Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 3 of 3
Full-Text Articles in Engineering
The Discrete Spring Transform: An Innovative Steganographic Attack, Aaron T. Sharp
The Discrete Spring Transform: An Innovative Steganographic Attack, Aaron T. Sharp
Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research
Digital Steganography continues to evolve today, where steganographers are constantly discovering new methodologies to hide information effectively. Despite this, steganographic attacks, which seek to defeat these techniques, have continually lagged behind. The reason for this is simple: it is exceptionally difficult to defeat the unknown. Most attacks require prior knowledge or study of existing techniques in order to defeat them, and are often highly specific to certain cover media. These constraints are impractical and unrealistic to defeat steganography in modern communication networks. It follows, an effective steganographic attack must not require prior knowledge or study of techniques, and must be …
A Steganographic Approach To Hide Secret Data In Digital Audio Based On Xor Operands Triplet Property With High Embedding Rate And Good Quality Audio, Krishna Bhowal, Debasree Chanda Sarkar, Sushanta Biswas, Partha Pratim Sarkar
A Steganographic Approach To Hide Secret Data In Digital Audio Based On Xor Operands Triplet Property With High Embedding Rate And Good Quality Audio, Krishna Bhowal, Debasree Chanda Sarkar, Sushanta Biswas, Partha Pratim Sarkar
Turkish Journal of Electrical Engineering and Computer Sciences
In this paper, a unique and transparent data hiding algorithm based on XOR operands triplet (XOT) is proposed. In XOT, an XOR operation applied on any two members of a triplet provides the third member of the same triplet. Taking advantage of the low computational complexity and fascinating properties of the XOR operator, it is possible to embed 4-ary secret digits with negligible changes in the host digital audio. The proposed scheme has been designed to ensure that a minimum number of bit alterations happen in the host digital audio during the data hiding process, which also increases the security …
A New Efficient Block Matching Data Hiding Method Based On Scanning Order Selection In Medical Images, Turgay Aydoğan, Cüneyt Bayilmiş
A New Efficient Block Matching Data Hiding Method Based On Scanning Order Selection In Medical Images, Turgay Aydoğan, Cüneyt Bayilmiş
Turkish Journal of Electrical Engineering and Computer Sciences
Digital technology and the widespread use of the Internet has increased the speeds at which digital data can be obtained and shared in daily life. In parallel to this, there are important concerns regarding the confidentiality of private data during data transmissions and the possibility that data might fall into the hands of third parties. Issues relating to data safety can also affect patients' medical images and other information relating to these images. In this study, we propose a new method based on block matching that can be used to hide the patient information in medical images. In this method, …