scispace - formally typeset
Search or ask a question

Showing papers on "Cover (telecommunications) published in 2010"


Journal ArticleDOI
TL;DR: The experimental results show that the proposed scheme not only achieves high embedding capacity but also enhances the quality of the stego image from the HVS by an edge detection technique.
Abstract: Steganography is the art and science of hiding data into information. The secret message is hidden in such a way that no one can apart from the sender or the intended recipient. The least significant bit (LSB) substitution mechanism is the most common steganographic technique for embedding a secret message in an image with high capacity, while the human visual system (HVS) would be unable to notice the hidden message in the cover image. In this paper, besides employing the LSB substitution technique as a fundamental stage, we take advantage of edge detection technique. The experimental results show that the proposed scheme not only achieves high embedding capacity but also enhances the quality of the stego image from the HVS by an edge detection technique. Moreover, based on that the secret message is replaced with different LSBs, our scheme can effectively resist the image steganalysis.

221 citations


Patent
22 Dec 2010
TL;DR: In this article, a cover for a portable electronic device is disclosed, and the cover can include at least one electrical component, which can not only provide a protective and/or ornamental covering for the device, but also augment the electrical capabilities of the device.
Abstract: A cover for a portable electronic device is disclosed. The cover can include at least one electrical component. For example, in one embodiment, an electrical component can be embedded in the cover. When the cover is placed on or mated with the portable electronic device, the electrical component embedded in the cover is able to interact with electrical circuitry of the portable electronic device. Advantageously, the cover can not only provide a protective and/or ornamental covering for the portable electronic device but can also augment the electrical capabilities of the portable electronic device.

215 citations


Patent
12 Nov 2010
TL;DR: In this article, the features of shape and configuration of the PROTECTIVE COVER, including the keyboard, for mobile computing devices are described in solid lines in the drawings, and the design consists of the features and configuration features of the cover.
Abstract: The design consists of the features of shape and configuration of the PROTECTIVE COVER, INCLUDING KEYBOARD, FOR MOBILE COMPUTING DEVICE shown in solid lines in the drawings.

138 citations


Journal Article
TL;DR: The aim of this paper is to propose a modified high,capacity image steganography technique that depends on wavelet transform with acceptable levels of imperceptibility and distortion in the cover image and high level of overall security.
Abstract: Steganography is the art and science of concealing information in unremarkable cover media so as not to arouse an eavesdropper's suspicion. It is an application under information security field. Being classified under information security, steganography will be characterized by having set of measures that rely on strengths and counter measures (attacks) that are driven by weaknesses and vulnerabilities. Today, computer and network technologies provide easy,to,use communication channels for steganography. The aim of this paper is to propose a modified high,capacity image steganography technique that depends on wavelet transform with acceptable levels of imperceptibility and distortion in the cover image and high level of overall security.

128 citations


Journal ArticleDOI
TL;DR: The video based Steganography has been discussed and the advantages of using the video file as a cover carrier for steganography have been proposed.
Abstract: The aim of this review is to study the methods of steganography using the video file as a cover carrier The steganography is the art of protecting the information through embedding data in medium carrier, for instants this study illustrate historically this art, as well as the study describes methods as a review for this art in the video file The video based steganography can be used as one video file, separated images in frames or images and audio files Since that, the use of the video based steganography can be more eligible than other multimedia files As a result of this study, the video based steganography has been discussed and the advantages of using the video file as a cover carrier for steganography have been proposed

75 citations


Journal ArticleDOI
TL;DR: The aim of this study is to review the strength and weakness for the possible multimedia cover for the steganography approaches and the security level of each approach and how is probable to combine the Steganography and cryptography.
Abstract: The aim of this study is to review the strength and weakness for the possible multimedia cover for the steganography approaches. In addition, the security level of each approach and how is probable to combine the steganography and cryptography. Steganography is an art on which the data can be hide in other data as cover, the multimedia files is the commonly used for hiding data. The main aspects of the steganography is the capacity and security, where the capacity refer to how much data can be hidden in the cover carrier, while the security concern with the ability of disclose or altering the data by unauthorized party. The multimedia files, such as, image, video, audio and text are the possible covers for hiding secure information or data. Each of these covers has advantages and disadvantages; as a result of this study we will discuss the possibility to use these files as a cover. In the last part of this study, we suggest a further direction to improve the capacity and security aspects.

