Filters








21,243 Hits in 3.9 sec

Security of spread-spectrum-based data hiding

Luis Pérez-Freire, Pierre Moulin, Fernando Pérez-González
2007 Security, Steganography, and Watermarking of Multimedia Contents IX  
This paper presents an information-theoretic analysis of security for data hiding methods based on spread spectrum.  ...  The security is quantified by means of the mutual information between the observed watermarked signals and the secret carrier (a.k.a. spreading vector) that conveys the watermark, a measure that can be  ...  INTRODUCTION This paper considers the security of spread spectrum methods for data hiding from an information-theoretic perspective.  ... 
doi:10.1117/12.704176 dblp:conf/sswmc/Perez-FreireMP07 fatcat:sr2ip7l64rbvjioyxnnfur6wce

Spread-spectrum vs. quantization-based data hiding: misconceptions and implications

Luis Perez-Freire, Fernando Perez-Gonzalez, Edward J. Delp III, Ping W. Wong
2005 Security, Steganography, and Watermarking of Multimedia Contents VII  
The performance of quantization-based data hiding methods is commonly analyzed by assuming a flat probability density function for the host signal, i.e. uniform inside each quantization cell and with its  ...  The accomplished analysis reveals that the true performance of such a scheme for an optimal selection of its parameters and low watermark to noise ratios (WNR) is never worse than that of classical spread-spectrum-based  ...  From the performance analysis made so far, 2, 3 it can be drawn the misleading conclusion that spread spectrum (SS) methods for data hiding perform better than quantization-based ones in AWGN channels  ... 
doi:10.1117/12.587790 dblp:conf/sswmc/Perez-FreireP05 fatcat:ir4x2qihtvdf7lzjxakjmi4xvu

Locally most-powerful detector for secret key estimation in spread spectrum image steganography

Shalin P. Trivedi, Rajarathnam Chandramouli, Edward J. Delp III, Ping W. Wong
2004 Security, Steganography, and Watermarking of Multimedia Contents VI  
A wavelet watermarking algorithm based on a tree structure p. 571 Classification of watermarking schemes robust against loss of synchronization p. 581 Quantifying security leaks in spread spectrum  ...  274 Capacity of data-hiding system subject to desynchronization p. 286 Adaptive quantization watermarking p. 296 Secure background watermarking based on video mosaicing p. 304 Synchronization  ... 
doi:10.1117/12.521394 dblp:conf/sswmc/TrivediC04 fatcat:nxfcw6hmrvcpthtwevgzkbhioq

A chaos-based approach for information hiding security [article]

Jacques M. Bahi, Christophe Guyeux
2010 arXiv   pre-print
The objective of this study is to enrich the existing notions of data hiding security with a new rigorous and practicable one.  ...  This paper introduces a new framework for data hiding security. Contrary to the existing ones, the approach introduced here is not based on probability theory.  ...  It can be proven that data hiding schemes based on chaotic iterations are chaotic secure, with the additional property of strong transitivity, as it is the case of spread-spectrum.  ... 
arXiv:1005.0704v1 fatcat:xnt4tdf6k5b5ff6km6u5r75ejm

Audio Steganography to Protect the Confidential Information: A Survey

Elham Zinaly, Avaz Naghipour
2017 International Journal of Computer Applications  
Steganography is a science to hide information, it hides a message to another object, and it increases the security of data transmission and archiving it.  ...  In the process of steganography, the hidden object in which data is hidden the carrier object and the new object, is called the steganography object.  ...  Fig 6: General model of spread spectrum [15] There are two types of technology of spread spectrum that are called direct sequence spread spectrum (DSSS) and frequency hopping spread spectrum (FHSS).  ... 
doi:10.5120/ijca2017914561 fatcat:2ak4cvgbezdynmy7ktds52uklq

Chaotic iterations versus Spread-spectrum: chaos and stego security [article]

Christophe Guyeux, Nicolas Friot, Jacques M. Bahi
2011 arXiv   pre-print
It has been proven that spread-spectrum techniques, a well-known stego-secure scheme, are chaos-secure too.  ...  In this paper, the links between the two notions of security is deepened and the usability of chaos-security is clarified, by presenting a novel data hiding scheme that is twice stego and chaos-secure.  ...  Spread-spectrum data-hiding techniques have been widely studied in recent years under the scope of security.  ... 
arXiv:1005.0705v3 fatcat:m4isvw6s75gepgiztlaru6w3ny

A Recent Review of MP3 Based Steganography Methods

Mohsen Bazyar, Rubita Sudirman
2014 International Journal of Security and Its Applications  
Steganography, the idea of hiding messages and data within other pieces of data, can be useful in many real world applications alongside encryption and other code-writing methods.  ...  Data hiding methods are a new kind of technology in secret communication. Multimedia objects like audio are the most used in today's information hiding systems.  ...  Xin Li Hong Heather Yu This paper studies audio data hiding in the subband domain using the spread spectrum (SS) technique.  ... 
doi:10.14257/ijsia.2014.8.6.35 fatcat:54h5t5kwwvhirdmzdd42alfeoe

Chaotic iterations versus Spread-spectrum: topological-security and stego-security [article]

