A New Steganographic Method for Embedded Image In Audio File
|
|
|
- David Alexander
- 9 years ago
- Views:
Transcription
1 A New Steganographic Method for Embedded Image In Audio File Dalal N. Hmood Computer Department/College of Science University AL-Nahrain Baghdad, 10001, Iraq Khamael A. Khudhiar Computer Department/College of Science University AL-Nahrain Baghdad, 10001, Iraq Mohammed S. Altaei Computer Department/College of Science University AL-Nahrain Baghdad, 10001, Iraq Abstract Because secure transaction of information is increasing day by day therefore Steganography has become very important and used modern strategies. Steganography is a strategy in which required information is concealment in any other information such that the second information does not change significantly and it appears the same as original. This work presents a new approach of concealment encrypted mobile image in a audio file.the proposed work is replacing two LSB of each byte in audio file and these bytes are choices as randomly location. It becomes very difficult for intruder to guess that an image is hidden in the audio. Keywords: Steganography,Encrypted, Wavelet,Quantization,LSB; 1. INTRODUCTION In computer terms, steganography has evolved into the practice of hiding a message within a larger one in such a way that others cannot discern the presence or contents of the hidden message. In contemporary terms, steganography has evolved into a digital strategy of hiding a file in some form of multimedia, such as an image, an audio file (like a.wav or mp3) or even a video file[1]. Steganographic systems, can be divided into two categories, one is in which the very existence of the message is kept secret, and non steganographic systems, in which the existence of the message need not be secret[3]. The main goal of steganography is to communicate securely in a completely undetectable manner and to avoid drawing suspicion to the transmission of a hidden data. It is not to keep others from knowing the hidden information, but it is to keep others from thinking that the information even exists. If a steganography method causes someone to suspect the carrier medium, then the method has failed [2]. This paper is an attempt uses an audio file as a cover media to hide an mobile image without making noticeable changes to the file structure and contents of the audio file based on two Least Significant Bit insertion method of the low part of the audio file, as it has been already proved that modification of LSB creates a minimal change in the audio file format. Section 2 describes some of the related work, Section 3 describes hiding Methodology, section 4 describes experiments and results. Conclusions are explain in Section 5. International Journal of Computer Science and Security (IJCSS), Volume (6) : Issue (2) :
2 2. RELATED WORK AND CONTRIBUTION Information hiding is the technology to embed the secret information into a cover data in a way that keeps the secret information invisible. This paper presents a new steganographic method for embedding an image in an Audio file. Emphasis will be on the proposed scheme of image hiding in audio and its comparison with simple Least Significant Bit insertion method of data hiding in voiced audio. Steganography has become great area of interest for researchers as need for secure transaction of information is increasing day by day. Information may be text, image, audio or video. Steganography is a technique in which required information is hided in any other information such that the second information does not change significantly and it appears the same as original. This paper presents a novel approach of hiding image in a video. The proposed algorithm is replacing one LSB of each pixel in video frames. It becomes very difficult for intruder to guess that an image is hidden in the video as individual frames are very difficult to analyze in a video running at 30 frames per second. The process of analysis has been made more difficult by hiding each row of image pixels in multiple frames of the video, so intruder cannot even try to unhide image until he get full video. In other paper taken an in-depth look on steganography by proposing a new method of Audio Steganography. Emphasize will be on the proposed scheme of image hiding in audio and its comparison with simple Least Significant Bit insertion method for data hiding in audio. The contribution of present paper is segmenting audio file in two bands (low band and high band) and used high band(unvoiced) for hidden encrypted image,and used a new approach for generate key from encrypted image.in most paper use 1LSB but we used in this paper 2LSB. 3- PROPOSED METHODOLOGY This proposed method to hide encrypted image in audio file (.wav) as shown in FIGURE 1 Start Input audio file (.wav) Input Image Gray image Encrypted image Wavelet Quantization for high band Key generation Algorithm for embedded image Dewavelet End International Journal of Computer Science and Security (IJCSS), Volume (6) : Issue (2) :
