An Secret Communication-oriented High Capacity Information Hiding Scheme Based on Cl Multi-wavelet and Combination Bit Plane

2013 ◽  
Vol 12 (14) ◽  
pp. 2697-2702
Author(s):  
Tao Zhang ◽  
Yong-Feng Ju ◽  
Shuai Ren ◽  
Jing-Xiang Lei
Author(s):  
Ali Mohammed Ahmed ◽  
Ibrahim Mahmood Rashid

The ability to hide plays a vital role in effective secret communication. This is achieved by hiding information (Steganography). The science of concealing information is the science of concealing information in other information so that it appears that hidden information is not something to the human eye. There are many ways to hide information within an image, audio / video, document, etc. But hiding information in pictures has its own characteristics and is the most popular among others. This paper provides a review of several methods, such as image field and conversion field algorithms available to implement image information hiding (Steganography). In this paper, high-capacity information hidings schemes are analyzed for different file formats. Secret communication is done before Password encryption to protect information. The intended recipient will decrypt the information using this password.


2021 ◽  
Vol 1802 (3) ◽  
pp. 032027
Author(s):  
Zhenjie Bao ◽  
Yadong Jin ◽  
Yue Liu ◽  
Jingyun Hu

The growth rate of the Internet is exceeding that of any previous technology. As the Internet has become the major medium for transferring sensitive information, the security of the transferred message has now become the utmost priority. To ensure the security of the transmitted data, Image steganography has emerged out as an eminent tool of information hiding. The frequency of availability of image file is high and provides high capacity. In this paper, a method of secure data hiding in image is proposed that uses knight tour positions and further 8-queen positions in 8*8 pixel blocks.The cover image is divided into 8*8 pixel blocks and pixels are selected from each block corresponding to the positions of Knight in 8*8 chessboard starting from different pixel positions. 8-pixel values are selected from alternate knight position. Selected pixels values converted to 8-bit ASCII code and result in 8* 8 bit matrix. 8-Queen’s solution on 8*8 chessboard is applied on 8*8 bit matrix. The bits selected from 8-Queens positions and compared with 8-bit ASCII code of message characters. The proposed algorithm changes the LSB of only some of the pixels based on the above comparison. Based on parameters like PSNR and MSE the efficiency of the method is checked after implementation. Then the comparison done with some already proposed techniques. This is how, image steganography showed interesting and promising results when compared with other techniques.


Author(s):  
Der-Chyuan Lou ◽  
Jiang-Lung Liu ◽  
Hao-Kuan Tso

Information-hiding technology is an ancient art and has existed for several centuries. In the past, messages could easily be intercepted because there was no technology of secret communication. Hence, a third party was able to read the message easily. This was all changed during 440 B.C., that is, the Greek Herod’s era. The Greek historian Herodotus in his writing of histories stated that Demaratus was the first person who used the technique of information hiding. Demaratus, a Greek who lived in Persia, smuggled a secret message to Sparta under the cover of wax. The main intent was to warn Sparta that Xerxes, king of Persia, was planning an invasion on Greece by using his great naval fleet. He knew it would be very difficult to send the message to Sparta without it being intercepted. Hence, he came up with the idea of using a wax tablet to hide the secret message. In order to hide the secret message, he removed all the wax from the tablet, leaving only the wood underneath. He then wrote the secret message into the wood and recovered the tablet with the wax. The wax covered his message to make the wax tablet look like a blank one. Demaratus’ message was hidden and never discovered by the Persians. Hence, the secret message was sent to Sparta successfully. Greece was able to defeat the invading Persians by using the secret message. Another example of information hiding was employed by another Greek named Histaiaeus. Histaiaeus wanted to instigate a revolt against the Persian king and had to deliver a secret message about the revolt to Persia. He came up with the shaved-head technique. Histaiaeus decided to shave the head of his most trusted slave and then tattooed the secret message on his bald scalp. When the hair grew back, the secret message was covered, and then Histaiaeus ordered the slave to leave for Persia. When the slave reached his destination, his head was shaved, showing the secret message to the intended recipient. Around 100 A.D., transparent inks made it into the secret field of information hiding. Pliny discovered that the milk of the thithymallus plant could easily be used as transparent ink. If a message was written with the milk, it would soon evaporate and left no residue. It seemed that the message was completely erased. But once the completely dried milk was heated, it would begin to char and turned to a brown color. Hence, the secret message could be written on anything that was not too flammable. The reason it turned brown was because the milk was loaded with carbon, and when carbon was heated, it tended to char. Information hiding became downfallen and won no respect until World Wars I and II. Invisible inks, such as milk, vinegar, fruit juices, and urine, were extensively used during the wars. All of them would darken when they were heated. The technology was quite simple and noticeable. Furthermore, World War II also brought about two inventions of new technologies. The first one was the invention of the microdot technology. The microdot technology was invented by the Germans to convey secret messages to their allies. The microdot was basically a highly detailed picture shrunk to about the size of a period or dot, which permitted hiding large amounts of data into the little microdot. By using a microscope, the hidden message would be revealed. The Germans would put their dots into their letters, and they were almost undetectable to the naked eye. The other technology was the use of open-coded messages. For open-coded messages, certain letters of each word were used to spell out the secret message. Open-coded messages used normal words and messages to write the buffer text that hid the message. Because they seemed normal, they often passed the check of security. For example, the following message was a common example of open-coded messages and was actually sent by a German spy during World War II. Apparently neutral’s protest is thoroughly discounted and ignored. Isman hard hit. Blockade issue affects pretext for embargo on by-products, ejecting suets and vegetable oils. By extracting the second letter in each word, the secret message was revealed: Pershing sails from NY June 1. This technique was effective because it could pass through the check of security and was easy for someone to decode (Johnson, Duric, & Jajodia, 2001; Katzenbeisser & Petitcolas, 2000; Schaefer, 2001). The technologies mentioned here are different ways of information hiding in different eras. With the development of computer technology, it is becoming hard for the third party to discover the secret message.


2017 ◽  
Vol 9 (2) ◽  
pp. 25-37 ◽  
Author(s):  
Juan Chen ◽  
Fei Peng ◽  
Jie Li ◽  
Min Long

With the wide application of 3D STL model in 3D printing, much attention has been paid to its content security and copyright protection. Based on entity rearrangement and bit mapping, a lossless and high capacity watermarking scheme is proposed for 3D STL model. Experimental results and analysis show that the average capacity is improved 0.71bits/facet compared with the original entity rearrangement method, and the capacity is 0.247 bits/entity larger than that of the optimal capacity of the standard entity rearrangement method. It can achieve good efficiency and it is robust against translation, rotation and even scaling. It has potential application in secret communication and copyright protection of 3D STL model.


IEEE Access ◽  
2019 ◽  
Vol 7 ◽  
pp. 62361-62371 ◽  
Author(s):  
Hao-Tian Wu ◽  
Zhiyuan Yang ◽  
Yiu-Ming Cheung ◽  
Lingling Xu ◽  
Shaohua Tang

Sign in / Sign up

Export Citation Format

Share Document