Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 16 of 16

Full-Text Articles in Computer Engineering

Image Hiding Using Qr Factorization And Discrete Wavelet Transform Techniques, Reham Ahmed El-Shahed, Maryam Al-Berry, Hala Ebied, Howida Shedeed Nov 2021

Image Hiding Using Qr Factorization And Discrete Wavelet Transform Techniques, Reham Ahmed El-Shahed, Maryam Al-Berry, Hala Ebied, Howida Shedeed

Future Computing and Informatics Journal

Steganography is one of the most important tools in the data security field as there is a huge amount of data transferred each moment over the internet. Hiding secret messages in an image has been widely used because the images are mostly used in social media applications. The proposed algorithm is a simple algorithm for hiding an image in another image. The proposed technique uses QR factorization to conceal the secret image. The technique successfully hid a gray and color image in another one and the performance of the algorithm was measured by PSNR, SSIM and NCC. The PSNR for …


Stegogis: A New Steganography Method Using The Geospatial Domain, Ömer Kurtuldu, Mehmet Demi̇rci̇ Jan 2019

Stegogis: A New Steganography Method Using The Geospatial Domain, Ömer Kurtuldu, Mehmet Demi̇rci̇

Turkish Journal of Electrical Engineering and Computer Sciences

Geographic data are used on a variety of computing devices for many different applications including navigation, tracking, location planning, and marketing. The prevalence of geographic data makes it possible to envision new useful applications. In this paper, we propose using geographic data as a medium for secret communication, or steganography. We develop a method called StegoGIS for hiding messages in geographic coordinates in the well-known binary of fast-moving objects and transmitting them secretly. We show that discovering this secret communication is practically impossible for third parties. We also show that a large amount of secret data can be transmitted this …


The Discrete Spring Transform: An Innovative Steganographic Attack, Aaron T. Sharp Jan 2017

The Discrete Spring Transform: An Innovative Steganographic Attack, Aaron T. Sharp

Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research

Digital Steganography continues to evolve today, where steganographers are constantly discovering new methodologies to hide information effectively. Despite this, steganographic attacks, which seek to defeat these techniques, have continually lagged behind. The reason for this is simple: it is exceptionally difficult to defeat the unknown. Most attacks require prior knowledge or study of existing techniques in order to defeat them, and are often highly specific to certain cover media. These constraints are impractical and unrealistic to defeat steganography in modern communication networks. It follows, an effective steganographic attack must not require prior knowledge or study of techniques, and must be …


A New Efficient Block Matching Data Hiding Method Based On Scanning Order Selection In Medical Images, Turgay Aydoğan, Cüneyt Bayilmiş Jan 2017

A New Efficient Block Matching Data Hiding Method Based On Scanning Order Selection In Medical Images, Turgay Aydoğan, Cüneyt Bayilmiş

Turkish Journal of Electrical Engineering and Computer Sciences

Digital technology and the widespread use of the Internet has increased the speeds at which digital data can be obtained and shared in daily life. In parallel to this, there are important concerns regarding the confidentiality of private data during data transmissions and the possibility that data might fall into the hands of third parties. Issues relating to data safety can also affect patients' medical images and other information relating to these images. In this study, we propose a new method based on block matching that can be used to hide the patient information in medical images. In this method, …


A Steganographic Approach To Hide Secret Data In Digital Audio Based On Xor Operands Triplet Property With High Embedding Rate And Good Quality Audio, Krishna Bhowal, Debasree Chanda Sarkar, Sushanta Biswas, Partha Pratim Sarkar Jan 2017

A Steganographic Approach To Hide Secret Data In Digital Audio Based On Xor Operands Triplet Property With High Embedding Rate And Good Quality Audio, Krishna Bhowal, Debasree Chanda Sarkar, Sushanta Biswas, Partha Pratim Sarkar

Turkish Journal of Electrical Engineering and Computer Sciences

In this paper, a unique and transparent data hiding algorithm based on XOR operands triplet (XOT) is proposed. In XOT, an XOR operation applied on any two members of a triplet provides the third member of the same triplet. Taking advantage of the low computational complexity and fascinating properties of the XOR operator, it is possible to embed 4-ary secret digits with negligible changes in the host digital audio. The proposed scheme has been designed to ensure that a minimum number of bit alterations happen in the host digital audio during the data hiding process, which also increases the security …


Dst Approach To Enhance Audio Quality On Lost Audio Packet Steganography, Qilin Qi, Dongming Peng, Hamid Sharif Jan 2016