3 3.1 Encrypted Image Message is the data that the sender wishes to remain it confidential. It can be plain text, other image, or anything that can be embedded in a hit stream such as a copyright mark, a covert communication, or AUDIO file. After convert color image to gray image each byte in the image is converted into binary representation. for an example if we are taking the first byte in the image equal 97 then first byte= is stored in byte array. Because binary equivalent for 97 is , and then used the rotate bits of image and randomly key that we choose between (0-255) such as 128 BY using XOR operation to encrypted image, as shown in the FIGURE 2. Input Image Encrypted Image FIGURE 2 Encrypted Image 3.2 Generated Random Key From Encrypted Image The best means of obtaining unpredictable random numbers is by measuring physical phenomena such as radioactive decay, thermal noise in semiconductors, sound samples taken in a noisy environment, and even digitized images of a lava lamp. However few computers (or users) have access to the kind of specialized hardware required for these sources, and must rely on other means of obtaining random data. The term practically strong randomness is used here to represent randomness which isn t cryptographically strong by the usual definitions but which is as close to it as is practically possible.due to size constraints, a discussion of the nature of randomness, especially cryptographically strong randomness, is beyond the scope of this work. A good general overview of what constitutes randomness, what sort of sources is useful (and not useful), and how to process the data from them, For example: - pixel value of image was Rotate the bit Implemented XOR between bits of pixel and bits after rotate International Journal of Computer Science and Security (IJCSS), Volume (6) : Issue (2) :
4 The last stage finds the summation of two bits The key= =3 0 3 i*2+ 1 Key= byte ( j )* 2 i= 0 j= i*2 1 The last stage using equ.1 to calculate key k k= (1) 3.3 Wavelet Transform: The original sound signal is broken up into two parts low frequency and high frequency using Wavelet Transform then used high frequency part to embedded encoded image. Low frequency of Wavelets of audio file LOW HIGH High frequency of Wavelet of audio file 3.4 Least Significant Bit replacement (or coding) Least significant bit (LSB) coding is the simplest way to embed information in a digital audio file. By substituting the two least significant bit of each sampling point with a binary message, LSB coding allows for a large amount of data to be encoded.lsb is the most simple and a straight forward approach to embed or hide a message into a cover-audio [3]. The message is embedded with sequence-mapping technique in the bit of a cover-audio. Although LSB hides the message in such way that the humans do not perceive it, it is still possible for the opponent to retrieve the message due to the simplicity of the technique. Therefore, malicious people can easily try to extract the message from the beginning of the audio if they are suspicious that there exists secret information that was embedded in the audio. 3.5-Getting Encrypted Image From Audio File In this system using the reverse steps for the proposed Method for getting encrypted image and then decrypted for getting the original image in which hiding in the audio file. 4. EXPERMINAT AND RESULT Encrypted low resolution image with size(m n) and hiding in audio file after processing illustrated sequence above and shown result in Figures(2,3,4,5,6,7). Input Image Decrypted Image FIGURE 2: Encrypted Image International Journal of Computer Science and Security (IJCSS), Volume (6) : Issue (2) :
5 FIGURE 3:Original wave FIGURE 4:Wavelet of audio file Low frequency high frequency TABLE 1: Data of Wavelet of audio file before embedded encrypted image original image gray image encrypted image FIGURE 5: Encrypted Low Resolution image FIGURE 6: Hiding image in audio file Low frequency high frequency TABLE 2: Data of Wavelet of audio file after embedded encrypted image International Journal of Computer Science and Security (IJCSS), Volume (6) : Issue (2) :
