The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Recently, many kinds of cloud computing based services are provided and they are becoming more and more popular. But we think it is an urgent problem to improve the security of cloud services especially for storage services because the number of cyber-attacks is increasing. Currently, our research group proposed an image morphing based technology for improving the security of cloud services. This...
In recent years, information security becomes more necessary than it used to be. Steganography is one of the effective mechanisms to protect ones privacy and secrets. Recently, we proposed a morphing based steganography, in which a morphed image is used as the cover image, the encryption key, as well as the stego-key. A key point to ensure the security is the “naturalness” of the morphed images. To...
In recent years, many cloud computing systems have been developed over the world. However, since there are many malicious people who want to access secret and personal information stored in cloud servers, information security is still a serious problem to solve. To conceal and protect secret and personal information, in this paper we propose and develop a system that can encrypt secret message and...
Nowadays, large scale data-centers have been built around the world, and cloud computing is becoming more and more popular. With the help of cloud computing, users can access their data and obtain different services anywhere and anytime. However, many people and companies still hesitate to use cloud based services because of the information security problem. If the problem cannot be solved properly,...
In our earlier study, we proposed an image morphing based method for information hiding. The basic idea is to hide a secrete image into a morphed image which is obtained from the secrete image and another reference image. To make this method practically useful, it is necessary to produce natural morphed images. This is a necessary condition conceal the existence of the secret image. To produce natural...
In our earlier studies, we have proposed an image morphing based steganography. The basic idea is to embed a secrete image into a stego image through morphing. The stego image is a morphed image obtained from the secrete image and some other reference images. To make this method more practically useful, it is essential to make the stego image as natural as possible. For this purpose, we should define...
In today's society, information security and hiding is a key mechanism to protecting one's identity. Image morphing can hide a secret image in a morphed image using a second, reference image. One of the primary methods to make the morphing based information hiding technology practically useful is interactive evolutionary algorithm (IEA). When using IEA, however, the user who is rating the images for...
Consciously or unconsciously, we are using many kinds of “cards” in our daily lives. Among them, credit card, cash card, driving license, etc., are as important as our wallets. To protect the card holder from malicious use of his/her cards, it is necessary to authenticate the card user. For this purpose, a common practice is to ask the user to provide some key information (usually password) known...
Recently, we proposed a new technique for information hiding based on image morphing. Since the cover message can be changed after embedding the secret message, the cover rate of the new technique is much larger than that of existing techniques. However, this technique has two fatal problems. First, the stegodata may not look natural due to inaccurate definition of the feature lines. Second, the secret...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.