Image Data Compression. Introduc<on to watermarking and steganography
|
|
- Tyrone Chapman
- 5 years ago
- Views:
Transcription
1 Image Data Compression Introduc<on to watermarking and steganography 1
2 Examples and common terminology Example: watermarks (WMs) embedded in paper money ing Hidden from view (or non-obstruc<ng) in normal use Recovered via a special process (holding up to light) Contains informa<on related to object (bill authen<city) The presence of a watermark may be known to user Example: a secret wri;en with milk on top of a non-secret (cover, or decoy) le;er wri;en with ink Hidden is unrelated to the decoy leuer The presence of the hidden itself is secret (otherwise called overt embedded communica<on ) From Greek steganos = covered Steganographic communica<on ing of electronic signals: Work: a specific signal, such as an image, audio or video record (e.g., song in MP3) Content: set of all Works (e.g., all audio music) that may be WM ed Medium: means of represen<ng, transmi_ng or recording the content (e.g., a CD) Book on subject: Cover Work: original signal before modifica<on (called embedding) [Cox et al, 08] ing: impercep+bly altering a Work to embed a about that Work Steganography: undetectably altering a Work to embed a secret Steganalysis: detec<on whether secret steganographic communica<on is taking place 2
3 Categoriza8on of informa8on hiding Cover Work-dependent Cover Work-independent Existence of is hidden Covert watermarking Example: In 1981, M. Thatcher marked copies of secret documents with unique word spacing pauerns to find a cabinet minister who leaked informa<on. Steganography Example: SALT-II nuclear treaty described sensors on missile silos, repor<ng if a silo is occupied. Both USSR and USA inves<gated if sensors could transmit other informa<on. Existence of is known Overt watermarking Example: Web-sites of some museums provide high-quality digital images of the collec<on, with a warning that each image is watermarked to protect it against piracy or reproduc<on. Overt embedded communica<on Example: In late 1940s, a <me code at 800Hz frequency was embedded in radio broadcast. The code was inaudible, and only communicated the current <me to various automa<c devices. Cover Work Payload Embedder ed Work Stego Work Detector (Maybe) Detected payload 3
4 Possible uses of digital watermarking and steganography ing: Internet and high-capacity digital recording devices facilitate unauthorized copying Cryptography provides the protec<on in transit, but not aler delivery ing is a complement to cryptographic protec<on, never removed during use, may be designed to survive content transforma<ons (re-encoding, format changes, etc.) Steganography: Electronic communica<ons are suscep<ble to eavesdropping and interven<ons Security and privacy can be addressed by cryptographic tools, or by anonymous r ers However, encryp<on is not hidden, and the presence of the communica<on is obvious Steganography can be used also in cases when the encryp<on is prohibited Cryptanalysis aims to establish whether communica<on is taking place (e.g. to prevent criminal ac<vi<es or to iden<fy members of an organiza<on) Eve Alice Detect communica<on, auack the channel Covert communica<on Bob 4
5 Some specific applica8ons of digital watermarking Broadcast monitoring air <me verifica<on, re-broadcas<ng control, ads control ac<ve vs passive monitoring: index complexity reduc<on Owner iden<fica<on legal copyright no<ce, owner contact informa<on Proof of ownership key in central repository, digital nega<ve, asymmetric iden<fica<on of original / derived work Transac<on tracking (fingerprin<ng of copies) e.g. iden<fica<on of leaking party at Oscar Award previews Content authen<ca<on detec<on of tampering, localized [semi]fragile digital signature Copy / Record / Playback control e.g. DVD copy protec<on Device control copy preven<on marks, ads indicator, traffic info on FM radio Legacy enhancement digital signals transmiued over analog networks, lyrics in MP3 Desired WM properdes and characterisdcs: Impercep<bility: WM must not ruin the aesthe<cs of Cover Work Inseparability: WM cannot be removed by conver<ng, re-forma_ng, etc. Example of (rela<vely poor) watermarking as owner iden<fica<on: the complete Lena image and its (usually omiued) copyright no<ce 5
6 Quan8ta8ve metrics of watermarking systems Embedding effecdveness probability that output is iden<fied as watermarked immediately aler embedding (may be <100%) compromise between effec<veness and fidelity; determined analy<cally or with large DB of Works Fidelity how impercep<ble WM is in Work; perceptual similarity between original and watermarked Works (possibly aler addi<onal degrada<on of both due to delivery); based on some percep<ve model Robustness how well WM survives common signal processing opera<ons: spa<al / temporal filtering, lossy compression, prin<ng / scanning, geometric distor<ons etc. Data payload number of bits a watermark encodes per unit of <me or per Work; N-bit WM encodes 2 N +1 possible detector outputs (one bit always encodes very presence of WM) Blind [public] or informed [private] detecdon whether original Work is needed for successful detec<on False posidve rate probability to erroneously detect a missing WM per detector run (fixed Work, random WMs) Security ability to resist hos<le auacks, such as unauthorized removal (elimina<on, masking, collusion) / embedding (forgery) = ac<ve auacks, unauthorized detec<on = passive auack Use of secret watermark key (similar to cipher key) Cost deployment of embedders / detectors, computa<onal load, real-<me requirements etc. 6