6 FIGURE 7: stego audio file To measure the difference between the original cover and stego-audio we use the Peak Signal to Noise Ration (PSNR), which expressed as the following equation [2,3] PSNR=10Log10 MSE.. (2) and Mean-Square Error (MSE) is defined as:- M 2 1 MSE= ( X J X J ).. (3) M J = 1 5. CONCLUSION A new approach of embedding an image data into the audio file using LSB based Audio Steganography has been successfully developed and implemented as discussed in this paper. Proposed method is hiding encrypted image in random position based on encrypted byte of image in low frequency of audio file using 2LSB algorithm.better results are analyzed by both the subjective listening testing i.e. Mean Opinion Score and Objective testing i.e. signal to noise ratio graphs. Moreover, how the performance is affected by changing different bit positions has also been reported in this work using (PSNR = and MSE=0.329). The main aim of this research work was embedding of image into audio as a case of audio steganography. In test cases, the image data has been successfully embedded and extracted from the audio file. 6. REFERENCES [1] Jain Ankit, "Steganography : A solution for data hiding", Guru Nanak Dev Engineering College, Ludhiana [2] Pradeep Kumar Singh, and R.K.Aggrawal, "Enhancement of LSB based Steganography for Hiding Image in Audio", International Journal on Computer Science and Engineering, Vol. 02, No. 05, 2010, P 1652-P1658. [3] MAZLEENA S., MOHD R. K., MUHALIM M. A., and SUBARIAH I., " INFORMATION HIDING USING STEGANOGRAPHY", UNIVERSITI TEKNOLOGI MALAYSIA, [4] Kriti Saroha and Pradeep Kumar Singh, "A Variant of LSB Steganography for Hiding Images in Audio", International Journal of Computer Applications, Volume 11 No.6, December [5] Kriti Saroha SOIT CDAC U.P., INDIA Pradeep Kumar Singh Department of Computer Science,KIETU.P., INDIA A Variant of LSB Steganography for Hiding Images inaudio International Journal of Computer Applications ( )Volume 11 No.6, December 2010 [6] Dr Osamah Abdulgader Al-rababah, A Steganography Method Based on Hiding secrete data in MPEG/Audio Layer III* College of Alkamel - Computer Department king Abdulaziz university- 110Alkamel Jedda, Saudia Arabia, IJCSNS International Journal of Computer Science and Network S 202 ecurity, VOL.10 No.7, July 2010 International Journal of Computer Science and Security (IJCSS), Volume (6) : Issue (2) :
7 [7] Souvik Bhattacharyya and Gautam Sanyal, "Hiding Data in Images Using PCP", International Journal of Computer and Information Engineering 3: International Journal of Computer Science and Security (IJCSS), Volume (6) : Issue (2) :
Alaa Alhamami, Avan Sabah Hamdi Amman Arab University Amman, Jordan
World of Computer Science and Information Technology Journal (WCSIT) ISSN: 2221-0741 Vol. 5, No. 5, 87-91, 2015 Mobile Secure Transmission Method Based on Audio Steganography Alaa Alhamami, Avan Sabah
Safer data transmission using Steganography
Safer data transmission using Steganography Arul Bharathi, B.K.Akshay, M.Priy a, K.Latha Department of Computer Science and Engineering Sri Sairam Engineering College Chennai, India Email: [email protected],
Triple Security of Information Using Stegnography and Cryptography
Triple Security of Information Using Stegnography and Cryptography Abstract In this growing age information sharing and transfer has increased exponentially so, security is a primary requirement for all
STEGANOGRAPHY: TEXT FILE HIDING IN IMAGE YAW CHOON KIT CA10022
STEGANOGRAPHY: TEXT FILE HIDING IN IMAGE YAW CHOON KIT CA10022 FACULTY OF COMPUTER SYSTEM AND SOFTWARE ENGINEERING 2012/2013 1 ABSTRACT Steganography is the art or science in hiding. It is origin from
A Secure Data Transmission By Integrating Cryptography And Video Steganography
A Secure Data Transmission By Integrating Cryptography And Video Steganography Shafna P K Computer Science Department KMEA Engineering College Ernakulam, India [email protected] Abstract Advances
International Journal of Advanced Computer Technology (IJACT) ISSN:2319-7900 Least Significant Bit algorithm for image steganography
Champakamala.B.S, Padmini.K, Radhika.D. K Asst Professors, Department of TCE, Don Bosco Institute of Technology,Bangalore, India Abstract Steganography is one of the most powerful techniques to conceal