Christophe Guyeux, Nicolas Friot, Jacques M. Bahi
2011 arXiv   pre-print
It is based on the evaluation of unpredictability of the scheme, whereas existing notions of security, as stego-security, are more linked to information leaks.  ...  In this paper, the links between the two notions of security is deepened and the usability of topological-security is clarified, by presenting a novel data hiding scheme that is twice stego and topological-secure  ...  Spread-spectrum data-hiding techniques have been widely studied in recent years under the scope of security.  ... 
arXiv:1112.3874v1 fatcat:s4jvik4xdnf4peatidiwr3txya

Toward network steganography detection

Krzysztof Szczypiorski, Wojciech Mazurczyk
2010 Telecommunications Systems  
Maity, Seba Maity, and Jaya Sil describe in their paper "Multicarrier Spread Spectrum Watermarking for Secure Error Concealment in Fading Channel" a novel multicarrier spread spectrum watermarking scheme  ...  Maity and Claude Delpha in the paper "Image Error Concealment and Quality Access Control Based on Data Hiding and Cryptography" showed a data hiding scheme that integrates the dual purpose of error concealment  ...  His main research interests are information hiding techniques, network security and multimedia services, and he is also a research leader of the Network Security Group at WUT (secgroup.pl).  ... 
doi:10.1007/s11235-010-9361-8 fatcat:um3juyfbmrcrhmsc2l6i6ze6my

Chaotic Iterations versus Spread-Spectrum: Chaos and Stego Security

Christophe Guyeux, Nicolas Friot, Jacques M. Bahi
2010 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing  
This last scheme has better scores than spread-spectrum when evaluating qualitative and quantitative chaos-security properties.  ...  It is based on the evaluation of unpredictability of the scheme, whereas existing notions of security, as stego-security, are more linked to information leaks.  ...  Spread-spectrum data-hiding techniques have been widely studied in recent years under the scope of security.  ... 
doi:10.1109/iihmsp.2010.59 dblp:conf/iih-msp/GuyeuxFB10 fatcat:24tbzwqiirhxbiepqvwkju5d4i

Review of an Improved Audio Steganographic Technique over LSB through Random Based Approach

Bhagyashri A. Patil
2013 IOSR Journal of Computer Engineering  
The proposed system hides secret information in audio file through random based approach and provides security by using PKE algorithm.  ...  The need for secured communication introduces the concept of "Steganography".  ...  Among many different data hiding techniques proposed to embed secret message within audio file, the random rit data hiding technique is one of the secured methods for inserting data into audio signals  ... 
doi:10.9790/0661-0913034 fatcat:iszzgn52qngalpapat5hf3cxz4

Embedding Text in Audio Steganography System using Advanced Encryption Standard, Text Compression and Spread Spectrum Techniques in Mp3 and Mp4 File Formats

Adeboje Olawale, Adetunmbi Adebayo, Gabriel Arome
2020 International Journal of Computer Applications  
Audio steganography hides data in selected audio files.  ...  This research attempts to proffer solution to the obvious challenges of the previous works by developing an efficient and robust audio steganography system for the security of information whether in store  ...  The most crucial parameters of the data-hiding applications are: security, reliability, invisibility, complexity, and data-hiding capacity, these parameters are mostly related to each other [14] .  ... 
doi:10.5120/ijca2020919914 fatcat:2v3shuzv7fczfp737pub2hnbmy

Performance Improvement Of Spread Spectrum Additive Data Hiding Over Codec-Distorted Voice Channels

Ali Akhaee, Ferydon Behnia, Mehdi Boloursaz, Reza Kazemi
2014 Zenodo  
Publication in the conference proceedings of EUSIPCO, Lisbon, Portugal, 2014  ...  In this research the method of additive Spread Spectrum (SS) data hiding [13, 14, 15, 16] is used to embed covert data in the voice signal.  ...  The fact of cover nonstationarity seems to be overlooked by previous researches on spread spectrum Data Hiding [13, 14, 15] .  ... 
doi:10.5281/zenodo.44113 fatcat:fyuhbxlgibgjdiwmf4ahabvn4m

Steganography on multiple MP3 files using spread spectrum and Shamir's secret sharing

N. M. Yoeseph, F. A. Purnomo, B. K. Riasti, M. A. Safiie, T. N. Hidayat
2016 Journal of Physics, Conference Series  
The purpose of steganography is how to hide data into another media. In order to increase security of data, steganography technique is often combined with cryptography.  ...  In steganography with secret sharing, shares of data is created and hidden in several medium. Medium used to concealed shares were MP3 files. Hiding technique used was Spread Spectrum.  ...  Steganographic system is constructed by combining a spread spectrum technique with Shamir's Secret Sharing can perform data hiding inside some of the audio files to MP3 format as the media cover.  ... 
doi:10.1088/1742-6596/776/1/012089 fatcat:yzffv4bg55fu3jdugwgw4ijf6a

Digital invisible ink and its applications in steganography

Chun-Hsiang Huang, Shang-Chih Chuang, Ja-Ling Wu
2006 Proceeding of the 8th workshop on Multimedia and security - MM&Sec '06  
A novel information-hiding methodology denoted as digital invisible ink is introduced.  ...  To facilitate such behavior, models and implementations based on both spreadspectrum and quantization-based watermarking approaches are investigated.  ...  The iterative informed-embedding scheme for the DII spread-spectrum data-hiding system Does this iterative informed-embedding scheme satisfy the two requirements of DII spread-spectrum data hiding?  ... 
doi:10.1145/1161366.1161372 dblp:conf/mmsec/HuangCW06 fatcat:nju6q2cwijbgdjntqdb2ln7z5e
« Previous Showing results 1 — 15 out of 21,243 results