main motive is to ensure that when the cloud properly stores the user’s sanitized data, the proof it generates can pass the verification of the third party auditor. And the paper provides various research work done in the field


Author(s):  
Wen-Xiu Ma

Abstract We analyze N-soliton solutions and explore the Hirota N-soliton conditions for scalar (1 + 1)-dimensional equations, within the Hirota bilinear formulation. An algorithm to verify the Hirota conditions is proposed by factoring out common factors out of the Hirota function in N wave vectors and comparing degrees of the involved polynomials containing the common factors. Applications to a class of generalized KdV equations and a class of generalized higher-order KdV equations are made, together with all proofs of the existence of N-soliton solutions to all equations in two classes.


Mathematics ◽  
2021 ◽  
Vol 9 (8) ◽  
pp. 883
Author(s):  
Yaqing Liu ◽  
Hongbing Ouyang ◽  
Xiaolu Wei

The existing spatial panel structural vector auto-regressive model can effectively capture the time and spatial dynamic dependence of endogenous variables. However, the hypothesis that the common factors have the same effect for all spatial units is unreasonable. Therefore, incorporating time effects, spatial effects, and time-individual effects, this paper develops a more general spatial panel structural vector autoregressive model with interactive effects (ISpSVAR) that can reflect the different effects of common factors on different spatial units. Additionally, based on whether or not the common factors can be observed, this paper proposes procedures to estimate ISpSVAR separately and studies the finite sample properties of estimators by Monte Carlo simulation. The simulation results show the effectiveness of the proposed ISpSVAR model and its estimation procedures.


Sign in / Sign up

Export Citation Format

Share Document