The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Audio Steganography is the technique of hiding any secret information behind a cover audio file without impairing its quality. Data hiding in audio signals has various applications such as secret communications and concealing data that may influence the security and safety of governments and personnel and has possible important applications in 5G communication systems. This paper proposes an efficient...
In this study, digital image watermarking method based on Redundant Discrete Wavelet Transform (RDWT) and Singular value Decomposition (SVD) is proposed. By exploiting the complexity property of the chaotic signals, which is the main reason of using them in the security applications, the robustness and the invisibility of the proposed method is improved. In the proposed watermarking scheme, RDWT is...
This manuscript presents a watermarking method based on Discrete Wavelet Transform (DWT) and Singular Value Decomposition (SVD) with the Advanced Encryption Standard (AES) algorithm encryption applied on medical image. The proposed schema will be developed to increase the protection and robustness along with security. In our algorithm, after decomposing the original image into four sub-bands in the...
Steganography can be defined as the art and science of concealing private data within a carrier that could be a video, an image, an audio or a text that acts as a cover medium. Many steganography techniques exist; each has its own advantages and limitations. Capacity, robustness and the overall level of security are among the main factors to assess the performance of steganography algorithms. Also,...
Own method of embedding information in still pictures was synthesized. New algorithm used additional blocks of cropping and stability under the previous image processing. This ensured the reliability of the system and increased the probability of correct recognition of embedded data. The complex analysis of the most relevant data hiding methods by multiobjective optimization was done. Also the comparative...
This paper deals with the image security along with compression. Here we have proposed an algorithm using chaos on EZW compression technique to provide security along with image compression. We had chosen chaos for image security due to its robustness to initial condition and mixing property. Our process of providing image security starts with compressing the image using EZW. The output sequence of...
Steganography has proven to be one of the practical ways of securing data. It is a new kind of secret communication used mainly to hide secret data inside other innocent digital mediums. Steganographic algorithms can be characterized by a number of defining properties like Transparency, Capacity, Robustness. We have presented a high capacity and high stegosignal quality audio steganography scheme...
Digital watermarking being a potential mechanism of information security has received a lot of attention from researchers over the last few decades and accordingly has undergone a thorough research. Number of methods and techniques have been proposed and implemented so far. The host values chosen and the way the watermark is being embedded are two important factors that determine the effectiveness...
Steganography is the Art and Science of hiding the information and remarkable cover media. So, as not to arouse on Eaviesdropper's suspicion. In this paper, secret image is hide into two different domains like as IWT (Integer Wavelet Transform) and DWT (Discrete Wavelet Transform). The cover image and secret image co-efficient values are embedded by 512*512 using fusion process techniques. We applied...
In this study, we proposed a method of hiding the stego image in cover image by using a technique called fractional fourier transform with wavelet coefficients. Application of steganography is internet/web security. To maintain higher security Arnold transform is performed on host image with key, key is only known to a receiver/sender. For embedding, perform a fractional Fourier transform of cover...
Digital image-watermarking can be casted as an optimization problem with solution satisfying fidelity, robustness and security constraints. Most of discrete wavelet transform (DWT) and singular value decomposition (SVD) based approaches highlights tradeoff between fidelity and robustness with lesser discussion on security. In this paper, authors propose a novel watermarking approach based on DWT and...
In this paper, we proposed a secure audio forensic marking algorithm through the process of embedding information into the discrete wavelet transformation-discrete fractional random transformation (DWT-DFRNT) domain using the quantization method. We hid information in the QR code, encoded it with the block code that we developed. The block code and QR code improve the detection performance by bit...
Steganography enables to have a secret communication in modern information technology using public channel. In this paper, we propose Dual Transform Technique for Robust Steganography (DTTRS). The cover image is segmented into blocks of 4*4 each and Discrete Wavelet Transform (DWT) is applied on each block. In the resulting DWT coefficients, blocks of vertical band of 2*2 each are considered and Integer...
Digital watermarking is an effective and popular technique for discouraging illegal copying and distribution of copyrighted digital image information, which in turn provides an alternative solution for image authentication. This paper proposes an innovative watermarking scheme in which some pixels are randomly selected from original image, so that all of them have a valid 3 × 3 neighborhoods. A binary...
In order to improve security of DWT-based information hiding algorithm, this paper introduces an information hiding algorithm based on DWT with alterable parameters, in which the parameters are used to be key to control the locations of embedding secret messages. Embedding signals disperse in domain guessed by attacker, and which makes attacker difficult to steganalyze. Analysis and experiment results...
Media hashing is a compact representation of media content, one potential application of which is for content-based information retrieval. In the earlier work [13], the invariance of the spatial-domain histogram in shape to geometric deformations has been successfully exploited for image hashing. In this work, we extend the invariance into the discrete wavelet transform (DWT) domain to make this hashing...
It is more likely to prevent the watermark from JPEG-compression attack, when it is embedded into the low-frequency coefficients of DWT. However, embedding the watermark with the same intensity into them may distort the watermarked image to a large extent. To solve this problem, a novel robust image-watermark algorithm is proposed with the characteristics of selective embedding intensity based on...
In recent years, digital watermarking technologies are considered to be important means to protect digital image copyrights. In this paper, we combine a non-invertible watermark scheme with an HVS model adaptive watermark. The application of adaptive watermarks improves visual imperceptibility. However, we find that an adversary is able to apply ambiguity attacks on the non-invertible watermark scheme...
A new barcode watermarking algorithm in Discrete Wavelet Transform (DWT) domain is proposed. The algorithm utilizes the visual masking and texture characteristics of Human Visual System (HVS) to achieve the invisible and robust requirements for watermarking. In addition, a barcode which consist vertical bars and numbers is taken as the watermark embedded into the host image. Numbers in the barcode...
The pure SVD based watermarking scheme does not have high data payload and high security. In this paper, we proposed a new robust multi image-watermarking scheme based on framelet and SVD. It mainly addresses the multi-user problem in digital rights management. framelet transform (first level) is applied to the gray scale cover image resulting in eight-detailed band (H1L, H2L, LH1, H1H1, H2H1, LH2,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.