Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Electrical and Computer Engineering

Steganography

Institution
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 34

Full-Text Articles in Engineering

Image Hiding Using Qr Factorization And Discrete Wavelet Transform Techniques, Reham Ahmed El-Shahed, Maryam Al-Berry, Hala Ebied, Howida Shedeed Nov 2021

Image Hiding Using Qr Factorization And Discrete Wavelet Transform Techniques, Reham Ahmed El-Shahed, Maryam Al-Berry, Hala Ebied, Howida Shedeed

Future Computing and Informatics Journal

Steganography is one of the most important tools in the data security field as there is a huge amount of data transferred each moment over the internet. Hiding secret messages in an image has been widely used because the images are mostly used in social media applications. The proposed algorithm is a simple algorithm for hiding an image in another image. The proposed technique uses QR factorization to conceal the secret image. The technique successfully hid a gray and color image in another one and the performance of the algorithm was measured by PSNR, SSIM and NCC. The PSNR for …


Modern Techniques For Discovering Digital Steganography, Michael Hegarty, Anthony Keane Jan 2020

Modern Techniques For Discovering Digital Steganography, Michael Hegarty, Anthony Keane

Conference papers

Digital steganography can be difficult to detect and as such is an ideal way of engaging in covert communications across the Internet. This research paper is a work-in-progress report on instances of steganography that were identified on websites on the Internet including some from the DarkWeb using the application of new methods of deep learning algorithms. This approach to the identification of Least Significant Bit (LSB) Steganography using Convolutional Neural Networks (CNN) has demonstrated some efficiency for image classification. The CNN algorithm was trained using datasets of images with known steganography and then applied to datasets with images to identify …


Stegogis: A New Steganography Method Using The Geospatial Domain, Ömer Kurtuldu, Mehmet Demi̇rci̇ Jan 2019

Stegogis: A New Steganography Method Using The Geospatial Domain, Ömer Kurtuldu, Mehmet Demi̇rci̇

Turkish Journal of Electrical Engineering and Computer Sciences

Geographic data are used on a variety of computing devices for many different applications including navigation, tracking, location planning, and marketing. The prevalence of geographic data makes it possible to envision new useful applications. In this paper, we propose using geographic data as a medium for secret communication, or steganography. We develop a method called StegoGIS for hiding messages in geographic coordinates in the well-known binary of fast-moving objects and transmitting them secretly. We show that discovering this secret communication is practically impossible for third parties. We also show that a large amount of secret data can be transmitted this …


Stealth Transmission In Free Space Optical Communication Systems Using Amplified Spontaneous Emission Noise, Youness Ergaibi May 2018

Stealth Transmission In Free Space Optical Communication Systems Using Amplified Spontaneous Emission Noise, Youness Ergaibi

Theses and Dissertations

One of the challenging real-world problems in the communication network is to secure the communication system that deals with a large data. Perhaps even a more challenging version of this scenario is when the channel that transmits the information is a wireless media. This thesis introduces a steganography technique to secure the physical layer of the communication system. It enhances the benefits by using optical communication rather than radio frequency (RF) communication, especially in terms of transmitting a large scale of data. This thesis demonstrates that we can transmit secure large information in free space (air) using steganography mechanism and …


Side-Information For Steganography Design And Detection, Tomas Denemark Jan 2018

Side-Information For Steganography Design And Detection, Tomas Denemark

Graduate Dissertations and Theses

Today, the most secure steganographic schemes for digital images embed secret messages while minimizing a distortion function that describes the local complexity of the content. Distortion functions are heuristically designed to predict the modeling error, or in other words, how difficult it would be to detect a single change to the original image in any given area. This dissertation investigates how both the design and detection of such content-adaptive schemes can be improved with the use of side-information.

We distinguish two types of side-information, public and private: Public side-information is available to the sender and at least in part also …


The Discrete Spring Transform: An Innovative Steganographic Attack, Aaron T. Sharp Jan 2017

The Discrete Spring Transform: An Innovative Steganographic Attack, Aaron T. Sharp

Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research

Digital Steganography continues to evolve today, where steganographers are constantly discovering new methodologies to hide information effectively. Despite this, steganographic attacks, which seek to defeat these techniques, have continually lagged behind. The reason for this is simple: it is exceptionally difficult to defeat the unknown. Most attacks require prior knowledge or study of existing techniques in order to defeat them, and are often highly specific to certain cover media. These constraints are impractical and unrealistic to defeat steganography in modern communication networks. It follows, an effective steganographic attack must not require prior knowledge or study of techniques, and must be …