7 Proper8es of steganographic and steganaly8c systems Recall the primary goal of steganography: conceal the fact that the covert communica<on is present within innocuous communica<on ProperDes of a WM system irrelevant for steganography: Embedding effecdveness: N/A, due to freedom to choose a suitable Cover Work Fidelity: N/A, since the steganalyzing party normally has no access to the original Work Blind / informed extracdon: N/A, one usually assumes that the original Work is not available Robustness: N/A, noise etc. not a big issue for modern digital communica<on ProperDes important for steganography: Embedding capacity: maximum theore<cally possible number of embedded bits Steganographic capacity: max payload hidden without ar<facts, so that the detec<on is improbable Embedding efficiency: number of embedded bits per unit of distor<on Robustness against system / blind / targeted steganalysis Based on method weakness (implementa<on fault, insufficient stego keyspace), sta<s<cal proper<es common to all methods, detectability of s embedded with a specific method. StaDsDcal undetectability Is it hard to no<ce the presence of a? Usually (loosely) quan<fied in terms of sta<s<cal anomalies, based on some sta<s<cal model of relevant Works. False alarm rate: tradeoffs characterized with Receiver Opera<ng Characteris<c (ROC) curves Security: resistance to passive (observa<on), ac<ve (obstruc<on), malicious (impersona<on) auacks Use of stego keys Algorithm is assumed known, embedding is controlled by a secret key. Schemes can be symmetric or asymmetric; as a rule, key length does not influence the security as much as the length of crypto keys 7
8 Small digression: communica8on systems Reminder: generic image compression + communicadon system Source Sink Remove irrelevance Remove redundancy Transform Inject missing irrelevant informa<on (based on assump<ons/models) Inverse transform Simple communicadon system: Input m TransmiUed signal: Channel encoder x Lossless coding Decoding n + x = {x 1, x 2,..., x N }, Noise Simplest channel: addi<ve white Gaussian noise, y Codec Channel Channel coding Modula<on Channel Demodula<on Error correc<on Channel decoder Inject channel-adjusted redundant informa<on (error protec<on) Exploit, remove injected redundancy Output x 2 i p i y = x + n, n ~ N( 0,σ 2 ) m n Goal: maximize likelihood that the detected is iden<cal to the original 8
9 Secure communica8on systems CommunicaDon with encrypdon: Input m Noise Channel Channel Encryptor + encoder Decryptor decoder Encryp<on key x n y Decryp<on key Output m n CommunicaDon with key-based channel coding: Input m Encoding key Channel encoder x n + Noise y Goal: secrecy of s, messaging layer. Example: RSA encryp<on Channel decoder Decoding key Output m n Goal: guaranteed delivery of signals, transport layer. Example: spread-spectrum radio 9
10 Communica8on-based models of watermarking ing with a simple informed detector: Input m embedder key encoder w a Original cover work + c o c w n + Noise c wn co detector + - wn Original cover work decoder key Output m n Message mapped to added pa4ern w a (could be via intermediate pa4ern w m ) w a is added to cover work w o to produce watermarked work c w (i.e. blind embedder: ignores proper<es of cover work) Further processing adds noise n (could be more complex: compression, auacks etc.) If original work is subtracted, then the communica<on process is iden<cal to simple communica<on model with addi<ve noise 10
11 Communica8on-based models of watermarking ing with a blind detector: Input m embedder key encoder w a Original cover work + c o c w n + Noise c wn detector decoder key Output m n In blind detector, cover work is just another kind of noise One goal: maximize similarity between the input and output s Another possible goal: learn how exactly watermarked work was processed 11
12 Simple WM system: blind embedding, correla8on detector Embed 1-bit m: c = co + α ( 2m 1) wr m=1 m=0 +α ( 2m 1) cover work = reference pauern Detect via linear correladon (scalar product): 1 1 zlc (c, wr ) = c wr = c[x, y] wr [x, y] N N x,y Effect from noise: c = co ± α wr + n, zlc (c, wr ) = zlc (co, wr ) + zlc (n, wr ) ± α zlc (wr, wr ) If reference pauern has zero mean, unit variance, then: " 1, zlc (c, wr ) > τ $$ mn = # no, zlc (c, wr ) < τ $ 0, z ( c, wr ) < τ $% lc 12
13 Tes8ng simple WM system with DB of images Percentage of images [Cox et al, 08] m = 0 No WM m =1 Plausible threshold value DB of 4000 images Strength α = 1 Threshold τ = 0.7 results in false posi<ve probability of ~ 10-4 Performance highly dependent on reference image E.g. low-pass filtering results in much poorer separa<on, higher FP probability Detec<on value (linear correla<on) Working and useful WM system; however, only op<mal if the cover work and noise are drawn from Gaussian distribu<on, suscep<ble to certain auacks 13
14 ing as communica8on with side informa8on Idea: allow embedder to examine cover work before genera<ng watermark Input m embedder key encoder w a Original cover work + c o Can even subtract cover work completely c w n + Noise c wn detector decoder key [Shannon, 58]: communica<on with side informa<on at the transmiuer Can modify embedder to guarantee 100% embedding efficiency (losing in fidelity) Output m n 14
15 Fixed correla8on embedding c = c o +α 2m 1 ( ) w r, Percentage of images α = τ goal z lc ( c o, w r ) z lc ( w r, w r ) m = 0 m =1 No WM Detec<on value (linear correla<on) 15
16 Geometric models of watermarking Media space: mul<-dimensional space of all works Region of acceptable fidelity D( c, c o ) < δ c o Detec<on region z lc ( c, w r ) > τ Fidelity distance func<on extremely difficult to formalize; depends on human percep<on. Simplest case - MSE: D MSE ( c 1, c 2 ) = 1 N = 1 N x,y c 1 c 2 2 ( c 1 [x, y] c 2 [x, y] ) 2 Successfully watermarked versions of c o Some perceptual distance func<ons are asymmetric, result in units of JND just no<ceable difference w r True distribu<on of works in media space is usually unknown, effect of transmission / noise / auacks also unknown J (but modeled anyway) 16
