Filters








2,267 Hits in 5.7 sec

The Study of Data Hiding in Medical Images

Li-Chin Huang, Lin-Yu Tseng, Min-Shiang Hwang
2012 International Journal of Network Security  
Reversible data hiding is one of the feasible methodologies to protect the individual privacy and confidential information.  ...  However, most data hiding methods are still applied in 8-bit depth medical images with 255 intensity levels.  ...  Acknowledgments We would like to thank National Cancer Institute for providing the CT image data used in this study.  ... 
dblp:journals/ijnsec/HuangTH12 fatcat:wsmdwhou55dqvhoyzuyrv2evha

Secure Image Hiding Algorithm using Cryptography and Steganography

Hemlata Sharma
2013 IOSR Journal of Computer Engineering  
In the present scenario, any communication of internet and networks application requires security.Lots of data security and data hiding algorithms have been developed in the last decade.Cryptography and  ...  steganography are the two major techniques for secret communication.In this paper,the secret image is first encrypted by using BLOWFISH algorithm which has very good performance and is a most powerful  ...  We would also like to thank Mr. Sayed Mujahed Hussaini, NIELIT centre, Aurangabad for continuing to provide support and motivation.  ... 
doi:10.9790/0661-1350106 fatcat:ufv3vx7pd5banok7b5eh7bup7y

Reversible Data Hiding in JPEG Images Using Ordered Embedding

2017 KSII Transactions on Internet and Information Systems  
This paper proposes a novel method of reversible data hiding in JPEG images.  ...  Instead of embedding data into the histogram of all coefficients, we propose a strategy of ordered embedding to hide data by histogram shifts in several rounds.  ...  Since the data hiding procedure did not change the zero-run-length R, reconstructed map is the same as the one constructed from the original image.  ... 
doi:10.3837/tiis.2017.02.017 fatcat:ztrngyiscrex7emaeakqu4wsbm

Hiding from Whom?

Ksenia Ermoshina, Francesca Musiani
2018 intermédialités  
ACKNOWLEDGEMENTS The authors would like to extend their deepest gratitude to a number of individuals who have provided support and feedback in the production of this report, including (in alphabetical  ...  It is not hyperbolic to say that a decision by a major company like Google, Apple, Facebook or Microsoft to move away from passphrase-based keys and toward biometric ones could fundamentally erase the  ...  derive the secret key from a secret value known only to an individual user, or subject to the exclusive control of that user.  ... 
doi:10.7202/1058473ar fatcat:z2x3cfbpczehjgpmlzxjsfkrd4

Hydan: Hiding Information in Program Binaries [chapter]

Rakan El-Khalil, Angelos D. Keromytis
2004 Lecture Notes in Computer Science  
Such a scheme can be used to watermark (or fingerprint) code, sign executables, or simply create a covert communication channel.  ...  We define sets of functionally-equivalent instructions, and use a key-derived selection process to encode information in machine code by using the appropriate instructions from each set.  ...  Acknowlegements We are greatly indebted to Michael Mondragon for The Bastard disassembler, libdisasm, and much guidance. Thanks to El Rezident for the PE/COFF parsing code.  ... 
doi:10.1007/978-3-540-30191-2_15 fatcat:plvwxx5hvzdtxcbyeev7sswwf4

Detecting the fingerprint of video data hiding tool OpenPuff

Yu Wang, Xianfeng Zhao, Yun Cao
2020 Forensic Science International: Reports  
A B S T R A C T This paper proposes an effective fingerprint detection method against the video steganography and watermarking of OpenPuff, one of the leading tools for its capability to securely hide  ...  Experimental works have been done to demonstrate the effectiveness of our proposed method where hundreds of videos in pairs are tested.  ...  The fingerprint detection 40 method is easily implemented with incredible accuracy against OpenPuff. a prevailing data hiding application made easy, safe and 50 free that allows you to hide data into encrypted  ... 
doi:10.1016/j.fsir.2020.100088 fatcat:3w6ltqlb5jazpdu4cr4jawihli

LSB Data Hiding in Digital Media: A Survey

Dang Tran, Hans-Jürgen Zepernick, Thi Chu
2022 EAI Endorsed Transactions on Industrial Networks and Intelligent Systems  
Digital media such as audio, image, video, and three-dimensional (3D) media can act as cover objects to carry such secret data.  ...  Given the classification of data hiding methods with respect to audio, image, video, and 3D media, a comprehensive survey of LSB data hiding for each of these four digital media is provided.  ...  Information hiding includes copyright and ownership protection of digital media using watermarking, authentication based on fingerprinting, and communicating secret data using a suitable carrier.  ... 
doi:10.4108/eai.5-4-2022.173783 fatcat:iupulvy6lrbwtglrvukb6gzrue