A Steganographic Approach To Hide Secret Data In Digital Audio Based On Xor Operands Triplet Property With High Embedding Rate And Good Quality Audio, Krishna Bhowal, Debasree Chanda Sarkar, Sushanta Biswas, Partha Pratim Sarkar Jan 2017

A Steganographic Approach To Hide Secret Data In Digital Audio Based On Xor Operands Triplet Property With High Embedding Rate And Good Quality Audio, Krishna Bhowal, Debasree Chanda Sarkar, Sushanta Biswas, Partha Pratim Sarkar

Turkish Journal of Electrical Engineering and Computer Sciences

In this paper, a unique and transparent data hiding algorithm based on XOR operands triplet (XOT) is proposed. In XOT, an XOR operation applied on any two members of a triplet provides the third member of the same triplet. Taking advantage of the low computational complexity and fascinating properties of the XOR operator, it is possible to embed 4-ary secret digits with negligible changes in the host digital audio. The proposed scheme has been designed to ensure that a minimum number of bit alterations happen in the host digital audio during the data hiding process, which also increases the security …


A New Efficient Block Matching Data Hiding Method Based On Scanning Order Selection In Medical Images, Turgay Aydoğan, Cüneyt Bayilmiş Jan 2017

A New Efficient Block Matching Data Hiding Method Based On Scanning Order Selection In Medical Images, Turgay Aydoğan, Cüneyt Bayilmiş

Turkish Journal of Electrical Engineering and Computer Sciences

Digital technology and the widespread use of the Internet has increased the speeds at which digital data can be obtained and shared in daily life. In parallel to this, there are important concerns regarding the confidentiality of private data during data transmissions and the possibility that data might fall into the hands of third parties. Issues relating to data safety can also affect patients' medical images and other information relating to these images. In this study, we propose a new method based on block matching that can be used to hide the patient information in medical images. In this method, …


Reversible Data Hiding Using Histogram Shifting, Sai Saketh Nandagiri May 2016

Reversible Data Hiding Using Histogram Shifting, Sai Saketh Nandagiri

Electrical Engineering Theses

With the current state-of-the-art technology, intruders can easily gain access to sensitive information. To avoid this, different methods with improved security to hide information have been developed like, covert channels, hiding data in images, null ciphers, etc. The focus of this work is to enhance the security and data hiding capacity of the current state-of-the-art reversible data hiding algorithms. The proposed data hiding method is designed such that the original image is losslessly restored after extraction of a payload. The proposed framework allows embedding of a binary bit stream into the host or cover image while retaining the quality of …


Dst Approach To Enhance Audio Quality On Lost Audio Packet Steganography, Qilin Qi, Dongming Peng, Hamid Sharif Jan 2016

Dst Approach To Enhance Audio Quality On Lost Audio Packet Steganography, Qilin Qi, Dongming Peng, Hamid Sharif

Department of Electrical and Computer Engineering: Faculty Publications

Lost audio packet steganography (LACK) is a steganography technique established on the VoIP network. LACK provides a high-capacity covert channel over VoIP network by artificially delaying and dropping a number of packets in use to convey stegnogram. However, the increasing loss of packets will hurt the quality of the VoIP service. The quality deterioration will not only affect the legitimate VoIP service but also constrain the capacity of the covert channel. Discrete spring transform (DST) is proven to be a way to eliminate the perceptual redundancy in the multimedia signal. In this paper, the DST is applied on the LACK …


Speech Steganalysis Based On The Delay Vector Variance Method, Osman Hi̇lmi̇ Koçal, Emrah Yürüklü, Erdoğan Di̇laveroğlu Jan 2016

Speech Steganalysis Based On The Delay Vector Variance Method, Osman Hi̇lmi̇ Koçal, Emrah Yürüklü, Erdoğan Di̇laveroğlu

Turkish Journal of Electrical Engineering and Computer Sciences

This study investigates the use of delay vector variance-based features for steganalysis of recorded speech. Because data hidden within a speech signal distort the properties of the original speech signal, we designed a new audio steganalyzer that utilizes delay vector variance (DVV) features based on surrogate data in order to detect the existence of hidden data. The proposed DVV features are evaluated individually and together with other chaotic-type features. The performance of the proposed steganalyzer method is also discussed with a focus on the effect of different hiding capacities. The results of the study show that using the proposed DVV …