17 Effects of blind and fixed-correla8on embedding Blind embedder w r Fixed-lc embedder w r AlternaDve common detecdon region definidons: Normalized correla<on: angle in N-dim space z nc ( c, w r ) = c w r c w r = cos ( c, w r ) Correla<on coefficient: subtract mean first (= angle between N-1-dimensional projec<ons) z cc ( c, w r ) = z nc ( c c, w r w r ) Plane x = x[i] = 0 w r w r c Detec<on region Projec<ons on plane Detec<on region 17
18 Marking space (cf. transform-based compression) Media space (e.g. pixel values) not always convenient for watermarking Extractor transforms work to more convenient representa<on (e.g. frequencies, wavelets) Unlike image compression, not looking for more compact representa<on Generic watermark embedder Original cover work Vector in media space extractor Message Simple WM Vector in embedded marking space Inverse extractor ed work Vector in media space Generic watermark detector Input work Vector in extractor media space Simple WM Vector in detector marking space Detected 18
Chapter 3 LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED DATA USING VARIOUS FILE FORMATS
44 Chapter 3 LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED DATA USING VARIOUS FILE FORMATS 45 CHAPTER 3 Chapter 3: LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING
More informationBasic concepts of Digital Watermarking. Prof. Mehul S Raval
Basic concepts of Digital Watermarking Prof. Mehul S Raval Mutual dependencies Perceptual Transparency Payload Robustness Security Oblivious Versus non oblivious Cryptography Vs Steganography Cryptography
More informationIntroduction to More Advanced Steganography. John Ortiz. Crucial Security Inc. San Antonio
Introduction to More Advanced Steganography John Ortiz Crucial Security Inc. San Antonio John.Ortiz@Harris.com 210 977-6615 11/17/2011 Advanced Steganography 1 Can YOU See the Difference? Which one of
More informationDynamic Collage Steganography on Images
ISSN 2278 0211 (Online) Dynamic Collage Steganography on Images Aswathi P. S. Sreedhi Deleepkumar Maya Mohanan Swathy M. Abstract: Collage steganography, a type of steganographic method, introduced to
More informationImage Compression and Decompression Technique Based on Block Truncation Coding (BTC) And Perform Data Hiding Mechanism in Decompressed Image
EUROPEAN ACADEMIC RESEARCH Vol. III, Issue 1/ April 2015 ISSN 2286-4822 www.euacademic.org Impact Factor: 3.4546 (UIF) DRJI Value: 5.9 (B+) Image Compression and Decompression Technique Based on Block
More informationInternational Journal of Advance Engineering and Research Development IMAGE BASED STEGANOGRAPHY REVIEW OF LSB AND HASH-LSB TECHNIQUES
Scientific Journal of Impact Factor (SJIF) : 3.134 ISSN (Print) : 2348-6406 ISSN (Online): 2348-4470 ed International Journal of Advance Engineering and Research Development IMAGE BASED STEGANOGRAPHY REVIEW
More informationEuropean Associa.on for Biometrics
European Associa.on for Biometrics Preliminary Contribu.on to Horizon 2020 Consulta.ons on Trustworthy ICT Edited by: Farzin Deravi, University of Kent, EAB Training & Educa>on CommiAee Chair Raymond Veldhuis,
More informationModified Skin Tone Image Hiding Algorithm for Steganographic Applications
Modified Skin Tone Image Hiding Algorithm for Steganographic Applications Geetha C.R., and Dr.Puttamadappa C. Abstract Steganography is the practice of concealing messages or information in other non-secret
More informationInformation Hiding: Steganography & Steganalysis
Information Hiding: Steganography & Steganalysis 1 Steganography ( covered writing ) From Herodotus to Thatcher. Messages should be undetectable. Messages concealed in media files. Perceptually insignificant
More informationAnalysis of Informa.on - III
Analysis of Informa.on - III Efficiency of Graphic The efficiency of a graphic is determined as: To obtain a correct and complete answer to a given ques.on, all other things being equal, one graphic requires
More informationSTEGO-HUNTER :ATTACKING LSB BASED IMAGE STEGANOGRAPHIC TECHNIQUE
STEGO-HUNTER :ATTACKING LSB BASED IMAGE STEGANOGRAPHIC TECHNIQUE www.technicalpapers.co.nr ABSTRACT : Steganography is the process of hiding secret information in a cover image. Our aim is to test a set
More informationA New Steganographic Method for Palette-Based Images
A New Steganographic Method for Palette-Based Images Jiri Fridrich Center for Intelligent Systems, SUNY Binghamton, Binghamton, NY 13902-6000 Abstract In this paper, we present a new steganographic technique
More informationColored Digital Image Watermarking using the Wavelet Technique
American Journal of Applied Sciences 4 (9): 658-662, 2007 ISSN 1546-9239 2007 Science Publications Corresponding Author: Colored Digital Image Watermarking using the Wavelet Technique 1 Mohammed F. Al-Hunaity,
More informationDESIGNING EFFICIENT STEGANOGRAPHIC ALGORITHM FOR HIDING MESSAGE WITHIN THE GRAYSCALE COVER IMAGE
DESIGNING EFFICIENT STEGANOGRAPHIC ALGORITHM FOR HIDING MESSAGE WITHIN THE GRAYSCALE COVER IMAGE 1 Ram Krishna Jha, 2 Ravi Kumar Mishra 1 Dept. of Information Technology, G L Bajaj Institute of Technology
More informationSteganography using LSB bit Substitution for data hiding
ISSN: 2277 943 Volume 2, Issue 1, October 213 Steganography using LSB bit Substitution for data hiding Himanshu Gupta, Asst.Prof. Ritesh Kumar, Dr.Soni Changlani Department of Electronics and Communication
More informationKeywords Secret data, Host data, DWT, LSB substitution.
