Filters








91 Hits in 6.7 sec

Digital invisible ink and its applications in steganography

Chun-Hsiang Huang, Shang-Chih Chuang, Ja-Ling Wu
2006 Proceeding of the 8th workshop on Multimedia and security - MM&Sec '06  
To facilitate such behavior, models and implementations based on both spreadspectrum and quantization-based watermarking approaches are investigated.  ...  A novel information-hiding methodology denoted as digital invisible ink is introduced.  ...  Models based on important blind-detection data-hiding schemes, including spread-spectrum approaches and quantization-based techniques, are also illustrated.  ... 
doi:10.1145/1161366.1161372 dblp:conf/mmsec/HuangCW06 fatcat:nju6q2cwijbgdjntqdb2ln7z5e

Overview of Digital Steganography Methods and Its Applications

V. Nagaraj, V. Vijayalakshmi, G. Zayaraz
2013 International Journal of Advanced Science and Technology  
Even though the term Steganography has been known for thousands of years, its digital form came about only lately and research was make stronger after the depressing event on 11 th Sep 2001(Twin towers  ...  This paper completes with some recommendations and advantages of Steganography techniques and current research scopes.  ...  two approaches are used in this technique: the direct sequence spread spectrum (DSSS) and frequency hopping spread spectrum (FHSS).  ... 
doi:10.14257/ijast.2013.60.05 fatcat:gkykkxfae5hozd4cnykoilma44

A Survey on Audio Steganography Approaches

Kamred UdhamSingh
2014 International Journal of Computer Applications  
In this paper we will survey the overall principles of hiding secret data in audio file using audio data hiding techniques, and deliver an overview of present techniques and functions and also discuss  ...  Today's internet community the secure data transfer is bounded due to its attack on data communication. Security of data can be achieved by implementing steganography techniques.  ...  Other historical tricks include tiny pin punctures on selected characters, invisible inks, pencil marks on type written characters and so on. Steganography is dissimilar from cryptography.  ... 
doi:10.5120/16660-6640 fatcat:vp7lmry2kvcrpfnl4hwrghrgla

Spread spectrum image steganography

L.M. Marvel, C.G. Boncelet, C.T. Retter
1999 IEEE Transactions on Image Processing  
Image restoration, error-control coding, and techniques similar to spread spectrum are described, and the performance of the system is illustrated.  ...  In this paper, we present a new method of digital steganography, entitled spread spectrum image steganography (SSIS).  ...  ACKNOWLEDGMENT The authors would like to take this opportunity to thank the anonymous reviewers for their efforts and insightful suggestions.  ... 
doi:10.1109/83.777088 pmid:18267522 fatcat:jzwxob5nbrf4lpbojewv2a6wpq

Overview: Main Fundamentals for Steganography [article]

Zaidoon Kh. AL-Ani, A.A.Zaidan, B.B.Zaidan, Hamdan.O.Alanazi
2010 arXiv   pre-print
The rapid development of multimedia and internet allows for wide distribution of digital media data.  ...  It becomes much easier to edit, modify and duplicate digital information .Besides that, digital documents are also easy to copy and distribute, therefore it will be faced by many threats.  ...  Since spread signals tend to be difficult to remove, embedding methods based on SS should provide a considerable level of robustness .In information hiding, two special variants of spread spectrum techniques  ... 
arXiv:1003.4086v1 fatcat:spalfy5lufcqli5wb2w5n3ghvm

State-of-the-art Review on Steganographic Techniques

Satwinder Singh, Varinder Kaur Attri
2015 International Journal of Signal Processing, Image Processing and Pattern Recognition  
Data hiding can be achieved be using Digital Steganography. Digital Steganography is art of hiding secret messages behind the innocent looking digital media.  ...  There are number of security attacks related to information security and number of techniques has been implemented to prevent these attacks. Data hiding is related field to information security.  ...  Spread Spectrum Steganography Spread spectrum is very famous technique in digital and wireless communication.  ... 
doi:10.14257/ijsip.2015.8.7.15 fatcat:3qt4qjuqivhopnnh5biwpgktiy

Steganography Schemes for Data & Information Protection

Jerry A. Sarumi, Department of Computer Science, Lagos State Polytechnic, Ikorodu, Lagos, Nigeria Faculty of Computational Sciences & Informatics, Academic City University, Accra, Ghana, Olumide Babatope Longe
2021 Advances in Multidisciplinary & Scientific Research Journal Publication  
In ensuring the security of data and information researchers have come up with different schemes and techniques that can provide protection for data and information during transmission.  ...  In this digital world of data transmission, information is at the heart of computers, transactions and international economic dealings.  ...  such as coding techniques for text, usage of invisible inks, and incorporating hidden messages in music.  ... 
doi:10.22624/aims/abmic2021p7 fatcat:3qol7ysl2vdmbmy2ws6wetoauu