Dst Approach To Enhance Audio Quality On Lost Audio Packet Steganography, Qilin Qi, Dongming Peng, Hamid Sharif

Department of Electrical and Computer Engineering: Faculty Publications

Lost audio packet steganography (LACK) is a steganography technique established on the VoIP network. LACK provides a high-capacity covert channel over VoIP network by artificially delaying and dropping a number of packets in use to convey stegnogram. However, the increasing loss of packets will hurt the quality of the VoIP service. The quality deterioration will not only affect the legitimate VoIP service but also constrain the capacity of the covert channel. Discrete spring transform (DST) is proven to be a way to eliminate the perceptual redundancy in the multimedia signal. In this paper, the DST is applied on the LACK …


Speech Steganalysis Based On The Delay Vector Variance Method, Osman Hi̇lmi̇ Koçal, Emrah Yürüklü, Erdoğan Di̇laveroğlu Jan 2016

Speech Steganalysis Based On The Delay Vector Variance Method, Osman Hi̇lmi̇ Koçal, Emrah Yürüklü, Erdoğan Di̇laveroğlu

Turkish Journal of Electrical Engineering and Computer Sciences

This study investigates the use of delay vector variance-based features for steganalysis of recorded speech. Because data hidden within a speech signal distort the properties of the original speech signal, we designed a new audio steganalyzer that utilizes delay vector variance (DVV) features based on surrogate data in order to detect the existence of hidden data. The proposed DVV features are evaluated individually and together with other chaotic-type features. The performance of the proposed steganalyzer method is also discussed with a focus on the effect of different hiding capacities. The results of the study show that using the proposed DVV …


A Study On Countermeasures Against Steganography: An Active Warden Approach, Qilin Qi Dec 2013

A Study On Countermeasures Against Steganography: An Active Warden Approach, Qilin Qi

Computer and Electronics Engineering: Dissertations, Theses, and Student Research

Digital steganography is a method used for hiding information in digital images. It can be used for secure communication. There have been many robust digital steganography methods invented in recent decades. The steganographic message can be inserted in multimedia cover signal such as audio, image and video. However, this technique also may be used by malicious users to transmit dangerous information through the Internet beyond the control of security agencies. How to detect and/or block potentially dangerous information transmission on the Internet through billions of multimedia files while not affecting innocent multimedia communications becomes a challenging problem. Existing steganalysis methods …


Adaptive Threshold Displacement Algorithm For Removing Hidden Information From Digital Images, Fahimeh Rezaei, Michael Hempel, Tao Ma, Pradhumna Lal Shrestha, Dongming Peng, Hamid Sharif Jan 2013

Adaptive Threshold Displacement Algorithm For Removing Hidden Information From Digital Images, Fahimeh Rezaei, Michael Hempel, Tao Ma, Pradhumna Lal Shrestha, Dongming Peng, Hamid Sharif

Department of Electrical and Computer Engineering: Faculty Publications

The growth of the Internet and online social media, especially in recent years, also gave rise to a proliferation of online multimedia content creation and distribution. The use of modern steganography methods – the art of hiding information within multimedia – presents an unprecedented opportunity for malicious uses of these materials. Therefore, developing an effective technique to avoid the distribution of secret data is a significant problem that is addressed in this paper for digital images. We introduce a novel algorithm to remove the steganography information embedded in an image without changing the quality of the image and with no …


Data Hiding In Digital Images Using A Partial Optimization Technique Based On The Classical Lsb Method, Feyzi̇ Akar, Yildiray Yalman, Hüseyi̇n Selçuk Varol Jan 2013

Data Hiding In Digital Images Using A Partial Optimization Technique Based On The Classical Lsb Method, Feyzi̇ Akar, Yildiray Yalman, Hüseyi̇n Selçuk Varol

Turkish Journal of Electrical Engineering and Computer Sciences

This paper presents a new partial optimization approach for the least significant bit (LSB) data hiding technique that can be used for protecting any secret information or data. A deterioration effect of as little as possible in an image is intended using the LSB data hiding technique and this is well realized utilizing the proposed partial optimization approach achieving the same data embedding bit rates. In the proposed approach, all of the image pixels are classified into 8 regions and then the 8 distinct ordering codings are applied to each region by the developed partial optimization encoder. Thus, the most …


A New Digital Image Steganography Algorithm Based On Visible Wavelength, İbrahi̇m Coşkun, Feyzi̇ Akar, Özdemi̇r Çeti̇n Jan 2013