Volume 5, Issue 3, March 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance Evaluation
More informationLSB Encoding. Technical Paper by Mark David Gan
Technical Paper by Mark David Gan Chameleon is an image steganography software developed by Mark David Gan for his thesis at STI College Bacoor, a computer college of the STI Network in the Philippines.
More informationAn Enhanced Least Significant Bit Steganography Technique
An Enhanced Least Significant Bit Steganography Technique Mohit Abstract - Message transmission through internet as medium, is becoming increasingly popular. Hence issues like information security are
More informationAnalysis of Secure Text Embedding using Steganography
Analysis of Secure Text Embedding using Steganography Rupinder Kaur Department of Computer Science and Engineering BBSBEC, Fatehgarh Sahib, Punjab, India Deepak Aggarwal Department of Computer Science
More informationDifferent Steganography Methods and Performance Analysis
International Journal of Engineering Inventions ISSN: 2278-7461, ISBN: 2319-6491 Volume 2, Issue 1 (January 2013) PP: 37-45 Different Steganography Methods and Performance Analysis Shantala.C.P 1, K.V
More informationPerformance Improving LSB Audio Steganography Technique
ISSN: 2321-7782 (Online) Volume 1, Issue 4, September 2013 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com Performance
More informationAn Improvement for Hiding Data in Audio Using Echo Modulation
An Improvement for Hiding Data in Audio Using Echo Modulation Huynh Ba Dieu International School, Duy Tan University 182 Nguyen Van Linh, Da Nang, VietNam huynhbadieu@dtu.edu.vn ABSTRACT This paper presents
More informationVARIABLE-RATE STEGANOGRAPHY USING RGB STEGO- IMAGES
VARIABLE-RATE STEGANOGRAPHY USING RGB STEGO- IMAGES Ayman M. Abdalla, PhD Dept. of Multimedia Systems, Al-Zaytoonah University, Amman, Jordan Abstract A new algorithm is presented for hiding information
More informationDigital Audio Watermarking With Discrete Wavelet Transform Using Fibonacci Numbers
Digital Audio Watermarking With Discrete Wavelet Transform Using Fibonacci Numbers P. Mohan Kumar 1, Dr. M. Sailaja 2 M. Tech scholar, Dept. of E.C.E, Jawaharlal Nehru Technological University Kakinada,
More informationScienceDirect. A Novel DWT based Image Securing Method using Steganography
Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 46 (2015 ) 612 618 International Conference on Information and Communication Technologies (ICICT 2014) A Novel DWT based
More informationA Study on Image Steganography Approaches in Digital Images
A Study on Image Steganography Approaches in Digital Images R.M. Yadav 1, Dr. Deepak Singh Tomar 2, Dr. R.K. Baghel 3 Department of CSE&IT, ECE, MANIT, Bhopal, M.P., India rmyyadav@rediffmail.com 1, deepaktomarmanit@gmail.com
More informationENHANCED SECURITY SYSTEM FOR REAL TIME APPLICATIONS USING VISUAL CRYPTOGRAPHY
Cell, Manjari Road,Hadapsar,Pune-412307. India,Chief Editor:Dr.K.R.Harne,Editors:Prof R V Patil,Prof Niraja Jain ENHANCED SECURITY SYSTEM FOR REAL TIME APPLICATIONS USING VISUAL CRYPTOGRAPHY AbhishekShinde,
More informationTransform Domain Technique in Image Steganography for Hiding Secret Information
Transform Domain Technique in Image Steganography for Hiding Secret Information Manibharathi. N 1 (PG Scholar) Dr.Pauls Engg. College Villupuram Dist, Tamilnadu, India- 605109 Krishnaprasad. S 2 (PG Scholar)
More informationENHANCED SECURITY SYSTEM USING SYMMETRIC ENCRYPTION AND VISUAL CRYPTOGRAPHY
ENHANCED SECURITY SYSTEM USING SYMMETRIC ENCRYPTION AND VISUAL CRYPTOGRAPHY Ranjan Kumar H S 1, Prasanna Kumar H R 1, Sudeepa K B 2 and Ganesh Aithal 2 1 Dept of CSE, NMAMIT, Nitte, Karnataka, India 2
More informationData Hiding In Audio Signals
Data Hiding In Audio Signals Deepak garg 1, Vikas sharma 2 Student, Dept. Of ECE, GGGI,Dinarpur,Ambala Haryana,India 1 Assistant professor,dept.of ECE, GGGI,Dinarpur,Ambala Haryana,India 2 ABSTRACT Information
More informationOutline of the presenta<on. QA and codec performance evalua<on
1 Outline of the presenta
More informationFPGA Implementation of Secured Image STEGNOGRAPHY based on VIGENERE CIPHER and X BOX Mapping Techniques