Review Of Steganalysis Of Digital Images, Xinlei Pan May 2015

Review Of Steganalysis Of Digital Images, Xinlei Pan

Theses

Steganography is the science and art of embedding hidden messages into cover multimedia such as text, image, audio and video. Steganalysis is the counterpart of steganography, which wants to identify if there is data hidden inside a digital medium. In this study, some specific steganographic schemes such as HUGO and LSB are studied and the steganalytic schemes developed to steganalyze the hidden message are studied. Furthermore, some new approaches such as deep learning and game theory, which have seldom been utilized in steganalysis before, are studied. In the rest of thesis study some steganalytic schemes using textural features including the …


Hiding Of Speech Based On Chaotic Steganography And Cryptography Techniques, Innovative Research Publications Irp India, Abbas Salman Hameed Apr 2015

Hiding Of Speech Based On Chaotic Steganography And Cryptography Techniques, Innovative Research Publications Irp India, Abbas Salman Hameed

Innovative Research Publications IRP India

The technique of embedding secret information into cover media, like image, video, audio and text called Steganography, so that only the sender and the authorized recipient who have a key can detect the presence of secret information. In this paper Steganography and Cryptography techniques of speech present with Chaos. Fractional order Lorenz and Chua systems that provides an expanded in key space are used to encrypt speech message. The large key space addition to all properties of randomness and nonlinearity which are possessed these chaotic systems ensure a highly robustness and security for cryptography process. As well as Modified Android …


A Study On Resource Efficient Digital Multimedia Security Measures In Mobile Devices, Prabhat Dahal Dec 2014

A Study On Resource Efficient Digital Multimedia Security Measures In Mobile Devices, Prabhat Dahal

Computer and Electronics Engineering: Dissertations, Theses, and Student Research

Advanced image and video processing abilities in smart phones and digital cameras make them popular means to capture multimedia. In addition, the integration of internet into such devices users seek to capture and easily share multimedia right from their smartphone while most steganography techniques are computer based. Hence, it is of utmost importance that the multimedia be processed for steganography right within the devices for multimedia authentication.

In this thesis, we first implement steganography into mobile smart devices that can capture multimedia. For devices such as smart phones, we propose a method to hide payload bits within video frames. The …


A Study On Countermeasures Against Steganography: An Active Warden Approach, Qilin Qi Dec 2013

A Study On Countermeasures Against Steganography: An Active Warden Approach, Qilin Qi

Computer and Electronics Engineering: Dissertations, Theses, and Student Research

Digital steganography is a method used for hiding information in digital images. It can be used for secure communication. There have been many robust digital steganography methods invented in recent decades. The steganographic message can be inserted in multimedia cover signal such as audio, image and video. However, this technique also may be used by malicious users to transmit dangerous information through the Internet beyond the control of security agencies. How to detect and/or block potentially dangerous information transmission on the Internet through billions of multimedia files while not affecting innocent multimedia communications becomes a challenging problem. Existing steganalysis methods …


Adaptive Threshold Displacement Algorithm For Removing Hidden Information From Digital Images, Fahimeh Rezaei, Michael Hempel, Tao Ma, Pradhumna Lal Shrestha, Dongming Peng, Hamid Sharif Jan 2013

Adaptive Threshold Displacement Algorithm For Removing Hidden Information From Digital Images, Fahimeh Rezaei, Michael Hempel, Tao Ma, Pradhumna Lal Shrestha, Dongming Peng, Hamid Sharif

Department of Electrical and Computer Engineering: Faculty Publications

The growth of the Internet and online social media, especially in recent years, also gave rise to a proliferation of online multimedia content creation and distribution. The use of modern steganography methods – the art of hiding information within multimedia – presents an unprecedented opportunity for malicious uses of these materials. Therefore, developing an effective technique to avoid the distribution of secret data is a significant problem that is addressed in this paper for digital images. We introduce a novel algorithm to remove the steganography information embedded in an image without changing the quality of the image and with no …


Data Hiding In Digital Images Using A Partial Optimization Technique Based On The Classical Lsb Method, Feyzi̇ Akar, Yildiray Yalman, Hüseyi̇n Selçuk Varol Jan 2013

Data Hiding In Digital Images Using A Partial Optimization Technique Based On The Classical Lsb Method, Feyzi̇ Akar, Yildiray Yalman, Hüseyi̇n Selçuk Varol

Turkish Journal of Electrical Engineering and Computer Sciences

This paper presents a new partial optimization approach for the least significant bit (LSB) data hiding technique that can be used for protecting any secret information or data. A deterioration effect of as little as possible in an image is intended using the LSB data hiding technique and this is well realized utilizing the proposed partial optimization approach achieving the same data embedding bit rates. In the proposed approach, all of the image pixels are classified into 8 regions and then the 8 distinct ordering codings are applied to each region by the developed partial optimization encoder. Thus, the most …