Multi-factor Authentication in Banking Sector
Multi-factor Authentication in Banking Sector Tushar Bhivgade, Mithilesh Bhusari, Ajay Kuthe, Bhavna Jiddewar,Prof. Pooja Dubey Department of Computer Science & Engineering, Rajiv Gandhi College of Engineering
AN ENHANCED MECHANISM FOR SECURE DATA TRANSMISSION USING STEGANOGRAPHY MERGED WITH VISUAL CRYPTOGRAPHY
AN ENHANCED MECHANISM FOR SECURE DATA TRANSMISSION USING STEGANOGRAPHY MERGED WITH VISUAL CRYPTOGRAPHY Chandan Mohapatra 1, Manajusha Pandey 2 1 PG Student in Computer Science Dept., KIIT University, Bhubaneswar,
IMAGE STEGANOGRAPHY FOR SECURE DATA TRANSMISSION USING BLOWFISH ALGORITHM
IMAGE STEGANOGRAPHY FOR SECURE DATA TRANSMISSION USING BLOWFISH ALGORITHM BARJINDER SINGH 1, BALPREET KAUR 2, RANJOT KAUR 3 1 Research Scholar at BBSBEC, Fatehgarh sahib 2 Lecturer at BBSBEC Fatehgarh
Steganography- A Data Hiding Technique
Steganography- A Data Hiding Technique Arvind Kumar Assistant Professor Vidya College of engineering, Meerut, India Km. Pooja Vankateshwara institute of computer Science and technology, Meerut, India ABSTRACT
Image Information Hiding: An Survey
Image Information Hiding: An Survey D. Saravanan*, A. Ronald Doni** & A. Abisha Ajith*** *Assistant Professor, Department of MCA, Sathyabama University, Chennai, Tamilnadu, INDIA. E-Mail: [email protected]
CHAPTER 1 INTRODUCTION
CHAPTER 1 INTRODUCTION 1.1 Overview Steganography is the process of hiding secret data inside other, normally transmitted data. In other words, as defined by [40] steganography means hiding of a secret
A Secure File Transfer based on Discrete Wavelet Transformation and Audio Watermarking Techniques
A Secure File Transfer based on Discrete Wavelet Transformation and Audio Watermarking Techniques Vineela Behara,Y Ramesh Department of Computer Science and Engineering Aditya institute of Technology and
Keywords Decryption, Encryption,password attack, Replay attack, steganography, Visual cryptography EXISTING SYSTEM OF KERBEROS
Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Secure Authentication
A Concept of Digital Picture Envelope for Internet Communication
A Concept of Digital Picture Envelope for Internet Communication Eiji Kawaguchi, Koichi Nozaki, Michiharu Niimi, Hideki Noda and Richard O. Eason Kyushu Institute of Technology 1-1 Sensui-cho, Tobata,
Online Voting System Using Three Factor Authentication
ISSN(Online): 232-98 Vol. 3, Issue 3, March 25 Online Voting System Using Three Factor Authentication Rashmi Nade, Monali Raut, Punam Agawane, Jayshree Shinde Student, Dept. of I.T., BVCOEW, Savitribai
Image Authentication Scheme using Digital Signature and Digital Watermarking
www..org 59 Image Authentication Scheme using Digital Signature and Digital Watermarking Seyed Mohammad Mousavi Industrial Management Institute, Tehran, Iran Abstract Usual digital signature schemes for
Security and protection of digital images by using watermarking methods
Security and protection of digital images by using watermarking methods Andreja Samčović Faculty of Transport and Traffic Engineering University of Belgrade, Serbia Gjovik, june 2014. Digital watermarking
Multimedia Document Authentication using On-line Signatures as Watermarks
Multimedia Document Authentication using On-line Signatures as Watermarks Anoop M Namboodiri and Anil K Jain Department of Computer Science and Engineering Michigan State University East Lansing, MI 48824
A Robust and Lossless Information Embedding in Image Based on DCT and Scrambling Algorithms
A Robust and Lossless Information Embedding in Image Based on DCT and Scrambling Algorithms Dr. Mohammad V. Malakooti Faculty and Head of Department of Computer Engineering, Islamic Azad University, UAE
2695 P a g e. IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India
Integrity Preservation and Privacy Protection for Digital Medical Images M.Krishna Rani Dr.S.Bhargavi IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India Abstract- In medical treatments, the integrity
Soumendu Chakraborty, Anand Singh Jalal* and Charul Bhatnagar
----------------------------------------------------------------------------- An Efficient Bit Plane X-ORing Algorithm for Irreversible Image Steganography -----------------------------------------------------------------------------
Hamid.A.Jalab, A.A Zaidan and B.B Zaidan
Frame Selected Approach for Hiding Data within MPEG Video Using Bit Plane Complexity Segmentation 108 Hamid.A.Jalab, A.A Zaidan and B.B Zaidan Abstract--- Bit Plane Complexity Segmentation (BPCS) digital