FPGA Implementation of Secured Image STEGNOGRAPHY based on VIGENERE CIPHER and X BOX Mapping Techniques Aniketkulkarni Sheela.c DhirajDeshpande M.Tech, TOCE Asst.Prof, TOCE Asst.prof,BKIT aniketoxc@gmail.com
More informationHigh capacity robust audio watermarking scheme based on DWT transform
High capacity robust audio watermarking scheme based on DWT transform Davod Zangene * (Sama technical and vocational training college, Islamic Azad University, Mahshahr Branch, Mahshahr, Iran) davodzangene@mail.com
More informationReversible data hiding based on histogram modification using S-type and Hilbert curve scanning
Advances in Engineering Research (AER), volume 116 International Conference on Communication and Electronic Information Engineering (CEIE 016) Reversible data hiding based on histogram modification using
More informationComparative study of digital audio steganography techniques
Djebbar et al. EURASIP Journal on Audio, Speech, and Music Processing 2012, 2012:25 REVIEW Open Access Comparative study of digital audio steganography techniques Fatiha Djebbar 1*, Beghdad Ayad 2, Karim
More informationConcealing Data for Secure Transmission and Storage
Concealing Data for Secure Transmission and Storage Abirami.P1, Shanmugam.M2 1Department of Civil Engineering, Institute of Remote Sensing, Anna University, Chennai, India 2Scientist, Institute of Remote
More informationA New Image Steganography Depending On Reference & LSB
A New Image Steganography Depending On & LSB Saher Manaseer 1*, Asmaa Aljawawdeh 2 and Dua Alsoudi 3 1 King Abdullah II School for Information Technology, Computer Science Department, The University of
More informationTHE STATISTICAL ANALYSIS OF AUDIO WATERMARKING USING THE DISCRETE WAVELETS TRANSFORM AND SINGULAR VALUE DECOMPOSITION
THE STATISTICAL ANALYSIS OF AUDIO WATERMARKING USING THE DISCRETE WAVELETS TRANSFORM AND SINGULAR VALUE DECOMPOSITION Mr. Jaykumar. S. Dhage Assistant Professor, Department of Computer Science & Engineering
More informationBackground Dirty Paper Coding Codeword Binning Code construction Remaining problems. Information Hiding. Phil Regalia
Information Hiding Phil Regalia Department of Electrical Engineering and Computer Science Catholic University of America Washington, DC 20064 regalia@cua.edu Baltimore IEEE Signal Processing Society Chapter,
More informationSteganography & Steganalysis of Images. Mr C Rafferty Msc Comms Sys Theory 2005
Steganography & Steganalysis of Images Mr C Rafferty Msc Comms Sys Theory 2005 Definitions Steganography is hiding a message in an image so the manner that the very existence of the message is unknown.
More informationIMAGE STEGANOGRAPHY USING MODIFIED KEKRE ALGORITHM
IMAGE STEGANOGRAPHY USING MODIFIED KEKRE ALGORITHM Shyam Shukla 1, Aparna Dixit 2 1 Information Technology, M.Tech, MBU, (India) 2 Computer Science, B.Tech, GGSIPU, (India) ABSTRACT The main goal of steganography
More informationAn Implementation of LSB Steganography Using DWT Technique
An Implementation of LSB Steganography Using DWT Technique G. Raj Kumar, M. Maruthi Prasada Reddy, T. Lalith Kumar Electronics & Communication Engineering #,JNTU A University Electronics & Communication
More informationDigital Image Watermarking using MSLDIP (Modified Substitute Last Digit in Pixel)
Digital Watermarking using MSLDIP (Modified Substitute Last Digit in Pixel) Abdelmgeid A. Ali Ahmed A. Radwan Ahmed H. Ismail ABSTRACT The improvements in Internet technologies and growing requests on
More informationExploration of Least Significant Bit Based Watermarking and Its Robustness against Salt and Pepper Noise
Exploration of Least Significant Bit Based Watermarking and Its Robustness against Salt and Pepper Noise Kamaldeep Joshi, Rajkumar Yadav, Sachin Allwadhi Abstract Image steganography is the best aspect
More informationSecure Image Steganography using N-Queen Puzzle and its Comparison with LSB Technique
Secure Steganography using N-Queen Puzzle and its Comparison with LSB Technique Akashdeep Singh Sandeep Kaur Dhanda Rupinder Kaur Abstract- Steganography is the art of concealing the existence of information
More informationMobile and Ubiquitous Compu3ng. Wireless Signals. George Roussos.
