The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Nowadays, video steganography has become important in many security applications. The performance of any steganographic method ultimately relies on the imperceptibility, hiding capacity, and robustness. In the past decade, many video steganography methods have been proposed; however, the literature lacks of sufficient survey articles that discuss all techniques. This paper presents a comprehensive...
The paper aims at studying some methods of coding information in text containers. It proposes a method of embedding a digital watermark to the text that is based on biometrical characteristics of the document's author. The information capacity is defined, it is 0.02 in respect of a bit/symbol proportion. A method of checking electronic and paper documents for their authenticity and unauthorized changes...
Steganography is used to hide the secret information within a cover media in such a way that the existence of the message could not be noticeable. Here we are considering audio file as cover media and text message as secret information. The secret information is embedded in a cover media as noise as the HAS cannot detect the sound less than 20Hz or greater than 20000Hz. Generally LSB algorithm is...
Images not only represents the information itself but also work as the carrier to keep the information in it. These kind of images work as the cover objects to hold secret communicating information over public network. But steganography itself is not efficient to provide effective security. To attain higher degree, in this work a three dimensional model is defined to improve the communicating data...
Digital Image Watermarking is used to hide the copyrighted information as a watermark inside a Digital image, to identify the ownership. In this paper to ensure the security watermark is first encrypted by standard A5/1 algorithm. The encrypted watermark is encoded by repetition code to provide robustness against salt and pepper noise and embedded inside the cover image by modifying the least significant...
This paper describes the basic idea of a novel Digital Rights Management(DRM) method which is composed of an incomplete cryptography using invariant huffman code length feature and the user identification mechanism to control the quality of the digital contents. We adopt the huffman code length feature of the DCT coefficient in the JPEG codec to the implement incomplete cryptography. The encoding...
Data encryption is vital for e-commerce. Here we introduce a technique for hiding sensitive credit card information in an arbitrary background image without the sensitive data getting exposed in public domains. The paper also makes an attempt to combine Cryptographic and Steganographic technique to provide a reliable security solution for credit card transactions. The proposed technique utilizes a...
In this paper, a novel method of robust watermarking for word documents for protecting copyright and controlling dissemination is proposed. A word document consists of lots of objects and word objects are arranged in a hierarchical order. Every object has its own properties and functions. Some of the properties are special. They can't be modified via the interface of word application but via programming...
In this paper a multiple frequency domain steganography is proposed; it uses DWT (discrete wavelets transform) with DCT (discrete cosine transform) techniques, which are applied sequentially on the cover image. Embedding the secret message is done in the high frequency coefficients to provide a high imperceptibility; as it is the most important property of any steganography system. For secret message...
Exponential growth of the internet provided new ways of propagating and sharing digital video data. Thus ownership protection of the video data is critical and important in this era. Though there are many standards and technologies available to efficiently share the digital video, almost all of them lack ownership protection mechanism. This paper proposes new compressed domain secure digital watermarking...
In this research, we aim to conceal a secret data Into the cover image without noticeable degradation. In our approach, Lempel-Ziv-Welch (LZW) compression and set partitioning in hierarchical trees (SPIHT) codec are used to obtain a low bit rate and high econstructed quality image compression. In the embedding process, an adaptive phase modulation (APM) mechanism and discrete Fourier transform (DFT)...
This paper presents a new selective and scalable encryption (SSE) method for intra dyadic scalable coding framework based on wavelet/subband (DWTSB) for H.264/AVC. It has been achieved through the scrambling of quantized transform coefficients (QTCs) in all the subbands of DWTSB. To make the encryption scalable, it takes advantage of the prior knowledge of the frequencies which are dominant in different...
In this paper a new technique of encryption for embedding secret information in the frequency domains of a cover audio signal is described. A novel method is presented for inaudibly hiding information in an audio signal. The method uses quadratic form as key matrix. The data is first encrypted using the key matrix. The secure data is further embedded in the audio signal in frequency domain using fast...
A fragile software watermarking scheme for integrity verification of software is proposed in this paper. The algorithm uses the idea of semantic-preserving code substitution for embedding the watermark. With the system, the generated watermark relates closely to the content of software, and the scheme has highly sensitive to different types of attacks. Furthermore, both watermark generating controlled...
Robust hash measure the similarity between two images by matching their short hash vectors. For its advantages of efficiency and versatility, robust hash has become a promising technology in image authentication and identification. Different to the traditional watermarking method, robust hash does not need to embed information into the host image. Therefore, it is promising to provide more robustness...
With the development of the Internet, getting information through browsing Web pages has become a popular way. How to protect the integrity of a Web page is an urgent problem. As an effective method, a novel fragile watermarking scheme for tamper-proof of Web pages is proposed in this paper for solving the problem. In our scheme, the watermarks that are related to the content of the original Web page...
In this paper, we present a DCT domain watermarking approach for H.264/AVC video coding standard. This scheme is resilient to compressed-domain temporal adaptation. A cryptographic hash function is used to generate a semi-fragile watermark to provide content-based authentication. The embedded watermark can withstand frame-dropping due to temporal adaptation, yet it is able to detect malicious attacks...
Security issues of text watermarking are greatly different from those of other multimedia watermarking, in terms of its specific requirements and characteristics of text watermarking. The security theory of text watermarking is proposed in this paper, and the following security topics are discussed: (i) the classification and application of text watermarking; (ii) the classification and analysis of...
Steganography is a method of hiding data within a cover media so that other individuals fail to realize their existence. In this paper, a new approach for steganography in Arabic texts is proposed. The main idea is that each Arabic word may have some characters which can be extended by dasiaKashidapsila. The ranks dasialocationspsila of such characters and the inserted Kashida, construct a coding...
Considering three important properties of software watermarks, resilience, stealth and data rate, a new static watermarking scheme based on Chinese Remainder Theorem is proposed. The idea of secret sharing is introduced to the watermark division and retrieval, and the watermark retrieval based on the partial values has great robust. The watermark coding realized by the control-flow diagram assigning...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.