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:
Secret Communication through Web Pages Using Special Space Codes in HTML Files
International Journal of Applied Science and Engineering 2008. 6, 2: 141-149 Secret Communication through Web Pages Using Special Space Codes in HTML Files I-Shi Lee a, c and Wen-Hsiang Tsai a, b, * a
Security Based Data Transfer and Privacy Storage through Watermark Detection
Security Based Data Transfer and Privacy Storage through Watermark Detection Gowtham.T 1 Pradeep Kumar.G 2 1PG Scholar, Applied Electronics, Nandha Engineering College, Anna University, Erode, India. 2Assistant
Separable & Secure Data Hiding & Image Encryption Using Hybrid Cryptography
502 Separable & Secure Data Hiding & Image Encryption Using Hybrid Cryptography 1 Vinay Wadekar, 2 Ajinkya Jadhavrao, 3 Sharad Ghule, 4 Akshay Kapse 1,2,3,4 Computer Engineering, University Of Pune, Pune,
Steganography and Visual Cryptography in Computer Forensics
2010 Fifth International Workshop on Systematic Approaches to Digital Forensic Engineering Steganography and Visual Cryptography in Computer Forensics George Abboud Department of Computer Engineering and
Memory Allocation Technique for Segregated Free List Based on Genetic Algorithm
Journal of Al-Nahrain University Vol.15 (2), June, 2012, pp.161-168 Science Memory Allocation Technique for Segregated Free List Based on Genetic Algorithm Manal F. Younis Computer Department, College
International ejournals
ISSN 0976 1411 Available online at www.internationalejournals.com International ejournals International ejournal of Mathematics and Engineering 227 (2013) 2216-2222 EFFICIENT METHOD OF AUDIO STEGANOGRAPHY
A Survey on Performance Analysis of DES, AES and RSA Algorithm along with LSB Substitution Technique
A Survey on Performance Analysis of, AES and RSA Algorithm along with LSB Substitution Technique B. Padmavathi 1, S. Ranjitha Kumari 2 1 Research Scholar, R.V.S College of Arts & Science (Autonomous )Sulur,
Study on Image Steganography Techniques
Study on Image Steganography Techniques C.Gayathri #1, V.Kalpana #2 Computer Science & Engineering, School of Computing, SASTRAUNIVERSITY, Tirumalaisamudram, Thanjavur - 613401.Tamilnadu, India 1 [email protected]
FAREY FRACTION BASED VECTOR PROCESSING FOR SECURE DATA TRANSMISSION
FAREY FRACTION BASED VECTOR PROCESSING FOR SECURE DATA TRANSMISSION INTRODUCTION GANESH ESWAR KUMAR. P Dr. M.G.R University, Maduravoyal, Chennai. Email: [email protected] Every day, millions of people
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No. # 11 Block Cipher Standards (DES) (Refer Slide
Secure Data Transmission by using Steganography
Abstract Secure Data Transmission by using Steganography R.M. Goudar, Prashant N. Patil, Aniket G.. Meshram*, Sanyog M. Yewale, Abhay V. Fegade Computer Engineering Department, Pune University, MAE, Alandi
AUTHORIZED WATERMARKING AND ENCRYPTION SYSTEM BASED ON WAVELET TRANSFORM FOR TELERADIOLOGY SECURITY ISSUES
AUTHORIZED WATERMARKING AND ENCRYPTION SYSTEM BASED ON WAVELET TRANSFORM FOR TELERADIOLOGY SECURITY ISSUES S.NANDHINI PG SCHOLAR NandhaEngg. College Erode, Tamilnadu, India. Dr.S.KAVITHA M.E.,Ph.d PROFESSOR
INTERNATIONAL JOURNAL OF APPLIED ENGINEERING RESEARCH, DINDIGUL Volume 1, No 3, 2010
Lossless Medical Image Security Shrikhande Rohini 1, Vinayak Bairagi 2 1 Researcher, Electronics & Telecommunication Department, Sinhgad Academy Of Engg. 2 Assistant Professor, Electronics & Telecommunication
Simple Encryption/Decryption Application
Simple Encryption/Decryption Application Majdi Al-qdah Faculty of Information Technology Multimedia University Cyberjaya, 63100, Malaysia [email protected] Lin Yi Hui Faculty of Information Technology
A comprehensive survey on various ETC techniques for secure Data transmission
A comprehensive survey on various ETC techniques for secure Data transmission Shaikh Nasreen 1, Prof. Suchita Wankhade 2 1, 2 Department of Computer Engineering 1, 2 Trinity College of Engineering and
Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies
Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com
SECURE DATA TRANSMISSION USING DIGITAL IMAGE WATERMARKING
SECURE DATA TRANSMISSION USING DIGITAL IMAGE WATERMARKING 1 Maulik Srivastava, 2 Anuradha Sharma 1,2 Department of Computer Science & Engineering, Amity University, Uttar Pradesh Abstract: As we all know
Keywords Android, Copyright Protection, Discrete Cosine Transform (DCT), Digital Watermarking, Discrete Wavelet Transform (DWT), YCbCr.