Mobile and Ubiquitous Compu3ng Wireless Signals George Roussos g.roussos@dcs.bbk.ac.uk Overview Signal characteris3cs Represen3ng digital informa3on with wireless Transmission and propaga3on Accessing
More informationCloudSense. Con%nuous Fine- Grain Cloud Monitoring with Compressive Sensing. H. T. Kung, Chit- Kwan Lin, Dario Vlah
CloudSense Con%nuous Fine- Grain Cloud Monitoring with Compressive Sensing H. T. Kung, Chit- Kwan Lin, Dario Vlah Monitoring and Performance Cloud monitoring and performance can be in%mately related Finer-
More informationA SECURE IMAGE STEGANOGRAPHY USING LEAST SIGNIFICANT BIT TECHNIQUE
Int. J. Engg. Res. & Sci. & Tech. 2014 Amit and Jyoti Pruthi, 2014 Research Paper A SECURE IMAGE STEGANOGRAPHY USING LEAST SIGNIFICANT BIT TECHNIQUE Amit 1 * and Jyoti Pruthi 1 *Corresponding Author: Amit
More informationPower Allocation Tradeoffs in Multicarrier Authentication Systems
Power Allocation Tradeoffs in Multicarrier Authentication Systems Paul L. Yu, John S. Baras, and Brian M. Sadler Abstract Physical layer authentication techniques exploit signal characteristics to identify
More informationComparative Analysis of Hybrid Algorithms in Information Hiding
Comparative Analysis of Hybrid Algorithms in Information Hiding Mrs. S. Guneswari Research Scholar PG & Research Department of Computer Science Sudharsan College of Arts & Science Pudukkottai 622 10 Tamilnadu,
More informationDigital Image Watermarking by Spread Spectrum method
Digital Image Watermarking by Spread Spectrum method Andreja Samčovi ović Faculty of Transport and Traffic Engineering University of Belgrade, Serbia Belgrade, november 2014. I Spread Spectrum Techniques
More informationImproved RGB -LSB Steganography Using Secret Key Ankita Gangwar 1, Vishal shrivastava 2
Improved RGB -LSB Steganography Using Secret Key Ankita Gangwar 1, Vishal shrivastava 2 Computer science Department 1, Computer science department 2 Research scholar 1, professor 2 Mewar University, India
More informationSecure Spread Spectrum Data Embedding and Extraction
Secure Spread Spectrum Data Embedding and Extraction Vaibhav Dhore 1, Pathan Md. Arfat 2 1 Professor, Department of Computer Engineering, RMD Sinhgad School of Engineering, University of Pune, India 2
More informationA Proposed Technique For Hiding Data Into Video Files
www.ijcsi.org 68 A Proposed Technique For Hiding Data Into Video Files Mohamed Elbayoumy 1, Mohammed Elmogy 2, Ahmed Abouelfetouh 3 and Rasha Elhadary 4 1 Information systems department, Faculty of computer
More informationIMPROVING AUDIO WATERMARK DETECTION USING NOISE MODELLING AND TURBO CODING
IMPROVING AUDIO WATERMARK DETECTION USING NOISE MODELLING AND TURBO CODING Nedeljko Cvejic, Tapio Seppänen MediaTeam Oulu, Information Processing Laboratory, University of Oulu P.O. Box 4500, 4STOINF,
More informationTWO ALGORITHMS IN DIGITAL AUDIO STEGANOGRAPHY USING QUANTIZED FREQUENCY DOMAIN EMBEDDING AND REVERSIBLE INTEGER TRANSFORMS
TWO ALGORITHMS IN DIGITAL AUDIO STEGANOGRAPHY USING QUANTIZED FREQUENCY DOMAIN EMBEDDING AND REVERSIBLE INTEGER TRANSFORMS Sos S. Agaian 1, David Akopian 1 and Sunil A. D Souza 1 1Non-linear Signal Processing
More informationAn Improved Edge Adaptive Grid Technique To Authenticate Grey Scale Images
An Improved Edge Adaptive Grid Technique To Authenticate Grey Scale Images Ishwarya.M 1, Mary shamala.l 2 M.E, Dept of CSE, IFET College of Engineering, Villupuram, TamilNadu, India 1 Associate Professor,
More informationInvestigation of Various Image Steganography Techniques in Spatial Domain
Volume 3, Issue 6, June-2016, pp. 347-351 ISSN (O): 2349-7084 International Journal of Computer Engineering In Research Trends Available online at: www.ijcert.org Investigation of Various Image Steganography
More informationBitmap Steganography:
Steganography: An Introduction Beau Grantham 2007 04 13 COT 4810: Topics in Computer Science Dr. Dutton I. Introduction Steganography is defined as the art and science of communicating in a way which hides
More informationImage Compression Supported By Encryption Using Unitary Transform
Image Compression Supported By Encryption Using Unitary Transform Arathy Nair 1, Sreejith S 2 1 (M.Tech Scholar, Department of CSE, LBS Institute of Technology for Women, Thiruvananthapuram, India) 2 (Assistant
More informationSpace Environment Impacts on Geosta2onary Communica2ons Satellites
Space Environment Impacts on Geosta2onary Communica2ons Satellites Thesis Proposal Defense Whitney Q. Lohmeyer Commi@ee Chair: Kerri Cahoy May 6, 2013 Military COMSAT aler Environmental Tes2ng [1] 2 Problem
More informationIntroduction to Audio Watermarking Schemes
Introduction to Audio Watermarking Schemes N. Lazic and P. Aarabi, Communication over an Acoustic Channel Using Data Hiding Techniques, IEEE Transactions on Multimedia, Vol. 8, No. 5, October 2006 Multimedia
More informationPrinciple and applications of BPCS-Steganography
header for SPIE use BPCS-Steganography Experimental Program site: http://www.datahide.com/bpcse/qtechhv-program-e.html Principle and applications of BPCS-Steganography Eiji Kawaguchi* and Richard O. Eason**
More informationA Steganography Algorithm for Hiding Secret Message inside Image using Random Key
A Steganography Algorithm for Hiding Secret Message inside Image using Random Key Balvinder Singh Sahil Kataria Tarun Kumar Narpat Singh Shekhawat Abstract "Steganography is a Greek origin word which means
