دانلود و نمایش مقالات مرتبط با Steganography::صفحه 1
تبریک روز مهندس
نتیجه جستجو - Steganography

تعداد مقالات یافته شده: 11
ردیف عنوان نوع
1 Research on image steganography analysis based on deep learning
تحقیق در مورد تجزیه و تحلیل استگانوگرافی تصویر بر اساس یادگیری عمیق-2019
Although steganalysis has developed rapidly in recent years, it still faces many difficulties and challenges. Based on the theory of in-depth learning method and image-based general steganalysis, this paper makes a deep study of the hot and difficult problem of steganalysis feature expression, and tries to establish a new steganalysis paradigm from the idea of feature learning. The main contributions of this paper are as follows: 1. An innovative steganalysis paradigm based on in-depth learning is proposed. Based on the representative deep learning method CNN, the model is designed and adjusted according to the characteristics of steganalysis, which makes the proposed model more effective in capturing the statistical characteristics such as neighborhood correlation. 2. A steganalysis feature learning method based on global information constraints is proposed. Based on the previous research of steganalysis method based on CNN, this work focuses on the importance of global information in steganalysis feature expression. 3. A feature learning method for low embedding rate steganalysis is proposed. 4. A general steganalysis method for multi-class steganography is proposed. The ultimate goal of general steganalysis is to construct steganalysis detectors without distinguishing specific types of steganalysis algorithms
Keywords: Steganalysis | Steganography | Feature learning | Deep learning | Convolutional neural network | Transfer learning | Multitask learning
مقاله انگلیسی
2 Approaches for preserving content integrity of sensitive online Arabic content: A survey and research challenges
رویکردهای حفظ تمامیت محتوا از محتوای حساس آنلاین عربی: بررسی و چالش های تحقیقاتی-2019
Trends in Internet usage and accessing online content in different languages and formats are proliferating at a considerable speed. There is a vast amount of digital online content available in different formats that are sensitive in nature with respect to writing styles and arrangement of diacritics. However, research done in the area aimed at identifying the necessary techniques suitable for preserving content integrity of sensitive digital online content is limited. So, it is a challenge to determine the techniques most suitable for dif- ferent formats such as image or binary. Hence, preserving and verifying sensitive content constitutes an emerging problem and calls for timely solutions. The digital Holy Qur’an in Arabic, constitutes, one case of such sensitive content. Due to the different characteristics of the Arabic letters like diacritics (punctuation symbols), kashidas (extended letters) and other symbols, it is very easy to alter the original meaning of the text by simply chang- ing the arrangement of diacritics. This article surveys the different approaches that are presently employed in the process of preserving and verifying the content integrity of sen- sitive online content. We present the state-of-the-art in content integrity verification and address the existing challenges in preserving the integrity of sensitive texts using the Dig- ital Qur’an as a case study. The proposed taxonomy provides an effective classification and analysis of existing related schemes and their limitations. The paper discusses the recom- mendations of the expected efficiency of such approaches when applied for use in digital content integrity. Some of the main findings suggest unified approaches of watermarking and string matching approaches can be used to preserve content integrity of any sensitive digital content.
Keywords: Online sensitive content | Quran | Integrity | Watermarking | Cryptography | Steganography
مقاله انگلیسی
3 Based blockchain-PSO-AES techniques in finger vein biometrics: A novel verification secure framework for patient authentication
روش های مبتنی بر بلاکچین-PSO-AES در بیومتریک رگ های انگشت: یک چارچوب تأیید صحت جدید برای احراز هویت بیمار-2019
The main objective of this study is to propose a novel verification secure framework for patient authentication between an access point (patient enrolment device) and a node database. For this purpose, two stages are used. Firstly, we propose a new hybrid biometric pattern model based on a merge algorithm to combine radio frequency identification and finger vein (FV) biometric features to increase the randomisation and security levels in pattern structure. Secondly, we developed a combination of encryption, blockchain and steganography techniques for the hybrid pattern model. When sending the pattern from an enrolment device (access point) to the node database, this process ensures that the FV biometric verification system remains secure during authentication by meeting the information security standard requirements of confidentiality, integrity and availability. Blockchain is used to achieve data integrity and availability. Particle swarm optimisation steganography and advanced encryption standard techniques are used for confidentiality in a transmission channel. Then, we discussed how the proposed framework can be implemented on a decentralised network architecture, including access point and various databases node without a central point. The proposed framework was evaluated by 106 samples chosen from a dataset that comprises 6000 samples of FV images. Results showed that (1) high-resistance verification framework is protected against spoofing and brute-force attacks; most biometric verification systems are vulnerable to such attacks. (2) The proposed framework had an advantage over the benchmark with a percentage of 55.56% in securing biometric templates during data transmission between the enrolment device and the node database.
