scispace - formally typeset
Search or ask a question
Journal ArticleDOI

Analysis of various data security techniques of steganography: A survey

TL;DR: The objective of the paper is to examine and scrutinize the different algorithms of steganography based on parameters like PSNR, MSE, and Robustness and make recommendations for producing high-quality stego images, high-payload capacity, and robust techniques of Steganography.
Abstract: The amount of data exchanged via the Internet is increasing nowadays. Hence, data security is termed as a serious issue while communication of data is processed over the Internet. Everyone needs th...
Citations
More filters
Journal ArticleDOI
TL;DR: In this article, the authors proposed an image steganography procedure by utilizing the combination of various algorithms that build the security of the secret data by utilizing Binary bit-plane decomposition (BBPD) based image encryption technique.
Abstract: Internet of Things (IoT) is a domain where the transfer of big data is taking place every single second. The security of these data is a challenging task; however, security challenges can be mitigated with cryptography and steganography techniques. These techniques are crucial when dealing with user authentication and data privacy. In the proposed work, a highly secured technique is proposed using IoT protocol and steganography. This work proposes an image steganography procedure by utilizing the combination of various algorithms that build the security of the secret data by utilizing Binary bit-plane decomposition (BBPD) based image encryption technique. Thereafter a Salp Swarm Optimization Algorithm (SSOA) based adaptive embedding process is proposed to increase the payload capacity by setting different parameters in the steganographic embedding function for edge and smooth blocks. Here the SSOA algorithm is used to localize the edge and smooth blocks efficiently. Then, the hybrid Fuzzy Neural Network with a backpropagation learning algorithm is used to enhance the quality of the stego images. Then these stego images are transferred to the destination in the highly secured protocol of IoT. The proposed steganography technique shows better results in terms of security, image quality, and payload capacity in comparison with the existing state of art methods.

45 citations

Journal ArticleDOI
TL;DR: In this article , the authors present a detailed discussion of different types of medical images and the attacks that may affect medical image transmission and present an in-depth overview of security techniques, such as cryptography, steganography, and watermarking.
Abstract: Recently, there has been a rapid growth in the utilization of medical images in telemedicine applications. The authors in this paper presented a detailed discussion of different types of medical images and the attacks that may affect medical image transmission. This survey paper summarizes existing medical data security approaches and the different challenges associated with them. An in-depth overview of security techniques, such as cryptography, steganography, and watermarking are introduced with a full survey of recent research. The objective of the paper is to summarize and assess the different algorithms of each approach based on different parameters such as PSNR, MSE, BER, and NC.

16 citations

Journal ArticleDOI
TL;DR: In this article , a fast multiple zero-watermarking method based on Multi-channel Fractional Legendre Fourier moments (MFrLFMs) for medical image security and copyright protection in IoMT applications without deforming the original medical images is presented.
Abstract: The Internet of Medical Things (IoMT) plays a vital role in healthcare systems to increase electronic devices’ accuracy, reliability, and productivity. This paper presents fast multiple zero-watermarking methods based on Multi-channel Fractional Legendre Fourier moments (MFrLFMs) for medical image security and copyright protection in IoMT applications without deforming the original medical images. The MFrLFMs are utilized due to their high accuracy, numerical stability, geometric invariances, and high resistance to various attacks. Based on the most significant features generated from MFrLFMs, after scrambling using a two-dimensional Discrete Henon Map, then XORed with binary scrambled watermark to construct owner share. The proposed watermarking method is implemented using a low-cost Raspberry Pi Linux microprocessor, which ensures the suitability of medical devices in the IoMT environment. We evaluated the robustness of the proposed algorithm against different geometric and common signal processing attacks using various medical images. The proposed method gives better BER, NC, and SSIM values than existing methods.