More informationHiding Image in Image by Five Modulus Method for Image Steganography
Hiding Image in Image by Five Modulus Method for Image Steganography Firas A. Jassim Abstract This paper is to create a practical steganographic implementation to hide color image (stego) inside another
More informationSteganalytic methods for the detection of histogram shifting data-hiding schemes
Steganalytic methods for the detection of histogram shifting data-hiding schemes Daniel Lerch and David Megías Universitat Oberta de Catalunya, Spain. ABSTRACT In this paper, some steganalytic techniques
More informationA Comprehensive Review on Secure Image Steganography
25 A Comprehensive Review on Secure Image Steganography Yadavindra College of Engineering, Punjabi University, Patiala kritikasingla23@gmail.com, Purbasumeet@yahoo.co.in Abstract: Steganography is an art
More informationImproved Detection of LSB Steganography in Grayscale Images
Improved Detection of LSB Steganography in Grayscale Images Andrew Ker adk@comlab.ox.ac.uk Royal Society University Research Fellow at Oxford University Computing Laboratory Information Hiding Workshop
More informationIEEE TRANSACTIONS ON MULTIMEDIA, VOL. 7, NO. 4, AUGUST On the Use of Masking Models for Image and Audio Watermarking
IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 7, NO. 4, AUGUST 2005 727 On the Use of Masking Models for Image and Audio Watermarking Arnaud Robert and Justin Picard Abstract In most watermarking systems, masking
More informationImplementation of a Visible Watermarking in a Secure Still Digital Camera Using VLSI Design
2009 nternational Symposium on Computing, Communication, and Control (SCCC 2009) Proc.of CST vol.1 (2011) (2011) ACST Press, Singapore mplementation of a Visible Watermarking in a Secure Still Digital
More informationContent. Chapter 6 PASSBAND DATA TRANSMISSION. Dr. Samir Alghadhban 11/22/13
Chapter 6 PASSBAND DATA TRANSMISSION Dr. Samir Alghadhban 1 Content Different methods of digital modula3on, namely, phase- shi8 keying, quadrature- amplitude modula3on, and frequency- shi8 keying, and
More informationCompendium of Reversible Data Hiding
Compendium of Reversible Data Hiding S.Bhavani 1 and B.Ravi teja 2 Gudlavalleru Engineering College Abstract- In any communication, security is the most important issue in today s world. Lots of data security
More informationLecture 7: Op,cal Design. Christoph U. Keller
Lecture 7: Op,cal Design Christoph U. Keller Overview 1. Introduc5on 2. Requirements Defini5on 3. Op5cal Design Principles 4. Ray- Tracing and Design Analysis 5. Op5miza5on: Merit Func5on 6. Tolerance
More informationSecret Communication on Facebook Using Image Steganography: Experimental Study
Secret Communication on Facebook Using Image Steganography: Experimental Study Budoor S. Edhah Department of Information Systems King Abdulaziz University, Saudi Arabia beidhah@stu.kau.edu.sa Daniyal M.
More informationExperimental Validation for Hiding Data Using Audio Watermarking
Australian Journal of Basic and Applied Sciences, 5(7): 135-145, 2011 ISSN 1991-8178 Experimental Validation for Hiding Data Using Audio Watermarking 1 Mamoun Suleiman Al Rababaa, 2 Ahmad Khader Haboush,
More informationVisual Secret Sharing Based Digital Image Watermarking
www.ijcsi.org 312 Visual Secret Sharing Based Digital Image Watermarking B. Surekha 1, Dr. G. N. Swamy 2 1 Associate Professor, Department of ECE, TRR College of Engineering, Hyderabad, Andhra Pradesh,
More informationA New Secure Image Steganography Using Lsb And Spiht Based Compression Method M.J.Thenmozhi 1, Dr.T.Menakadevi 2
A New Secure Image Steganography Using Lsb And Spiht Based Compression Method M.J.Thenmozhi 1, Dr.T.Menakadevi 2 1 PG Scholar, Department of ECE, Adiyamaan college of Engineering,Hosur, Tamilnadu, India
More informationA Novel Image Steganography Based on Contourlet Transform and Hill Cipher
Journal of Information Hiding and Multimedia Signal Processing c 2015 ISSN 2073-4212 Ubiquitous International Volume 6, Number 5, September 2015 A Novel Image Steganography Based on Contourlet Transform
More informationExploiting the RGB Intensity Values to Implement a Novel Dynamic Steganography Scheme
Exploiting the RGB Intensity Values to Implement a Novel Dynamic Steganography Scheme Surbhi Gupta 1, Parvinder S. Sandhu 2 Abstract Steganography means covered writing. It is the concealment of information
More informationLOSSLESS CRYPTO-DATA HIDING IN MEDICAL IMAGES WITHOUT INCREASING THE ORIGINAL IMAGE SIZE THE METHOD
LOSSLESS CRYPTO-DATA HIDING IN MEDICAL IMAGES WITHOUT INCREASING THE ORIGINAL IMAGE SIZE J.M. Rodrigues, W. Puech and C. Fiorio Laboratoire d Informatique Robotique et Microlectronique de Montpellier LIRMM,
More informationA Study on Steganography to Hide Secret Message inside an Image
A Study on Steganography to Hide Secret Message inside an Image D. Seetha 1, Dr.P.Eswaran 2 1 Research Scholar, School of Computer Science and Engineering, 2 Assistant Professor, School of Computer Science
More informationDigital Watermarking Using Homogeneity in Image
Digital Watermarking Using Homogeneity in Image S. K. Mitra, M. K. Kundu, C. A. Murthy, B. B. Bhattacharya and T. Acharya Dhirubhai Ambani Institute of Information and Communication Technology Gandhinagar
More informationSTEGANALYSIS OF IMAGES CREATED IN WAVELET DOMAIN USING QUANTIZATION MODULATION