A New Digital Image Steganography Algorithm Based On Visible Wavelength, İbrahi̇m Coşkun, Feyzi̇ Akar, Özdemi̇r Çeti̇n

Turkish Journal of Electrical Engineering and Computer Sciences

Stenography is the science that ensures secret communication through multimedia carriers such as image, audio, and video files. The ultimate end of stenography is to hide the secret data in the carrier file so that they are not detected. To that end, stenography applications should have such features as undetectability; robustness; resistance to various images process, sing methods, and compression; and capacity of the hidden data. At the same time, those features distinguish stenography applications from watermarking and cryptography applications. This study is different from other studies in the literature in that the undetectability parameter has been achieved through hiding …


Application Of Stochastic Diffusion For Hiding High Fidelity Encrypted Images, Jonathan Blackledge, Abdulrahman Al-Rawi Jan 2011

Application Of Stochastic Diffusion For Hiding High Fidelity Encrypted Images, Jonathan Blackledge, Abdulrahman Al-Rawi

Articles

Cryptography coupled with information hiding has received increased attention in recent years and has become a major research theme because of the importance of protecting encrypted information in any Electronic Data Interchange system in a way that is both discrete and covert. One of the essential limitations in any cryptography system is that the encrypted data provides an indication on its importance which arouses suspicion and makes it vulnerable to attack. Information hiding of Steganography provides a potential solution to this issue by making the data imperceptible, the security of the hidden information being a threat only if its existence …


E-Fraud Prevention Based On The Self-Authentication Of E-Documents, Jonathan Blackledge, Eugene Coyle Jan 2010

E-Fraud Prevention Based On The Self-Authentication Of E-Documents, Jonathan Blackledge, Eugene Coyle

Conference papers

We consider a method for preventing e-Fraud in which a binary image is encrypted with a floating point cipher using a convolution operation and the output quantized into a 1-bit array generating a binary image ciphertext. The output is then ‘embedded’ in a host image to hide the encrypted information. Embedding is undertaken either in the lowest 1-bit layer or multiple 1-bit layers. Decryption is accomplished by: (i) extracting the binary image from the host image; (ii) correlating the result with the original cipher. In principle, any cipher generator can be used for this purpose and the method has been …


Detection Of Steganography-Producing Software Artifacts On Crime-Related Seized Computers, Asawaree Kulkarni, James Goldman, Brad Nabholz, William Eyre Jan 2009

Detection Of Steganography-Producing Software Artifacts On Crime-Related Seized Computers, Asawaree Kulkarni, James Goldman, Brad Nabholz, William Eyre

Journal of Digital Forensics, Security and Law

Steganography is the art and science of hiding information within information so that an observer does not know that communication is taking place. Bad actors passing information using steganography are of concern to the national security establishment and law enforcement. An attempt was made to determine if steganography was being used by criminals to communicate information. Web crawling technology was used and images were downloaded from Web sites that were considered as likely candidates for containing information hidden using steganographic techniques. A detection tool was used to analyze these images. The research failed to demonstrate that steganography was prevalent on …


The Impact Of Hard Disk Firmware Steganography On Computer Forensics, Iain Sutherland, Gareth Davies, Nick Pringle, Andrew Blyth Jan 2009

The Impact Of Hard Disk Firmware Steganography On Computer Forensics, Iain Sutherland, Gareth Davies, Nick Pringle, Andrew Blyth

Journal of Digital Forensics, Security and Law

The hard disk drive is probably the predominant form of storage media and is a primary data source in a forensic investigation. The majority of available software tools and literature relating to the investigation of the structure and content contained within a hard disk drive concerns the extraction and analysis of evidence from the various file systems which can reside in the user accessible area of the disk. It is known that there are other areas of the hard disk drive which could be used to conceal information, such as the Host Protected Area and the Device Configuration Overlay. There …


Steganography: Forensic, Security, And Legal Issues, Merrill Warkentin, Ernst Bekkering, Mark B. Schmidt Jan 2008

Steganography: Forensic, Security, And Legal Issues, Merrill Warkentin, Ernst Bekkering, Mark B. Schmidt

Journal of Digital Forensics, Security and Law

Steganography has long been regarded as a tool used for illicit and destructive purposes such as crime and warfare. Currently, digital tools are widely available to ordinary computer users also. Steganography software allows both illicit and legitimate users to hide messages so that they will not be detected in transit. This article provides a brief history of steganography, discusses the current status in the computer age, and relates this to forensic, security, and legal issues. The paper concludes with recommendations for digital forensics investigators, IT staff, individual users, and other stakeholders.