Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Engineering

The Discrete Spring Transform: An Innovative Steganographic Attack, Aaron T. Sharp Jan 2017

The Discrete Spring Transform: An Innovative Steganographic Attack, Aaron T. Sharp

Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research

Digital Steganography continues to evolve today, where steganographers are constantly discovering new methodologies to hide information effectively. Despite this, steganographic attacks, which seek to defeat these techniques, have continually lagged behind. The reason for this is simple: it is exceptionally difficult to defeat the unknown. Most attacks require prior knowledge or study of existing techniques in order to defeat them, and are often highly specific to certain cover media. These constraints are impractical and unrealistic to defeat steganography in modern communication networks. It follows, an effective steganographic attack must not require prior knowledge or study of techniques, and must be …


A Steganographic Approach To Hide Secret Data In Digital Audio Based On Xor Operands Triplet Property With High Embedding Rate And Good Quality Audio, Krishna Bhowal, Debasree Chanda Sarkar, Sushanta Biswas, Partha Pratim Sarkar Jan 2017

A Steganographic Approach To Hide Secret Data In Digital Audio Based On Xor Operands Triplet Property With High Embedding Rate And Good Quality Audio, Krishna Bhowal, Debasree Chanda Sarkar, Sushanta Biswas, Partha Pratim Sarkar

Turkish Journal of Electrical Engineering and Computer Sciences

In this paper, a unique and transparent data hiding algorithm based on XOR operands triplet (XOT) is proposed. In XOT, an XOR operation applied on any two members of a triplet provides the third member of the same triplet. Taking advantage of the low computational complexity and fascinating properties of the XOR operator, it is possible to embed 4-ary secret digits with negligible changes in the host digital audio. The proposed scheme has been designed to ensure that a minimum number of bit alterations happen in the host digital audio during the data hiding process, which also increases the security …


A New Efficient Block Matching Data Hiding Method Based On Scanning Order Selection In Medical Images, Turgay Aydoğan, Cüneyt Bayilmiş Jan 2017

A New Efficient Block Matching Data Hiding Method Based On Scanning Order Selection In Medical Images, Turgay Aydoğan, Cüneyt Bayilmiş

Turkish Journal of Electrical Engineering and Computer Sciences

Digital technology and the widespread use of the Internet has increased the speeds at which digital data can be obtained and shared in daily life. In parallel to this, there are important concerns regarding the confidentiality of private data during data transmissions and the possibility that data might fall into the hands of third parties. Issues relating to data safety can also affect patients' medical images and other information relating to these images. In this study, we propose a new method based on block matching that can be used to hide the patient information in medical images. In this method, …