The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Today's world is digital era, everyone looks for information on Web. The web is not only space for information, but most importantly, it is a tool to connect people. People used to share information and transfer confidential data on the Web. Since Internet is publicly available securing data on Web is much important, some techniques are needed to hide this data. There are different techniques available...
In this study a reversible multilevel data hiding algorithms using histogram has been proposed. Here multilevel hiding is used to improve hiding capacity and reduce the distortion. Using the property of reversibility the proposed method can recover the embedded message without distorting the original media. By evaluating joint imperceptibility and hiding capacity, three different approaches was carried...
Steganography is an art of hiding the secret data or information inside the digitally covered information. The hidden message can be text, image, speech (audio) or even video and the cover can be chosen accordingly from either a text, an image, an audio or a video. The traditional method uses image as a cover which has the limitation of embedding dimension. So, cover should be a video to overcome...
The number of aging population are growing significantly. In accordance with Health Insurance Portability and Accountability Act (HIPAA) the patient's privacy and security is important in the protection of healthcare privacy. Point-Of-care (PoC) is an application used in hospitals widely around the world. The Security Regulations are implemented to provide data integrity, confidentiality, and availability...
The present paper proposes a new method for hiding any encrypted secret message inside a text/ASCII or Microsoft word document file, by manipulating the blank/white space characters of a cover file. Initially the secret message is encrypted using Modified Generalized Vernam Cipher Method (MGVCM) proposed by Nath et. al. For hiding secret message inside any ASCII file we propose a new method in which...
The paper introduces a new secret data communication system that employs the usage of two state-of-the art cryptographic algorithms (RSA with asymmetric keys and AES with symmetric key) together with steganography. The joining of these three techniques builds a robust steganography-based communication system capable of withstanding multiple types of attacks, detection and reverse engineering. Our...
A novel method for embedding a covert message in cover audio for secure communication is proposed. The covert message to be embedded can be of any format. In this process, two cover audio files are taken and difference of the amplitude values is calculated. These differences are then classified into number of ranges and are substituted with a new value to embed the secret message. The embedded secret...
The large-scale communication of multimedia data on Internet motivates the protection of digital information against illegal duplication and manipulation. Advances that facilitate electronic publishing and commerce also heighten threats of intellectual property theft and unlawful tampering. This work is concerned with the perceptual models used for data protection, secrete communication, author's...
This paper discusses the design of a robust image steganography technique based on LSB (least significant bit) insertion and RSA encryption technique. Steganography is the term used to describe the hiding of data in images to avoid detection by attackers. Steganalysis is the method used by attackers to determine if images have hidden data and to recover that data. The application discussed in this...
This paper introduces a method of hiding information in a 24-bit BMP image. The key technique of encryption is to convert the hidden messages into a bit stream, and fills it in the certain position of the BMP file. The size of the cover image file is not changed after data embedding and the color variations of each byte of the image are changed at most 1/256, which will not detected by human eyes...
The security of medical records is an important issue related to privacy and safety during storage and communication. Human errors in hospitals and medical centers are closed related with mishandling of multimedia medical records. Cryptography and steganography can offer not only information security but also secure association of multimedia records. This paper presents a new lossless synthetic methodology...
This paper presents a novel hidden transmission method of biometric images base on chaos and image content to improve the security and secrecy of biometric verification. In our scheme, chaos is used to encrypt the watermark. The secret keys which called biokey are generated from the biometric image and used as the parameter value and initial condition of the chaotic map. The digital watermark embedded...
A steganographic method for hiding messages uses high-dynamic-range images. The technique provides for authentication, a large embedding capacity, and limited distortion.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.