A New Digital Image Steganography Algorithm Based On Visible Wavelength, İbrahi̇m Coşkun, Feyzi̇ Akar, Özdemi̇r Çeti̇n Jan 2013

A New Digital Image Steganography Algorithm Based On Visible Wavelength, İbrahi̇m Coşkun, Feyzi̇ Akar, Özdemi̇r Çeti̇n

Turkish Journal of Electrical Engineering and Computer Sciences

Stenography is the science that ensures secret communication through multimedia carriers such as image, audio, and video files. The ultimate end of stenography is to hide the secret data in the carrier file so that they are not detected. To that end, stenography applications should have such features as undetectability; robustness; resistance to various images process, sing methods, and compression; and capacity of the hidden data. At the same time, those features distinguish stenography applications from watermarking and cryptography applications. This study is different from other studies in the literature in that the undetectability parameter has been achieved through hiding …


Data Hiding In Digital Video, Abdullah Cay Apr 2011

Data Hiding In Digital Video, Abdullah Cay

Electrical & Computer Engineering Theses & Dissertations

With the rapid development of digital multimedia technologies, an old method which is called steganography has been sought to be a solution for data hiding applications such as digital watermarking and covert communication. Steganography is the art of secret communication using a cover signal, e.g., video, audio, image etc., whereas the counter-technique, detecting the existence of such as a channel through a statistically trained classifier, is called steganalysis.

The state-of-the art data hiding algorithms utilize features; such as Discrete Cosine Transform (DCT) coefficients, pixel values, motion vectors etc., of the cover signal to convey the message to the receiver side. …


Application Of Stochastic Diffusion For Hiding High Fidelity Encrypted Images, Jonathan Blackledge, Abdulrahman Al-Rawi Jan 2011

Application Of Stochastic Diffusion For Hiding High Fidelity Encrypted Images, Jonathan Blackledge, Abdulrahman Al-Rawi

Articles

Cryptography coupled with information hiding has received increased attention in recent years and has become a major research theme because of the importance of protecting encrypted information in any Electronic Data Interchange system in a way that is both discrete and covert. One of the essential limitations in any cryptography system is that the encrypted data provides an indication on its importance which arouses suspicion and makes it vulnerable to attack. Information hiding of Steganography provides a potential solution to this issue by making the data imperceptible, the security of the hidden information being a threat only if its existence …


Information Hiding Using Stochastic Diffusion For The Covert Transmission Of Encrypted Images, Jonathan Blackledge Jun 2010

Information Hiding Using Stochastic Diffusion For The Covert Transmission Of Encrypted Images, Jonathan Blackledge

Conference papers

A principal weakness of all encryption systems is that the output data can be `seen' to be encrypted. In other words, encrypted data provides a 'flag' on the potential value of the information that has been encrypted. In this paper, we provide a novel approach to `hiding' encrypted data in a digital image. We consider an approach in which a plaintext image is encrypted with a cipher using the processes of `stochastic diffusion' and the output quantized into a 1-bit array generating a binary image cipher-text. This output is then `embedded' in a host image which is undertaken either in …


E-Fraud Prevention Based On The Self-Authentication Of E-Documents, Jonathan Blackledge, Eugene Coyle Jan 2010

E-Fraud Prevention Based On The Self-Authentication Of E-Documents, Jonathan Blackledge, Eugene Coyle

Conference papers

We consider a method for preventing e-Fraud in which a binary image is encrypted with a floating point cipher using a convolution operation and the output quantized into a 1-bit array generating a binary image ciphertext. The output is then ‘embedded’ in a host image to hide the encrypted information. Embedding is undertaken either in the lowest 1-bit layer or multiple 1-bit layers. Decryption is accomplished by: (i) extracting the binary image from the host image; (ii) correlating the result with the original cipher. In principle, any cipher generator can be used for this purpose and the method has been …


Detection Of Steganography-Producing Software Artifacts On Crime-Related Seized Computers, Asawaree Kulkarni, James Goldman, Brad Nabholz, William Eyre Jan 2009

Detection Of Steganography-Producing Software Artifacts On Crime-Related Seized Computers, Asawaree Kulkarni, James Goldman, Brad Nabholz, William Eyre

Journal of Digital Forensics, Security and Law

Steganography is the art and science of hiding information within information so that an observer does not know that communication is taking place. Bad actors passing information using steganography are of concern to the national security establishment and law enforcement. An attempt was made to determine if steganography was being used by criminals to communicate information. Web crawling technology was used and images were downloaded from Web sites that were considered as likely candidates for containing information hidden using steganographic techniques. A detection tool was used to analyze these images. The research failed to demonstrate that steganography was prevalent on …