Hiding Information in Flash Memory

Yinglei Wang, Wing-kei Yu, S. Q. Xu, E. Kan, G. E. Suh
2013 2013 IEEE Symposium on Security and Privacy  
This paper introduces a novel information hiding technique for Flash memory. The method hides data within an analog characteristic of Flash, the program time of individual bits.  ...  Even if an attacker checks a Flash chip's analog characteristics, experimental results indicate that the hidden information is difficult to distinguish from inherent manufacturing variation or normal wear  ...  Then, for each data set, the SVM was trained with data from 3 chips and then tested on data from one remaining chip. This construction represents an idealistic scenario for an attacker.  ... 
doi:10.1109/sp.2013.26 dblp:conf/sp/WangYXKS13 fatcat:zqblagqkqbadte4fxflhhfynby

Resilient Information Hiding for Abstract Semi-structures [chapter]

Radu Sion, Mikhail Atallah, Sunil Prabhakar
2004 Lecture Notes in Computer Science  
Most work on watermarking has resulted in techniques for different types of data: image, audio, video, text/language, software, etc.  ...  Our solution is based on a canonical labeling algorithm that selfadjusts to the specifics of the content.  ...  Data hiding in general and covert communication in particular, aims at enabling Alice and Bob to exchange messages in a manner as stealthy as possible, through a medium controlled by evil Mallory.  ... 
doi:10.1007/978-3-540-24624-4_11 fatcat:rfdcssahxfdrjh5wcr2enhkobu

Information Hiding Based on Statistical Features of Self-Organizing Patterns

Loreta Saunoriene, Kamilija Jablonskaite, Jurate Ragulskiene, Minvydas Ragulskis
2022 Entropy  
The transition from the small-scale chaos of the initial conditions to the large-scale chaos of the developed pattern is observed during the evolution of the self-organizing system.  ...  A computational technique for the determination of optimal hiding conditions of a digital image in a self-organizing pattern is presented in this paper.  ...  Local deformations of the elements of the pattern help to hide the secret image.  ... 
doi:10.3390/e24050684 pmid:35626568 pmcid:PMC9141792 fatcat:gi7ufhta2rdwhjyrclsizaqlhq

`Print and Scan' Resilient Data Hiding in Images

Kaushal Solanki, Upamanyu Madhow, B. S. Manjunath, Shiv Chandrasekaran, Ibrahim El-Khalil
2006 IEEE Transactions on Information Forensics and Security  
Print-scan resilient data hiding finds important applications in document security and image copyright protection.  ...  This paper proposes methods to hide information into images that achieve robustness against printing and scanning with blind decoding.  ...  We would also like to thank J. Byun for helpful discussions on derotation techniques.  ... 
doi:10.1109/tifs.2006.885032 fatcat:q2kzcdjiwzh57iyyk5xdaesy5i

Digital Watermarking using Ant Colony Optimization in Fractional Fourier Domain

Hameed Al-Qaheri, Abhijit Mustafi, Soumya Banerjee
2010 Journal of Information Hiding and Multimedia Signal Processing  
The essential construct of ACO is pheromone; hence the detection part of watermark is followed through ant's pheromone trace.  ...  Finally, the results of the proposed algorithms are presented in terms of improved RMSE index of the watermarked retrieved image after comparing with other contemporary works.  ...  Modern steganography attempts to be detectable only if secret information is known namely, a secret key [1, 10] .  ... 
dblp:journals/jihmsp/Al-QaheriMB10 fatcat:qsyp6spl2bfnxgk257xg77ea5a

A new multilevel reversible bit-planes data hiding technique based on histogram shifting of efficient compressed domain

Rashid Abbasi, Bin Luo, Gohar Rehman, Haseeb Hassan, Muhammad Shahid Iqbal, Lixiang Xu
2018 Vietnam Journal of Computer Science  
In this paper, we proposed a new technique for reversible data hiding based on efficient compressed domain with multiple bit planes.  ...  We conducted a sequence of experiments to use block division scheme to appraise the result with different parameters and amended the probability of zero point in every block of histogram.  ...  the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.  ... 
doi:10.1007/s40595-018-0114-z fatcat:etiywr4r5nhy5hgiffvlqcqeke

A Freeport Comes to Luxembourg, or, Why Those Wishing to Hide Assets Purchase Fine Art

Samuel Weeks
2020 Arts  
This article addresses how global art markets are becoming an outlet of choice for those wishing to hide assets. Recent efforts by the OECD and the U.S.  ...  Citing data collected in Luxembourg—a jurisdiction angling to become a worldwide leader in "art finance"—I discuss the characteristics of this emerging system of opaque economic activity.  ...  Data were collected from 12 individuals during semi-structured interviews and via participant observation, which took place from December 2015 to July 2016.  ... 
doi:10.3390/arts9030087 fatcat:kw74fm7qxzf6jnzqatedloqucm

An overview of steganography techniques applied to the protection of biometric data

Mandy Douglas, Karen Bailey, Mark Leeney, Kevin Curran
2017 Multimedia tools and applications  
This paper presents an overview of steganography techniques applied in the protection of biometric data in fingerprints.  ...  Techniques such as watermarking and steganography have been used in attempt to improve security of biometric data.  ...  the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.  ... 
doi:10.1007/s11042-017-5308-3 fatcat:34lpiqcktrhnxazxmfsmqw6afe
« Previous Showing results 1 — 15 out of 2,267 results