Keywords: Finger vein | Blockchain | Cryptography | Steganography | RFID | CIA
مقاله انگلیسی
4 Dynamic embedding strategy of VQ-based information hiding approach
استراتژی توکاری پویا از روش پنهان اطلاعات مبتنی بر VQ-2019
Information security is one of the most challenging issues. Cryptography and Steganography techniques are two popular methods for protecting data privacy. In this study, an information hiding method with dynamic embedding capacity based on vector quantization is proposed for protecting confidential data. To improve embedding capacity and image quality at the same time, dynamic-length secret bits are embedded into each pixel. Compared with previous approaches, the proposed method preforms better regarding the embedding capacity and image quality.
Keywords: Vector quantization | Dynamic embedding algorithm | Steganography
مقاله انگلیسی
5 A novel crypto technique based ciphertext shifting
یک تغییر متن رمزنگاری مبتنی بر تکنیک رمزنگاری-2019
One of the significant issues in information security areas is a hidden exchange of data. There are several techniques for this purpose such as cryptography, steganography, etc. Generally, in cryptography, the secret message content is scrambled. In another hand in steganography, the secret message is embedded inside the cover medium. In this paper, a new crypto technique-based ciphertext shifting algorithm has been designed to improve the security for our previous work that combining cryptographic and steganographic. The improvement in the security of the secret message is done by changing the ciphertext value. The proposed shifting algorithm is used to rearranges the location of each character of ciphertext based on key value, in which the final ciphertext length is equivalent to encryption value but it different in value. The key strength of this method is two side one is trick the attacker from notice any change in ciphertext which is the same length as the original, so when used the common cryptanalysis will not get anything due to the original ciphertext has been changed. The second key strength of this method is that the shifting value is variable and dependent on key length. This method is inspected to be a very strong technique that can prevent common cryptography attacks such as a dictionary or brute-force attacks, etc.
Keywords: Cryptography | Ciphertext | Shifting algorithm | HMAC | AES
مقاله انگلیسی
6 Image steganography using exploiting modification direction for compressed encrypted data
استگانوگرافی تصویر با استفاده از جهت اصلاح برای داده های رمزگذاری شده فشرده شده-2019
Building a balanced relation between image quality and the payload, the robustness of the method in facing electronic attacks and securing data, all the mentioned processes represent the main challenge in steganography. Here, a novel approach to steganography is suggested using Vigenere Cipher and Huffman Coding methods to encrypt and compress the mystery message content. This approach will raise the security and ensure the message content cannot be extracted without earlier knowledge of decrypting rules and the Huffman Dictionary Table. Later, the image is segmented into blocks, size (w*h) groups for each block and with each group having n pixels. Subsequently, the knight tour algorithm and arbitrary function are utilized to select which blocks and groups can be used to conceal the mystery digit within a specific pixel in the group randomly. This is to address the weakness of the Exploiting Modification Direction (EMD) technique that uses a serial selection to enhance the robustness of the suggested scheme. The EMD technique is then utilized to insert the mystery digits inside a specific pixel. Later, the chi-square method is employed to apply statistical attacks on the stego-image to estimate the suggested scheme robustness. The empirical outcomes show that the suggested scheme is more efficient compared to the old Steganography schemes with respect to Imperceptibility by PSNR of 55.71 dB, the Payload of 52,400 bytes and the robustness.