The Impact Of Hard Disk Firmware Steganography On Computer Forensics, Iain Sutherland, Gareth Davies, Nick Pringle, Andrew Blyth Jan 2009

The Impact Of Hard Disk Firmware Steganography On Computer Forensics, Iain Sutherland, Gareth Davies, Nick Pringle, Andrew Blyth

Journal of Digital Forensics, Security and Law

The hard disk drive is probably the predominant form of storage media and is a primary data source in a forensic investigation. The majority of available software tools and literature relating to the investigation of the structure and content contained within a hard disk drive concerns the extraction and analysis of evidence from the various file systems which can reside in the user accessible area of the disk. It is known that there are other areas of the hard disk drive which could be used to conceal information, such as the Host Protected Area and the Device Configuration Overlay. There …


Multi-Class Classification Fusion Using Boosting For Identifying Steganography Methods, Benjamin M. Rodriguez, Gilbert L. Peterson Mar 2008

Multi-Class Classification Fusion Using Boosting For Identifying Steganography Methods, Benjamin M. Rodriguez, Gilbert L. Peterson

Faculty Publications

No abstract provided.


Covert Encryption And Document Authentication Using Texture Coding, Jonathan Blackledge, Mary Hallot Jan 2008

Covert Encryption And Document Authentication Using Texture Coding, Jonathan Blackledge, Mary Hallot

Articles

With the improvements in the quality of Commercial-Off-The-Shelf (COTS) printing and scanning devices, the ability to counterfeit documents has become a widespread problem. Consequently, there has been an increasing demand to develop digital watermarking techniques which can be applied to both electronic and printed images (and documents) that can be authenticated, prevent unauthorized copying and withstand abuse and degradation. In this paper , a new approach to digital watermarking is presented and a range of possible applications are considered. The process is defined by using concepts and techniques borrowed from Cryptography. It is based on computing a 'scramble image' by …


Steganography: Forensic, Security, And Legal Issues, Merrill Warkentin, Ernst Bekkering, Mark B. Schmidt Jan 2008

Steganography: Forensic, Security, And Legal Issues, Merrill Warkentin, Ernst Bekkering, Mark B. Schmidt

Journal of Digital Forensics, Security and Law

Steganography has long been regarded as a tool used for illicit and destructive purposes such as crime and warfare. Currently, digital tools are widely available to ordinary computer users also. Steganography software allows both illicit and legitimate users to hide messages so that they will not be detected in transit. This article provides a brief history of steganography, discusses the current status in the computer age, and relates this to forensic, security, and legal issues. The paper concludes with recommendations for digital forensics investigators, IT staff, individual users, and other stakeholders.


A Study Of Steganography And Steganalysis, Nisant Nalla Jan 2006

A Study Of Steganography And Steganalysis, Nisant Nalla

Theses

Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Steganalysis is the study of methods to detect the presence of hidden messages. The Steganography and Steganalysis are very much interdependent. The people in the Steganography domain try to develop stronger methods to hide data in different media. This spurs the discovery of new steganalysis methods which can break these Steganography methods. This is vital for the development of these fields. The internet has been growing by leaps and bounds. There is an increasing need for information security. It has been …


Analysis Of Mhpdm Algorithm For Data Hiding In Jpeg Images, Pooja Gore May 2005

Analysis Of Mhpdm Algorithm For Data Hiding In Jpeg Images, Pooja Gore

Theses

In the recent years, there has been a great deal of interest in developing a secure algorithm for hiding information in images, or steganography. There has also been a lot of research in steganalysis of images, which deals with the detection of hidden information in supposedly natural images. The first section of this thesis reviews the steganography algorithms and steganalysis techniques developed in the last few years. It discusses the breadth of steganographic algorithms and steganalytic techniques, starting with the earliest, based on LSB flipping of the DCT coefficients, to more recent and sophisticated algorithms for data hiding and equally …


Study Of Steganalysis Methods, Wen Chen Jan 2005

Study Of Steganalysis Methods, Wen Chen

Theses

Steganography is the art and science of hiding the presence of conmunication by embedding secret message into digital images. The steganographic techniques can be applied in many areas. On one hand, people can benefit from their application. For example, they can be used for copyright protection. On the other hand, these techniques may be used by criminals or terrorists for malicious purposes. For example, terrorists may use the techniques to transmit the secret plan of terror attacks. Law enforcement and security authorities have concerns about such activities. It is necessary to devise the methods to detect steganographic systems. The detection …