Volume 3, Issue 7, July 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Web Based Novel
A Novel Security Scheme for Secret Data using Cryptography and Steganography
I. J. Computer Network and Information Security, 2012, 2, 36-42 Published Online March 2012 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijcnis.2012.02.06 A Novel Security Scheme for Secret Data using
Modern Steganography
Modern Steganography Miroslav Dobšíček Department of Computer Science and Engineering, Faculty of Electrical Engineering, Czech Technical University in Prague, Karlovo náměstí 13, 121 35 Prague 2, Czech
Steganography Detection for Digital Forensics
Sage LaTorra Digital Forensics Steganography Detection for Digital Forensics Steganography is the pursuit of cryptography that doesn't appear to be cryptography. In essence, steganography is hiding a message
Reversible Data Hiding for Security Applications
Reversible Data Hiding for Security Applications Baig Firdous Sulthana, M.Tech Student (DECS), Gudlavalleru engineering college, Gudlavalleru, Krishna (District), Andhra Pradesh (state), PIN-521356 S.
Online Voting System Powered by Biometric Security using Cryptography and Stegnography
ISSN: 2321-7782 (Online) Volume 1, Issue 7, December 2013 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com Online
Secret Image Sharing Using Grayscale Payload Decomposition and Irreversible Image Steganography
Secret Image Sharing Using Grayscale Payload Decomposition and Irreversible Image Steganography Abstract. To provide an added security level most of the existing reversible as well as irreversible image
ROI Based Medical Image Watermarking with Zero Distortion and Enhanced Security
I.J. Modern Education and Computer Science, 2014, 10, 40-48 Published Online October 2014 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijmecs.2014.10.06 ROI Based Medical Image Watermarking with Zero
Email Username: Lab date and time: CSC 101: Lab #11 Manual and Report: Cryptography Due date: 5:00pm, day after lab session
Name: Email Username: Lab date and time: CSC 101: Lab #11 Manual and Report: Cryptography Due date: 5:00pm, day after lab session Purpose: The purpose of this lab is to reinforce the key ideas behind cryptography
CHAPTER 7 CONCLUSION AND FUTURE WORK
158 CHAPTER 7 CONCLUSION AND FUTURE WORK The aim of this thesis was to present robust watermarking techniques for medical image. Section 7.1, consolidates the contributions made by the researcher and Section
Broadband Networks. Prof. Dr. Abhay Karandikar. Electrical Engineering Department. Indian Institute of Technology, Bombay. Lecture - 29.
Broadband Networks Prof. Dr. Abhay Karandikar Electrical Engineering Department Indian Institute of Technology, Bombay Lecture - 29 Voice over IP So, today we will discuss about voice over IP and internet
Digital Audio and Video Data
Multimedia Networking Reading: Sections 3.1.2, 3.3, 4.5, and 6.5 CS-375: Computer Networks Dr. Thomas C. Bressoud 1 Digital Audio and Video Data 2 Challenges for Media Streaming Large volume of data Each
159.334 Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology
Network Security 1 Professor Richard Harris School of Engineering and Advanced Technology Presentation Outline Overview of Identification and Authentication The importance of identification and Authentication
On Covert Data Communication Channels Employing DNA Steganography with Application in Massive Data Storage
ARAB ACADEMY FOR SCIENCE, TECHNOLOGY AND MARITIME TRANSPORT COLLEGE OF ENGINEERING AND TECHNOLOGY COMPUTER ENGINEERING DEPARTMENT On Covert Data Communication Channels Employing DNA Steganography with
DEVELOPING SECURED INTEROPERABLE CLOUD COMPUTING SERVICES
DEVELOPING SECURED INTEROPERABLE CLOUD COMPUTING SERVICES Al-Khanjari, Z. Alani, A. Department of Computer Science, College of Science, Sultan Qaboos University, Muscat, Oman Abstract Developers of cloud
AN OVERVIEW OF IMAGE STEGANOGRAPHY
AN OVERVIEW OF IMAGE STEGANOGRAPHY T. Morkel 1, J.H.P. Eloff 2, M.S. Olivier 3 Information and Computer Security Architecture (ICSA) Research Group Department of Computer Science University of Pretoria,
First Semester Examinations 2011/12 INTERNET PRINCIPLES
PAPER CODE NO. EXAMINER : Martin Gairing COMP211 DEPARTMENT : Computer Science Tel. No. 0151 795 4264 First Semester Examinations 2011/12 INTERNET PRINCIPLES TIME ALLOWED : Two Hours INSTRUCTIONS TO CANDIDATES
GiLBCSteg: VoIP Steganography Utilizing the Internet Low Bit-Rate Codec
Computer Science and Information Technology 1(2): 153-158, 2013 DOI: 10.13189/csit.2013.010212 http://www.hrpub.org GiLBCSteg: VoIP Steganography Utilizing the Internet Low Bit-Rate Codec Garrett Calpouzos