Codebook Code Division Multiple Access Image Steganography

S. Surin, D. Levicky
2005 Radioengineering  
Our method is based on CDMA SSIS technique.  ...  In this paper, a new modification of spread spectrum imagesteganography (SSIS) is presented.  ...  Acknowledgements The work presented in this paper was supported by the Grant of the Ministry of Education and the Academy of Science of the Slovak Republic VEGA under Grant No. 1/1057/04.  ... 
doaj:b09d59786cf74e6698ca3e89631a5517 fatcat:purp3ajwabhcxn37ctcdpdh2me

A Study of Steganography Based Data Hiding Techniques

Vijay Kumar Sharma, Devesh Kr Srivastava, Pratistha Mathur
2017 International Journal of Emerging Research in Management and Technology  
This paper presents a review on steganography techniques and their uses and attacks on these. The steganography is commonly known as covert writing and mainly used in hidden communication.  ...  Many information system security techniques are available. They are classified into three classes as cryptography, steganography and watermarking.  ...  Other techniques of steganography include spread spectrum steganography, statistical steganography, distortion, and cover generation steganography. VI.  ... 
doi:10.23956/ijermt/sv6n4/134 fatcat:icrro5cf6zcmfcfpxbp243ztxe

Hiding Image in Audio using DWT and LSB

Neha gupta, Nidhi Sharma
2013 International Journal of Computer Applications  
Later on the spread of internet, information can be sent easily and quickly .Still, at the same time the sent data was easily intercepted and uncovered by hackers.  ...  The emphasize will be on the proposed scheme of image hiding in audio and its comparison with simple Least Significant Bit insertion method for data hiding in audio.  ...  Literally meaning "covered writing", it includes a wide range of secret communication methods like invisible inks, microdots, character arrangement, digital signatures, covert channels, spread spectrum  ... 
doi:10.5120/13983-1988 fatcat:yna77jvocfclpbmvhhfnoo55bi

Effective Security Mechanism for Audio Steganography

Garima Malik
2017 IARJSET  
A hybrid method for audio steganography (using modified Direct Sequence Spread spectrum) and cryptography (using advanced random permutation with multiple key applications) has been proposed in this paper  ...  .  Get spreading size by multiplying spreading factor i.e. 2 with total number of elements of binary watermark matrix and generate a random binary key sequence according to spreading size, so as to provide  ...  Spread Spectrum Technique These techniques are derived from the concepts used in spread spectrum communication [17] .  ... 
doi:10.17148/iarjset.2017.4717 fatcat:rfmznrvfbjgnloz5hdi54xvwia

Data Sneaking: A White Paper in Steganography

2020 Journal of the ACS Advances in Computer Science  
These methods include invisible inks, microdots, character arrangement, digital signatures, covert channels, and spread spectrum communications.  ...  Digital technology gives us new ways to apply steganographic techniques, including one of the most trickery that of hiding information in multimedia likes image, audio and video.  ...  Shilong Ma in Beijing University of Aeronautics and Astronautics (BUAA), China.  ... 
doi:10.21608/asc.2020.176270 fatcat:prx2bwu7wnddzgiwecdas4rkra

Information Hiding Techniques: A Tutorial Review [article]

Sabu M. Thampi
2008 arXiv   pre-print
Text, image and audio based information hiding techniques are discussed. This paper also provides a basic introduction to digital watermarking.  ...  The purpose of this tutorial is to present an overview of various information hiding techniques. A brief history of steganography is provided along with techniques that were used to hide information.  ...  The two different spread-spectrum techniques these tools employ are called direct-sequence and frequency hopping.  ... 
arXiv:0802.3746v1 fatcat:hbrfhubuajeihgny3g6pfehwqy

Hide and Seek: A White Paper in Steganography

2013 Journal of the ACS Advances in Computer Science  
These methods include invisible inks, microdots, character arrangement, digital signatures, covert channels, and spread spectrum communications.  ...  Digital technology gives us new ways to apply steganographic techniques, including one of the most trickery that of hiding information in multimedia likes image, audio and video.  ...  Shilong Ma in Beijing University of Aeronautics and Astronautics (BUAA), China.  ... 
doi:10.21608/asc.2013.158158 fatcat:qciwsghsmfajzkz3kqaubhdspy

Image Steganography: Critical Findings through Some Novel Techniques

2020 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
Word 'Steganography' is originated from Greekand has been used in several forms for 2500 years which is a art of hiding confidential data in any digital manner in such a way that no one can concealed it  ...  This survey paper put the light on the basic of image steganography along with its different techniques and sub-techniques. Cover selection with recent trend ROI (region Of Interest) is highlighted.  ...  by German people and Invisible ink were used for hiding the data in invisible manner [17] .  ... 
doi:10.35940/ijitee.e2634.039520 fatcat:zuqertcqsbhevgd6dqotkuumme
« Previous Showing results 1 — 15 out of 91 results