12 citations

Journal ArticleDOI
TL;DR: Fast multiple zero-watermarking methods based on Multi-channel Fractional Legendre Fourier moments (MFrLFMs) for medical image security and copyright protection in IoMT applications without deforming the original medical images are presented.
Abstract: Internet of Medical Things (IoMT) plays a vital role in healthcare systems to increase electronic devices accuracy, reliability, and productivity. This paper presents fast multiple zero-watermarking methods based on Multi-channel Fractional Legendre Fourier moments (MFrLFMs) for medical image security and copyright protection in IoMT applications without deforming the original medical images. The MFrLFMs are utilized due to their high accuracy, numerical stability, geometric invariances, and high resistance to various attacks. Based on the most significant features generated from MFrLFMs, after scrambling using two-dimensional Discrete Henon Map, then XORed with binary scrambled watermark to construct owner share. The proposed watermarking method is implemented using a low-cost Raspberry Pi Linux microprocessor, which ensures the suitability of medical devices in the IoMT environment. We evaluated the robustness of the proposed algorithm against different geometric and common signal processing attacks using various medical images. The proposed method gives better BER, NC, and SSIM values than existing methods.

10 citations

Journal ArticleDOI
TL;DR: An in-depth understanding is established of the impact of Cloud and Edge computing-based environmental factors on computer forensics and the various challenges for the digital forensics process.
Abstract: In recent years, there has been a dramatic change in attitude towards computers and the use of computer resources in general. Cloud and Edge computing have emerged as the most widely used technologies, including fog computing and the Internet of Things (IoT). There are several benefits in exploiting Cloud and Edge computing paradigms, such as lower costs and higher efficiency. It provides data computation and storage where data are processed, enables better data control, faster understanding and actions, and continuous operation. However, though these benefits seem to be appealing, their effects on computer forensics are somewhat undesirable. The complexity of the Cloud and Edge environments and their key features present many technical challenges from multiple stakeholders. This paper seeks to establish an in-depth understanding of the impact of Cloud and Edge computing-based environmental factors. Software and hardware tools used in the digital forensic process, forensic methods for handling tampered sound files, hidden files, image files, or images with steganography, etc. The technical/legal challenges and the open design problems (such as distributed maintenance, multitasking and practicality) highlight the various challenges for the digital forensics process.

7 citations

References
More filters
Journal ArticleDOI
TL;DR: The qualitative and quantitative results prove the efficiency of SSA and MSSA and demonstrate the merits of the algorithms proposed in solving real-world problems with difficult and unknown search spaces.

3,027 citations


"Analysis of various data security t..." refers methods in this paper

  • ...Mirjalili et al. (2017) proposed the salp swarm optimization algorithm and multi-objective salp swarm optimization algorithm for giving the optimized result for many mathematical functions....

    [...]

  • ...As per the analysis of the survey, there is further scope of improvement in steganography by combining the techniques of Liao et al. (2017) and Mirjalili et al. (2017), which can give improved adaptive embedding based on the salp swarm optimization algorithm....

    [...]

Journal ArticleDOI
TL;DR: This paper describes two digital implementations of a new mathematical transform, namely, the second generation curvelet transform in two and three dimensions, based on unequally spaced fast Fourier transforms, while the second is based on the wrapping of specially selected Fourier samples.
Abstract: This paper describes two digital implementations of a new mathematical transform, namely, the second generation curvelet transform in two and three dimensions. The first digital transformation is based on unequally spaced fast Fourier transforms, while the second is based on the wrapping of specially selected Fourier samples. The two implementations essentially differ by the choice of spatial grid used to translate curvelets at each scale and angle. Both digital transformations return a table of digital curvelet coefficients indexed by a scale parameter, an orientation parameter, and a spatial location parameter. And both implementations are fast in the sense that they run in O(n^2 log n) flops for n by n Cartesian arrays; in addition, they are also invertible, with rapid inversion algorithms of about the same complexity. Our digital transformations improve upon earlier implementations—based upon the first generation of curvelets—in the sense that they are conceptually simpler, faster, and far less redundant. The software CurveLab, which implements both transforms presented in this paper, is available at http://www.curvelet.org.