A NOVEL STRATEGY TO PROVIDE SECURE CHANNEL OVER WIRELESS TO WIRE COMMUNICATION
A NOVEL STRATEGY TO PROVIDE SECURE CHANNEL OVER WIRELESS TO WIRE COMMUNICATION Prof. Dr. Alaa Hussain Al- Hamami, Amman Arab University for Graduate Studies [email protected] Dr. Mohammad Alaa Al-
Video compression: Performance of available codec software
Video compression: Performance of available codec software Introduction. Digital Video A digital video is a collection of images presented sequentially to produce the effect of continuous motion. It takes
Encryption and Decryption for Secure Communication
Encryption and Decryption for Secure Communication Charu Rohilla Rahul Kumar Yadav Sugandha Singh Research Scholar, M.TECH CSE Dept. Asst. Prof. IT Dept. Asso. Prof. CSE Dept. PDMCE, B.Garh PDMCE, B.Garh
Index Terms Audio streams, inactive frames, steganography, Voice over Internet Protocol (VoIP), packet loss. I. Introduction
Volume 2, Issue 2, February 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: Advanced Integrated Steganographic
WATERMARKING FOR IMAGE AUTHENTICATION
WATERMARKING FOR IMAGE AUTHENTICATION Min Wu Bede Liu Department of Electrical Engineering Princeton University, Princeton, NJ 08544, USA Fax: +1-609-258-3745 {minwu, liu}@ee.princeton.edu ABSTRACT A data
Overview/Questions. What is Cryptography? The Caesar Shift Cipher. CS101 Lecture 21: Overview of Cryptography
CS101 Lecture 21: Overview of Cryptography Codes and Ciphers Overview/Questions What is cryptography? What are the challenges of data encryption? What factors make an encryption strategy successful? What
AStudyofEncryptionAlgorithmsAESDESandRSAforSecurity
Global Journal of Computer Science and Technology Network, Web & Security Volume 13 Issue 15 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
One Time Pad Encryption The unbreakable encryption method
One Time Pad Encryption The unbreakable encryption method One Time Pad The unbreakable encryption method One Time Pad encryption is a very simple, yet completely unbreakable cipher method. It has been
A Study of New Trends in Blowfish Algorithm
A Study of New Trends in Blowfish Algorithm Gurjeevan Singh*, Ashwani Kumar**, K. S. Sandha*** *(Department of ECE, Shaheed Bhagat Singh College of Engg. & Tech. (Polywing), Ferozepur-152004) **(Department
A New Digital Encryption Scheme: Binary Matrix Rotations Encryption Algorithm
International Journal of Research Studies in Computer Science and Engineering (IJRSCSE) Volume 2, Issue 2, February 2015, PP 18-27 ISSN 2349-4840 (Print) & ISSN 2349-4859 (Online) www.arcjournals.org A
MULTIFACTOR AUTHENTICATION FOR SOFTWARE PROTECTION
Diyala Journal of Engineering Sciences Second Engineering Scientific Conference College of Engineering University of Diyala 16-17 December. 2015, pp. 479-492 ISSN 1999-8716 Printed in Iraq MULTIFACTOR
Watermarking Techniques for Protecting Intellectual Properties in a Digital Environment
Watermarking Techniques for Protecting Intellectual Properties in a Digital Environment Isinkaye F. O*. and Aroge T. K. Department of Computer Science and Information Technology University of Science and
Cardless Cash Access Using Biometric ATM Security System Neenu Preetam. I 1, Harsh Gupta 2
Cardless Cash Access Using Biometric ATM Security System Neenu Preetam. I 1, Harsh Gupta 2 1, 2 M.Tech. (Microelectronics), Department of ECE, SEEC, Manipal University Jaipur (MUJ), Rajasthan, India Abstract:
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS)
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS) Ashraf Odeh 1, Shadi R.Masadeh 2, Ahmad Azzazi 3 1 Computer Information Systems Department, Isra University,
Parametric Comparison of H.264 with Existing Video Standards
Parametric Comparison of H.264 with Existing Video Standards Sumit Bhardwaj Department of Electronics and Communication Engineering Amity School of Engineering, Noida, Uttar Pradesh,INDIA Jyoti Bhardwaj
Cyber Security Workshop Encryption Reference Manual
Cyber Security Workshop Encryption Reference Manual May 2015 Basic Concepts in Encoding and Encryption Binary Encoding Examples Encryption Cipher Examples 1 P a g e Encoding Concepts Binary Encoding Basics
Table: Security Services (X.800)
SECURIT SERVICES X.800 defines a security service as a service provided by a protocol layer of communicating open systems, which ensures adequate security of the systems or of data transfers. Also the
Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010
CS 494/594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 1 Introduction to Cryptography What is cryptography?
