With the popularity of adaptive multi-rate wideband (AMR-WB) audio in mobile communication, many AMR- WB based techniques, such as a similar compression architecture to transmit secret information during the process...
详细信息
With the popularity of adaptive multi-rate wideband (AMR-WB) audio in mobile communication, many AMR- WB based techniques, such as a similar compression architecture to transmit secret information during the process of compression, were proposed to transmit covert messages. However, if a sender does not have the original waveform audio format (WAV) audio, the architecture cannot be used. In this paper, a new covert message method, which takes effect after WAV audio is compressed into AMR-WB speech, is proposed. This method takes advantage of algebraic codebook search. Aiming at improving speed and reducing search space, it does not perform algebraic codebook search using the optimal search algorithm, and it does not reach the positions of non-zero pulses via depth-first tree search that characterizes the energy of audio. According to the features of search methods and the codebook index construction, every track in each subframe is analyzed to find the proper positions for embedding secret information. Experimental results show that the proposed method has satisfactory capacity and simplicity regardless of compression process.
In this paper, the authors propose a new algorithm to hide data inside image using steganography technique. The proposed algorithm uses binary codes and pixels inside an image. The zipped file is used before it is con...
详细信息
In this paper, the authors propose a new algorithm to hide data inside image using steganography technique. The proposed algorithm uses binary codes and pixels inside an image. The zipped file is used before it is converted to binary codes to maximize the storage of data inside the image. By applying the proposed algorithm, a system called steganography Imaging System (gig) is developed. The system is then tested to see the viability of the proposed algorithm. Various sizes of data are stored inside the images and the Peak signal-to-noise ratio (PSNR) is also captured for each of the images tested. Based on the PSNR value of each images, the stego image has a higher PSNR value. Hence this new steganography algorithm is very efficient to hide the data inside the image.
The mainstream adaptive steganography algorithm is difficult to resist scaling attack, and the anti-detection performance of the algorithm based on quantization index modulation is not high enough. To solve the above ...
详细信息
The mainstream adaptive steganography algorithm is difficult to resist scaling attack, and the anti-detection performance of the algorithm based on quantization index modulation is not high enough. To solve the above problems, this paper proposes a spatial image adaptive steganography algorithm based on Zernike moment to resist scaling attack and statistic detection. First, the Zernike moment of the normalized cover image is extracted and the new cover is obtained by the dither modulation algorithm. Second, the minimized distortion embedding is realized by Spatial UNIversal WAvelet Relative Distortion (S-UNIWARD) and syndrome-trellis codes coded. And finally, the stego image is generated by changing the original Zernike moment according to the modified amplitude of the new cover. The experimental results show that the proposed algorithm is robust to the three common scaling attacks, and the message extraction error rate is significantly lower than the S-UNIWARD steganography after the scaling attacks;moreover, compared with the steganography algorithm based on quantization index modulation, the proposed algorithm has higher detection resistance.
In recent years as many of our daily tasks are related to internet the security of information being transmitted over the internet is an important issue. Many applications or fields require transmitting secret image o...
详细信息
ISBN:
(纸本)9781479968183
In recent years as many of our daily tasks are related to internet the security of information being transmitted over the internet is an important issue. Many applications or fields require transmitting secret image over the internet that may contain private and confidential information that is needed to be protected from hacker or from unintended users. Many techniques and methods have been proposed to ensure security, out of them most commonly used techniques are encryption and data hiding. Encryption ensures security but the problem with encryption algorithm is that the resultant noise image attracts the attention of hacker so it may be possible after many trials they can be decrypted by hacker. Another method is data hiding in which pieces of secret information is hidden behind a carrier that may be anything a text file, video, audio or an image. Now a day's, for secure image transmission a new concept that is of mosaic image is used in the field of data hiding. A new type of mosaic image that is called as secret fragment visible mosaic is formed to hide the existence of secret image by using a carrier image. In this paper a new technique for creating a secret fragment visible mosaic image is proposed, in which we select any random image of any size as carrier image for given secret image and by using this target image we arrange the titles of secret image to form resultant mosaic image and we performed reversible color transformation on mosaic image to reduce the distortion and also to recover the secret image exactly from the carrier image.
Data hiding is a technique used for embedding secret messages in a carrier medium which cannot be perceived by human eye. In the data hiding scheme based on the magic matrix, previous methods exploited a magic matrix ...
详细信息
ISBN:
(纸本)9781728138213
Data hiding is a technique used for embedding secret messages in a carrier medium which cannot be perceived by human eye. In the data hiding scheme based on the magic matrix, previous methods exploited a magic matrix with various shapes to carry secret messages, but the embedding capacity was often limited. Inspired by the magic matrix scheme using magic signet proposed by Lee et al., the proposed method develops a double-layer magic matrix scheme to enhance the embedding capacity. Under the framework of a double-layer matrix, we tested many combinations of different signet sizes which can carry secret data in various notational number systems. The experimental results show that the proposed scheme had a higher embedding capacity and good image quality compared to the previous methods.
In recent years as many of our daily tasks are related to internet the security of information being transmitted over the internet is an important issue. Many applications or fields require transmitting secret image o...
详细信息
ISBN:
(纸本)9781479968190
In recent years as many of our daily tasks are related to internet the security of information being transmitted over the internet is an important issue. Many applications or fields require transmitting secret image over the internet that may contain private and confidential information that is needed to be protected from hacker or from unintended users. Many techniques and methods have been proposed to ensure security, out of them most commonly used techniques are encryption and data hiding. Encryption ensures security but the problem with encryption algorithm is that the resultant noise image attracts the attention of hacker so it may be possible after many trials they can be decrypted by hacker. Another method is data hiding in which pieces of secret information is hidden behind a carrier that may be anything a text file, video, audio or an image. Now a day's, for secure image transmission a new concept that is of mosaic image is used in the field of data hiding. A new type of mosaic image that is called as secret fragment visible mosaic is formed to hide the existence of secret image by using a carrier image. In this paper a new technique for creating a secret fragment visible mosaic image is proposed, in which we select any random image of any size as carrier image for given secret image and by using this target image we arrange the titles of secret image to form resultant mosaic image and we performed reversible color transformation on mosaic image to reduce the distortion and also to recover the secret image exactly from the carrier image.
暂无评论