The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This work proposes a novel separable method for encrypted images. The input image is encrypted first via a pairwise encryption scheme. Then the data bits can be embedded into the pairwisely encrypted image by the well-known difference-expansion technique. When the receiver gets the marked encrypted, he can extract the secret data bits by the data-hiding key and obtain an image which is similar to...
Reversible data hiding in encrypted images has attracted considerable attention from the communities of privacy security and protection. The success of the previous methods in this area has shown that a superior performance can be achieved by exploiting the redundancy within the image. Specifically, because the pixels in the local structures (like patches or regions) have a strong similarity, they...
The transfer of medical data is too done securely over the community network and manipulated in an effective manner. For the enhancement of safety and verification of medical records, watermarking method is used for more identification then references. So there is great need of elimination such illegal copyright of digital media. Digital watermarking is the powerful solution to this problem. The information...
In this paper, application of the secure watermarking scheme based on DWT-SVD domain is examined for piracy. This technique cryptography based on invisible and compressed (using DWT-SVD) watermark image embedded into host image without make an impression the imperceptibility and increase the security of watermark, this technique provides a robust solution for watermarked image. A comparative study...
This paper is focused on proposal of image steganographic method that is able to embedding of encoded secret message using Quick Response Code (QR) code into image data. Discrete Wavelet Transformation (DWT) domain is used for the embedding of QR code, while embedding process is additionally protected by Advanced Encryption Standard (AES) cipher algorithm. In addition, typical characteristics of QR...
This paper proposes a hardware architecture for a Secure Digital Camera (SDC) integrated with Secure Better Portable Graphics (SBPG) compression algorithm. The proposed architecture is suitable for high performance imaging in the Internet of Things (IoT). The objectives of this paper are twofold. On the one hand, the proposed SBPG architecture offers double-layer protection: encryption and watermarking...
A novel hybrid image compression-encryption based on Cosine Number Transform and measurement matrix is proposed. The Cosine Number Transform is defined over algebraic structures in a finite field. Therefore only modular arithmetic is needed for computing the transform. Simultaneous compression and encryption is achieved by using chaotic map based key in the generation of a measurement matrix. One...
This study proposes a scheme of data transmission over an illicit network. We use image hiding and data compression technique with Diffie-Hellman cryptosystem to intensify the security of data to be transmitted over an insecure channel. Fuzzy error correction code is used to check precision and carriage of error free message.
To protect data against theft from Trojan horses, some of the common approaches like End-to-End Encryption fail to counter such malicious attempts as they do not account for vulnerabilities of the user's endpoint. Any data which is decrypted on the endpoint, can become visible to attackers. A technique that can prevent this dataloss is by employing encryption in the pixel-domain and using additional...
Lately, there has been a huge interest in compressive sensing (CS) as a technology to perform measurements at a lower sample rate than that of the Nyquist frequency. This is very useful in wireless sensor networks applications where data transmission should be reduced at a minimum in order to save power resources. At the same time the privacy and secrecy of the information transmitted through a wireless...
Transportation costs for road transport companies may be intensified by rising fuel prices, levies, traffic congestion, etc. Of particular concern to the Mpact group of companies is the long waiting times in the queues at loading and offloading points at three processing mills in the KZN (KwaZulu-Natal) province in South Africa. Following a survey among the drivers who regularly deliver at these sites,...
Multimedia based covert storage requires data hiding methods having undetectability and reversibility at the same time, which is not supported by traditional steganography or reversible data hiding methods. To meet the covert storage needs, we present the concept "reversible steganography" in this paper, which has reversibility and moderate undetectability. We proposed a reversible steganographic...
Most steganography algorithms are weak against attacks like visual and statistical but among all steganography algorithms F5 algorithm is more robust and secure. It can be more efficient if we reduce the encryption and decryption time and improve the embedding capacity. In this paper we present a better F5 algorithm with less encryption and decryption time and higher embedding capacity with the help...
In this paper, we propose a novel joint image compression and encryption technique where an annoying image can still be recovered even without the encryption key. Our work is based on JPEG standard. By embedding encryption algorithm at the transformation stage, we realize image encryption and compression together with controllable image quality. Instead of using the 8×8 discrete cosine transform (DCT)...
The demand for secure communication over the link has augmented the need for robust algorithms. In order to ensure confidentiality, authenticity and integrity of the messages transmitted, the algorithms must facilitate high efficacy. In this paper, we have implemented a method for sharing secret messages encrypting them in gray-scale images, that are processed with Discrete Wavelet Transform (DWT)...
This paper reports a research work on how to transmit a secured image data using Discrete Wavelet Transform (DWT) in combination of Advanced Encryption Standard (AES) with low power and high speed. This can have better quality secured image with reduced latency and improved throughput. A combined model of DWT and AES technique help in achieving higher compression ratio and simultaneously it provides...
Information security in mobile phones has become a challenge when large amounts of data exchanged on the Internet. Secure information transfer can be achieved by cryptography and steganography. Cryptography is a tool that provides encryption techniques for secure communication. Steganography is the technique of hiding information by way of the message of the picture, so that in addition to the person...
With the development of digital technologies, compression and encryption have become important aspects of information. In many applications, encryption of compressed images is considered vital for hiding data. In this work, we implemented the image compression-encryption hardware on a FPGA. JPEG was used as a compression standard and Tiny Encryption Algorithm was used as an encryption algorithm. Discrete...
To create combined systems to hide video information resource, based on the technology to eliminate the redundancy with the preservation of the integrity and efficiency of information transmission, the method of crypto-semantic presentation of images based on a floating circuit system of polyadic coding in the basis of the upper boundaries is worked out.
Todays' era of internet-of-things, cloud computing and big data centers calls for more fresh graduates with expertise in digital data processing techniques such as compression, encryption and error correcting codes. This paper describes a project-based elective that covers these three main digital data processing techniques and can be offered to three different undergraduate majors electrical and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.