Keywords: Steganography | Cryptography | Exploiting modification direction | Knight tour | Vigenere cipher | Huffman coding
مقاله انگلیسی
7 Improved Cohort Intelligence: A high capacity, swift and secure approach on JPEG image steganography
بهبود هوش گروهی: رویکردی با ظرفیت بالا ، سریع و ایمن در استگانوگرافی تصویر JPEG -2019
In the recent high level of information security was attained by combining the concepts of cryptogra- phy, steganography along with the nature inspired optimization algorithms. However, in today’s world computational speed plays a vital role for the success of any scientific method. The optimization algo- rithms, such as cohort Intelligence with Cognitive Computing (CICC) and Modified-Multi Random Start Local Search (M-MRSLS) were already implemented and applied for JPEG image steganography for 8 ×8 as well as 16 ×16 quantization table, respectively. Although results were satisfactory in terms of image quality and capacity, the computational time was high for most of the test images. To overcome this challenge, the paper proposes modified version of cohort intelligence (CI) algorithm referred to as Im- proved Cohort Intelligence (CI). The Improved CI algorithm was considered as a cryptography technique and implemented to generate optimized cipher text. Improved CI algorithm was further employed for JPEG image steganography to propose a reversible data hiding scheme. Experimentation was done on grey scale image, of size 256 ×256; both for 8 ×8 and 16 ×16 quantization table. Results validation of the proposed work exhibited very encouraging improvements in the computational cost
Keywords: Information security | Cryptography | Steganography | JPEG compression | Grey scale image | Improved CI
مقاله انگلیسی
8 A novel image steganography technique based on quantum substitution boxes
یک تکنیک جدید استگانوگرافی تصویر مبتنی بر جعبه های جایگزینی کوانتومی-2019
Substitution boxes play an essential role in designing secure cryptosystems. With the evolution of quantum technologies, current data security mechanisms may be broken due to their construction based on mathematical computation. Quantum walks, a universal quantum computational model, play an essential role in designing quantum algorithms. We utilize the benefits of quantum walks to present a novel technique for constructing substitution boxes (S-boxes) based on quantum walks (QWs). The performance of the presented QWs S-box technique is evaluated by S-box evaluation criteria, and our results prove that the constructed S-box has vital qualities for viable applications in security purposes. Furthermore, a new technique for image steganography is constructed. The proposed technique is an integrated mechanism between classical data hiding and quantum walks to achieve better security for the embedded data. The embedding and extraction procedures are controlled by QWs S-box. The inclusion of cryptographic QWs S-box ensures the security of both embedding and extraction phases. At the extraction phase, only the stego image and the secret values are needed for constructing the secret data. Experimental results demonstrate that the presented technique has a high-security, high embedding capacity and good visual quality.
Keywords:Data hiding | Image steganography | Quantum walks | Cryptography | Substitution boxes
مقاله انگلیسی
9 Steganalysis via a convolutional neural network using large convolution filters for embedding process with same stego key: A deep learning approach for telemedicine
Steganalysis با استفاده از یک شبکه عصبی کانولوشن با استفاده از فیلترهای کانولاسیون بزرگ برای جاسازی فرآیند با همان کلید استگو: روش یادگیری عمیق برای پزشکی از راه دور -2017
Steganography, the art to hide information inside host media like pictures and movies, and steganalysis, its countermeasure attempting to detect the presence of an hidden information within an innocent-looking document, are frequently reported as promising information security techniques for telemedicine. For the past few years, in the race between image steganography and steganalysis, deep learning has emerged as a very promising alternative to steganalyzer approaches based on rich image models combined with ensemble classifiers. A key knowledge of image steganalyzer, which combines relevant image features and innovative classification procedures, can be deduced by a deep learning approach called convolutional neural networks (CNN). This kind of deep learning networks is so well-suited for classification tasks based on the detection of variations in 2D shapes that it is the state-of-the-art in many image recognition problems.
KEYWORDS : Telemedicine | security | Steganography | Steganalyzis | Deep learning
مقاله انگلیسی
10 Security levels in steganography – Insecurity does not imply detectability
سطح امنیتی در steganography - ناامنی به این معنی نیست که قابل تشخیص است-2017
Article history:Received 14 August 2015Received in revised form 11 August 2016 Accepted 11 June 2017Available online xxxx Communicated by G. PersianoKeywords: Steganography Covertext channels Provable security Distribution learningThis paper takes a fresh look at security notions for steganography – the art of encoding secret messages into unsuspicious covertexts such that an adversary cannot distinguish the resulting stegotexts from original covertexts. However, stegosystems that fulfil the security notion used so far are quite inefficient. The current setting is not able to quantify the power of the adversary and thus leads to extremely high requirements. We will show that there exist stegosystems that are not secure with respect to the measure insecurity considered so far. However, it is totally unclear how they could be successfully attacked when used in practice.This indicates that a different notion of security is needed which we call detectability. We propose different variants of (un)-detectability and discuss their appropriateness by constructing concrete examples of stegosystems and covertext distributions.As main technical contribution we design a framework for steganography that exploits the difficulty to get detailed information about the covertext distribution. This way, for the first time a tight analytical relationship between the task of discovering the use of stegosystems and the task of differentiating between possible covertext distributions is obtained. 2017 Published by Elsevier B.V.
Keywords: Steganography | Covertext channels | Provable security | Distribution learning
مقاله انگلیسی
rss مقالات ترجمه شده rss مقالات انگلیسی rss کتاب های انگلیسی rss مقالات آموزشی
logo-samandehi