Physical Layer, Part 2 Digital Transmissions and Multiplexing
Physical Layer, Part 2 Digital Transmissions and Multiplexing These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang's courses at GMU can make a single machine-readable
Secret File Sharing Techniques using AES algorithm. C. Navya Latha 200201066 Garima Agarwal 200305032 Anila Kumar GVN 200305002
Secret File Sharing Techniques using AES algorithm C. Navya Latha 200201066 Garima Agarwal 200305032 Anila Kumar GVN 200305002 1. Feature Overview The Advanced Encryption Standard (AES) feature adds support
Image Compression through DCT and Huffman Coding Technique
International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347 5161 2015 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Research Article Rahul
SURVEY ON INFORMATION HIDING TECHNIQUES USING QR BARCODE
SURVEY ON INFORMATION HIDING TECHNIQUES USING QR BARCODE Manoj S. Rewatkar 1 and Shital A. Raut 2 1,2 Department of Computer Science and Engineering, Visvesvaraya National Institute of Technology, Nagpur,
Keywords: Double layered blowfish encryption, chaotic-map based pixel abstraction, image security, encryption, blowfish.
Volume 5, Issue 8, August 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Image Privacy
Image Security System using Encryption and Steganography
Image Security System using Encryption and Steganography Pooja Rani 1, Apoorva Arora 2 P.G. Student, Department of CSE, Chandigarh Engineering College Landran, Mohali, India 1 Associate Professor, Department
Effective Secure Encryption Scheme [One Time Pad] Using Complement Approach Sharad Patil 1 Ajay Kumar 2
Effective Secure Encryption Scheme [One Time Pad] Using Complement Approach Sharad Patil 1 Ajay Kumar 2 Research Student, Bharti Vidyapeeth, Pune, India [email protected] Modern College of Engineering,
Data Storage. Chapter 3. Objectives. 3-1 Data Types. Data Inside the Computer. After studying this chapter, students should be able to:
Chapter 3 Data Storage Objectives After studying this chapter, students should be able to: List five different data types used in a computer. Describe how integers are stored in a computer. Describe how
Chapter 23. Database Security. Security Issues. Database Security
Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
Data Storage 3.1. Foundations of Computer Science Cengage Learning
3 Data Storage 3.1 Foundations of Computer Science Cengage Learning Objectives After studying this chapter, the student should be able to: List five different data types used in a computer. Describe how
PiCsMu: A Cloud Overlay to Store and Manage Data
35th NMRG meeting @ Windsor Atlântica Rio de Janeiro, Brazil, 17th November 2014 PiCsMu: A Cloud Overlay to Store and Manage Data Guilherme Sperb Machado, Burkhard Stiller Department of Informatics IFI,
Protocol Data Units and Encapsulation
Chapter 2: Communicating over the 51 Protocol Units and Encapsulation For application data to travel uncorrupted from one host to another, header (or control data), which contains control and addressing
IT Networks & Security CERT Luncheon Series: Cryptography
IT Networks & Security CERT Luncheon Series: Cryptography Presented by Addam Schroll, IT Security & Privacy Analyst 1 Outline History Terms & Definitions Symmetric and Asymmetric Algorithms Hashing PKI