2,603 citations


"Analysis of various data security t..." refers methods in this paper

  • ...The steganography procedure likewise utilizes curvelet changes (Candès et al., 2006) to conceal mystery data into their ECG signal....

    [...]

  • ...The least significant bit shows the detailed analysis in Chandramouli and Memon (2001) and Al-Omari and Al-Taani (2017) and gives a more secure and robust method of LSB steganography for colored images....

    [...]

Journal ArticleDOI
01 Jul 1999
TL;DR: An overview of the information-hiding techniques field is given, of what the authors know, what works, what does not, and what are the interesting topics for research.
Abstract: Information-hiding techniques have recently become important in a number of application areas. Digital audio, video, and pictures are increasingly furnished with distinguishing but imperceptible marks, which may contain a hidden copyright notice or serial number or even help to prevent unauthorized copying directly. Military communications systems make increasing use of traffic security techniques which, rather than merely concealing the content of a message using encryption, seek to conceal its sender, its receiver, or its very existence. Similar techniques are used in some mobile phone systems and schemes proposed for digital elections. Criminals try to use whatever traffic security properties are provided intentionally or otherwise in the available communications systems, and police forces try to restrict their use. However, many of the techniques proposed in this young and rapidly evolving field can trace their history back to antiquity, and many of them are surprisingly easy to circumvent. In this article, we try to give an overview of the field, of what we know, what works, what does not, and what are the interesting topics for research.

2,561 citations


"Analysis of various data security t..." refers background or methods in this paper

  • ...(Petitcolas et al., 1999) This paper gave an outline of data stowing away and also described the no. of attacks on different steganographic techniques and the various techniques but cannot give the comparisons between them and any future recommendations on steganography....

    [...]

  • ...For the solution of safety and security of communicating data, there are two processes, one is steganography and other is cryptography (Petitcolas et al., 1999) Cryptography is the technique that transfers the data in coded form, in which only the sender and receiver are aware of the key of encoded…...

    [...]

  • ...In this, a Secret message is installed in an authorized carrier in such a way that it is not recognizable for the intruder (Petitcolas et al., 1999)....

    [...]

Proceedings ArticleDOI
07 Dec 2015
TL;DR: This paper adaptively learn correlation filters on each convolutional layer to encode the target appearance and hierarchically infer the maximum response of each layer to locate targets.
Abstract: Visual object tracking is challenging as target objects often undergo significant appearance changes caused by deformation, abrupt motion, background clutter and occlusion. In this paper, we exploit features extracted from deep convolutional neural networks trained on object recognition datasets to improve tracking accuracy and robustness. The outputs of the last convolutional layers encode the semantic information of targets and such representations are robust to significant appearance variations. However, their spatial resolution is too coarse to precisely localize targets. In contrast, earlier convolutional layers provide more precise localization but are less invariant to appearance changes. We interpret the hierarchies of convolutional layers as a nonlinear counterpart of an image pyramid representation and exploit these multiple levels of abstraction for visual tracking. Specifically, we adaptively learn correlation filters on each convolutional layer to encode the target appearance. We hierarchically infer the maximum response of each layer to locate targets. Extensive experimental results on a largescale benchmark dataset show that the proposed algorithm performs favorably against state-of-the-art methods.

1,812 citations


"Analysis of various data security t..." refers methods in this paper

  • ...…available on steganography which gives a more robust steganographic video algorithm (Mstafa et al., 2017) based on DCT and DWT domains dependent on the algorithm of Moving item Tracking given by Ma et al. (2015) work for the improvement of accuracy of tracking and visual tracking and robustness....

    [...]

Journal ArticleDOI
TL;DR: This paper provides a state-of-the-art review and analysis of the different existing methods of steganography along with some common standards and guidelines drawn from the literature and some recommendations and advocates for the object-oriented embedding mechanism.

1,572 citations


"Analysis of various data security t..." refers methods in this paper

  • ...References Work and their limitations (Cheddad et al., 2010b) This paper gives only an audit and examination of some existing techniques for steganography alongside some regular measures and rules drawn from the literature....

    [...]