The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
LSB substitution steganography only takes the least significant bits in the carrier into account, which has the problems of low security and poor robustness. This paper proposes a self-contained steganography combining the MSB matching and LSB substitution. It contains two types of encoding rules to define the matching result between the secret information binary stream and the most two-significant-bit...
Steganographic techniques are used to transmit secret information using a carrier file without visibility during communication. In this paper, we proposed an improved RGB image steganographic technique for secured communication between two authorized parties. This technique embeds the information within 2nd to 8th bit position of blue (B) or green (G) component or both of a pixel throughout the blue...
Communication security has taken vital role with the advancement in digital communication. The universal use of internet for communication has increased the attacks to users. The security of information is the present issue related to privacy and safety during storage and communication. Cryptography and Steganography are two popular ways of sending essential information in a confidential way. Cryptography...
In this paper a robust audio steganography method is introduced which involves multiple layers for embedding secret data. In LSB technique generally a single or multiple bits are embedded always in one or some particular bit positions. So it is easy to get that data by knowing those positions. The robustness increases in LSB approach by considering higher LSB layer but it reduces the perceptibility...
Although biometric authentication is perceived to be more reliable than traditional authentication schemes, it becomes vulnerable to several attacks when it comes to remote authentication over open networks. Steganography based techniques have been used in the context of remote authentication to hide biometric feature vectors. Biometric cryptosystems, on the other hand, are proposed to enhance the...
In this paper, we present a new key generation model for image hashing using neural network, which does not embed any data into the content but is able to extract meaningful data from target image. This model trains artificial neural network to assign predefined code and uses this trained artificial neural network weight and the coordinates of the selected feature sub blocks of target image as keys...
We construct the first general secure computation protocols that require no trusted infrastructure other than authenticated communication, and that satisfy a meaningful notion of security that is preserved under universal composition- assuming only the existence of enhanced trapdoor permutations. The notion of security fits within a generalization of the "angelbased" framework of Prabhakaran...
In the recent years, watermarking algorithms were designed based on different dynamical chaotic systems. In this paper we propose some ideas to improve the performances of this kind of techniques using the PWLCM, the DCT and luminance transformation of the image in order to hide the watermark information in an invisible and robust way.
It is important to do research on the source trustworthiness of the massive data under network environment. A detection method of source trustworthiness in text is proposed and designed based on cognitive hash. Based on the HowNet semantic features, this paper designs a text cognitive hash, and proposes a method evaluating feasible hash distance. Experimental results show the effectiveness of the...
This paper proposes an image combination algorithm of active and passive security protection. The algorithm is realized by adjusting the passive protection information embedding algorithm according to active Arnold transform's periodicity. By means of this algorithm, the passive protection information can be extracted conveniently from the image's ciphertext without decoding and it still exists in...
In this letter, we analyze the security of a perceptual image hashing technique based on non-negative matrix factorization which was recently proposed and reported in the literature. We theoretically demonstrate that, although the technique uses different secret keys in subsequent stages, the first key plays an essential role to secure the hashing system. We next act as an attacker and propose a technique...
Standard map can be employed to shuffle the positions of image pixels to get a totally visual difference from the original images. This paper proposes a new scheme to shuffle the digital images. Different from the conventional schemes, we disorder the pixel positions by the orbits of the standard map. By setting the initial position, one can get an orbit of the chaotic map. Thanks to the chaotic characteristics,...
Robust hash algorithms can be used as tools for identifying or discriminating content, e.g. for automated tracking systems and filters for file sharing networks. When they are used in security relevant applications, such as in content-fragile watermarks or for recognizing illegal content, the security of the hash value generation becomes an important issue. In this paper we discuss possible attacks...
Watermarking is a technique which allows an individual to add hidden copyright notices or other verification messages to digital audio, video, or image signals and documents. In our proposal, for Audio Watermarking, a Watermark is encrypted using RSA Algorithm and is embedded on the audio file using LSB technique. LSB technique is an old technique which is not very robust against attacks. Here, in...
We present a robust threshold signature scheme which is provably secure without random oracles under the computational Diffie-Hellman assumption. Our construction derives from a novel application of the recent signature scheme due to Waters. Compared with Wang et al.'s threshold signature scheme without random oracles, the signing procedure of our scheme is much more efficient in terms of communication...
Content-based video hashing was introduced recently to serve the purpose of video copy detection. A conventional approach to video hashing is to apply image hashing techniques to either every frame or to the selected key frames of a video sequence. Both approaches ignore the temporal information contained in a video sequence. This study proposes an approach for generating representative images of...
A new data structure dynamic watermarking scheme is proposed in this paper. Using Shamir threshold scheme and block encryption, the watermark is divided into several shares. Then these shares are embedded into the dynamic branch structure of program. Code obfuscation technique is applied during embedding. Our scheme provides watermarks with increased robustness, decreased visibility and higher cost...
Since current DCT-domain watermarking algorithm is poor self-adaptive, a new digital watermarking algorithm that combines encryption with adaptability is proposed. Before been embedding, it need to be Arnold transformed so that it can break the correlation of watermark's inter-related data, greatly increase the security of watermarking and reduce the errors may be caused in the watermark image transmission...
Take advantage of the feature that the energy distribution ratio is approximately 4.5:2.2:2.2:1.1 in the four LL1 sub-images (LL2, LH2, HL2 and HH2) after first-order GHM multi-wavelet transform. Use the feather of image bit plane embedded strategy. Propose an information hiding scheme based on GHM and combination bit plane (CBP). LL2 is embedded module of robust parameters. Embed hiding Information...
The binary characteristic string is calculated from I-frame by using the semi-fragile characteristic in this paper, and the binary watermarking is generated by using the characteristic string as the encryption key. This watermarking based on the content is embedded into I-frame, which is used to distinguish whether the video content remains unchanged or not. So the integrity of MPEG-4 videos' I-frame...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.