STEGANALYSIS OF IMAGES CREATED IN WAVELET DOMAIN USING QUANTIZATION MODULATION SHAOHUI LIU, HONGXUN YAO, XIAOPENG FAN,WEN GAO Vilab, Computer College, Harbin Institute of Technology, Harbin, China, 150001
More informationAvailable online at ScienceDirect. The 4th International Conference on Electrical Engineering and Informatics (ICEEI 2013)
Available online at www.sciencedirect.com ScienceDirect Procedia Technology ( 23 ) 7 3 The 4th International Conference on Electrical Engineering and Informatics (ICEEI 23) BER Performance of Audio Watermarking
More informationAudio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Cosine Transformation (DCT)
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 2, Ver. V (Mar Apr. 2015), PP 32-44 www.iosrjournals.org Audio Steganography Using Discrete Wavelet
More informationMethod to Improve Watermark Reliability. Adam Brickman. EE381K - Multidimensional Signal Processing. May 08, 2003 ABSTRACT
Method to Improve Watermark Reliability Adam Brickman EE381K - Multidimensional Signal Processing May 08, 2003 ABSTRACT This paper presents a methodology for increasing audio watermark robustness. The
More informationABSTRACT. file. Also, Audio steganography can be used for secret watermarking or concealing
ABSTRACT Audio steganography deals with a method to hide a secret message in an audio file. Also, Audio steganography can be used for secret watermarking or concealing ownership or copyright information
More informationCYCLIC COMBINATION METHOD FOR DIGITAL IMAGE STEGANOGRAPHY WITH UNIFORM DISTRIBUTION OF MESSAGE
CYCLIC COMBINATION METHOD FOR DIGITAL IMAGE STEGANOGRAPHY WITH UNIFORM DISTRIBUTION OF MESSAGE Rajkumar Yadav 1, Ravi Saini 2 and Kamaldeep 3 1 U.I.E.T, Maharshi Dayanand University, Rohtak-124001, Haryana,
More informationGenetic Algorithm to Make Persistent Security and Quality of Image in Steganography from RS Analysis
Genetic Algorithm to Make Persistent Security and Quality of Image in Steganography from RS Analysis T. R. Gopalakrishnan Nair# 1, Suma V #2, Manas S #3 1,2 Research and Industry Incubation Center, Dayananda
More informationAn Integrated Image Steganography System. with Improved Image Quality
Applied Mathematical Sciences, Vol. 7, 2013, no. 71, 3545-3553 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ams.2013.34236 An Integrated Image Steganography System with Improved Image Quality
More informationDesign and Implementation of an Underlay Control Channel for NC-OFDM-Based Networks
Design and Implementation of an Underlay Control Channel for NC-OFDM-Based Networks Ratnesh Kumbhkar, Gokul Sridharan, Narayan B. Mandayam, Ivan Seskar (, Rutgers, The State University of New Jersey) and
More informationData Security Using Visual Cryptography and Bit Plane Complexity Segmentation
International Journal of Emerging Engineering Research and Technology Volume 2, Issue 8, November 2014, PP 40-44 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) Data Security Using Visual Cryptography
More informationHYBRID MATRIX CODING AND ERROR-CORRECTION CODING SCHEME FOR REVERSIBLE DATA HIDING IN BINARY VQ INDEX CODESTREAM
International Journal of Innovative Computing, Information and Control ICIC International c 2013 ISSN 1349-4198 Volume 9, Number 6, June 2013 pp. 2521 2531 HYBRID MATRIX CODING AND ERROR-CORRECTION CODING
More informationAudio watermarking using transformation techniques
Louisiana State University LSU Digital Commons LSU Master's Theses Graduate School 2010 Audio watermarking using transformation techniques Rajkiran Ravula Louisiana State University and Agricultural and
More informationDesign and Analysis of Digital Watermarking, Information Embedding, and Data Hiding Systems. Brian Chen
Design and Analysis of Digital Watermarking, Information Embedding, and Data Hiding Systems by Brian Chen B.S.E., University of Michigan (1994) S.M., Massachusetts Institute of Technology (1996) Submitted
More informationMedical Image Watermarking using a Perceptual Similarity Metric
MIT International Journal Electrical and Instrumentation Engineering Vol. 1, No. 1, Jan. 2011, pp. 29-34 29 Medical Image Watermarking using a Perceptual Similarity Metric Janani Natarajan Engineering
More informationNHSC/PACS Webinar PACS Point Source Photometry. Aperture Photometry and Photometric Uncertain5es. Roberta Paladini NHSC PACS.
NHSC/PACS Webinar PACS Point Source Photometry Aperture Photometry and Photometric Uncertain5es Roberta Paladini July 2012 1 Content I Point- source aperture photometry in HIPE II Calibra=on errors III
More informationISeCure. The ISC Int'l Journal of Information Security. A Survey on Digital Data Hiding Schemes: Principals, Algorithms, and Applications
The ISC Int'l Journal of Information Security January 2013, Volume 5, Number 1 (pp. 5 36) http://www.isecure-journal.org Invited Paper A Survey on Digital Data Hiding Schemes: Principals, Algorithms, and
More informationAudio Watermark Detection Improvement by Using Noise Modelling
Audio Watermark Detection Improvement by Using Noise Modelling NEDELJKO CVEJIC, TAPIO SEPPÄNEN*, DAVID BULL Dept. of Electrical and Electronic Engineering University of Bristol Merchant Venturers Building,
More informationA High-Rate Data Hiding Technique for Uncompressed Audio Signals
A High-Rate Data Hiding Technique for Uncompressed Audio Signals JONATHAN PINEL, LAURENT GIRIN, AND (Jonathan.Pinel@gipsa-lab.grenoble-inp.fr) (Laurent.Girin@gipsa-lab.grenoble-inp.fr) CLÉO BARAS (Cleo.Baras@gipsa-lab.grenoble-inp.fr)
More information