Image has been widely studied as an effective carrier of information steganography, however, low steganographic capacity is a technical problem that has not been solved in non-embedded steganography methods. In this p...
详细信息
ISBN:
(纸本)9783030953881;9783030953874
Image has been widely studied as an effective carrier of information steganography, however, low steganographic capacity is a technical problem that has not been solved in non-embedded steganography methods. In this paper, we proposed a carrier-free steganography method based on Wasserstein GAN. We segmented the target information and input it into the trained Wasserstein GAN, and then generated the visual-real image. The core design is that the output results are converted into images in the trained network according to the mapping relationship between preset coding information and random noise. The experimental results indicated that the proposed method can effectively improve the ability of steganography. In addition, the results also testified that the proposed method does not depend on the complex neural network structure. On this basis, we further proved that by changing the length of noise and the mapping relationships between coding information and noise, the number of generated images can be reduced, and the steganography ability and efficiency of the algorithm can be improved.
Video steganography is a knowledge that provides a secure connection by hiding the secret message in the video sequins. In this paper, we propose a new video steganography algorithm based on object motion which the se...
详细信息
ISBN:
(纸本)9781509043354
Video steganography is a knowledge that provides a secure connection by hiding the secret message in the video sequins. In this paper, we propose a new video steganography algorithm based on object motion which the secret information is embedded in motion vectors of moving objects. Therefore by using the mean shift algorithm the existed objects in each frame are detected. Based on motion estimation algorithm in B and P frames, motion vectors of each object with quarter pixel accuracy are extracted. To ensure that the selected motion vectors are belong to the object and also have a desire balance between capacity and video quality, a threshold value is defined. So the motion vectors whose value are greater than the threshold value are selected. The secret message is embedded in one-quarter both horizontal and vertical component of each selected motion vector. The result shows that the proposed algorithm can embed a large amount data in motion object and achieved a good video quality.
The growing risk of cyber security needs to be urgently addressed as data is one of the most important assets to be taken care of during transmission over the internet. Data security generally means protecting data fr...
详细信息
ISBN:
(纸本)9781509020843
The growing risk of cyber security needs to be urgently addressed as data is one of the most important assets to be taken care of during transmission over the internet. Data security generally means protecting data from intruders and unauthorized users or the persons other than the communicating parties. This not only provides high security but also prevent data from modification. To improve the security features in case of data transfers over the internet, the techniques that have been known till now are like Cryptography, Steganography. Where Cryptography is defined as the method to conceal information by encrypting plaintexts to cipher texts and later transmitting it to the intended recipient using an unknown key, on the other hand Steganography provides or say extends security further to a high level by hiding the cipher text into text, image or other formats. Watermarking and fingerprinting are the other two technologies used parallel with steganography in the field of data hiding. Watermarking is the practice of imperceptibly altering work to embed a secret message, concerned with the protection of intellectual property, while unique marks are embedded in the cover object that are received by different people in fingerprinting. In this paper, we are presenting some views in the development of image steganography, the particular field is selected because of its good capability to hide data without easily discoverable by the human visual system.
This paper contains a description and analysis of a new steganographic method, called LaTEsteg, designed for LTE (Long Term Evolution) systems. The LaTEsteg uses physical layer padding of packets sent over LTE network...
详细信息
ISBN:
(纸本)9781479951031
This paper contains a description and analysis of a new steganographic method, called LaTEsteg, designed for LTE (Long Term Evolution) systems. The LaTEsteg uses physical layer padding of packets sent over LTE networks. This method allows users to gain additional data transfer that is invisible to unauthorized parties that are unaware of hidden communication. Three important parameters of the LaTESteg are defined and evaluated: performance, cost and security.
According to the analysis of Haar wavelet decomposing characteristics and the demonstration about high order statistics invariability, a new embedding scheme resisting high-order statistics analysis is presented. In o...
详细信息
ISBN:
(纸本)9780769535579
According to the analysis of Haar wavelet decomposing characteristics and the demonstration about high order statistics invariability, a new embedding scheme resisting high-order statistics analysis is presented. In order to resist steganalysis, the hiding method to preserve high order statistics of H, V, and D sub-bands of images decomposed by Haar wavelet and the approach to generate the set of random embedding location are devised. Finally, the capability of proposed algorithm is discussed in theory and proved by experiments. The results show it possesses perfect imperceptibility and resistance to high order statistics analysis and RS attack.
暂无评论