71 citations



01 Jan 2010
TL;DR: This paper provides a critical review of the steganalysis algorithms available to analyze the characteristics of an image, audio or video stego media vis-a-vis the corresponding cover media (without the hidden information) and understand the process of embedding the information and its detection.
Abstract: Recently, there has been a lot of interest in the fields of Steganography and Steganalysis. Steganography involves hiding information in a cover (carrier) media to obtain the stego media, in such a way that the cover media is perceived not to have any embedded message for its unintended recipients. Steganalysis is the mechanism of detecting the presence of hidden information in the stego media and it can lead to the prevention of disastrous security incidents. In this paper, we provide a critical review of the steganalysis algorithms available to analyze the characteristics of an image, audio or video stego media vis-a-vis the corresponding cover media (without the hidden information) and understand the process of embedding the information and its detection. It is noteworthy that each of these cover media has different special attributes that are altered by a steganography algorithm in such a way that the changes are not perceivable for the unintended recipients; but, the changes are identifiable using appropriate steganlysis algorithms. We anticipate that this paper can also give a clear picture of the current trends in steganography so that we can develop and improvise appropriate steganlysis algorithms.

65 citations


Patent
22 Apr 2010
TL;DR: In this article, a cover for a tablet PC provides protection to the body while allowing free access to a touch screen and other controls, and support elements allowing the PC to be situated for use on a horizontal surface, with the actual angle of situation adjustable to meet individual needs.
Abstract: A cover for a tablet PC provides protection to the body while allowing free access to a touch screen and other controls. The cover has an integrally connected keyboard or other input device which can be simply deployed for use, allowing conventional keyboard- or other-based input to the PC. When not in use the input device can be stowed at the rear of the cover, complementing device protection thereto. The cover further provides support elements allowing the PC to be situated for use on a horizontal surface, with the actual angle of situation adjustable to meet individual needs. When not needed or for transport, the support elements collapse and are received within the cover. In addition, the cover allows the PC to be situated, with the input device deployed or otherwise, in either a landscape or portrait orientation.

55 citations


Patent
30 Nov 2010

54 citations


Journal ArticleDOI
TL;DR: This paper presents a text steganography system for spelling languages that can work reliably with the capability of immunity from regular operations, such as formatting, compressing and sometimes manual altering operation in text size, front, color and the space between words.
Abstract: H igh transmission efficiency , low resource occupancy and intelligible meaning make text message as the most commonly used type of media in our daily communication . Text steganography, an information hiding technology based on text message , has been a new exploring research in recent years. Due to the restriction of redundant information as well as its alterability in manual operation, text message is difficult to hide secret information effectively and reliably. Based on Markov Chain source model and DES algorithm, this paper presents a text steganography system for spelling languages. It can work reliably with the capability of immunity from regular operations, such as formatting, compressing and sometimes manual altering operation in text size, front, color and the space between words . By adopting the technique of heuristic composition, this system can produce cover text close to nature language. It’s suitable for hiding short information in online communication, such as E-mail, MSN Messenger, QQ, instant conversation and the short message on mobile phone.

Journal ArticleDOI
TL;DR: The aim of the proposed system is to hide information ( data file) within image page of execution file (EXEfile) to make sure changes made to the file will not be detected by universe and the functionality of the exe.file is still functioning after hiding process.
Abstract: A Previously traditional methods were sufficient to protect the information, since it is simplicity in the past does not need complicated methods but with the progress of information technology, it become easy to attack systems, and detection of encryption methods became necessary to find ways parallel with the differing methods used by hackers, so the embedding methods could be under surveillance from system managers in an organization that requires the high level of security. This fact requires researches on new hiding methods and cover objects which hidden information is embedded in. It is the result from the researches to embed information in executable files, but when will use the executable file for cover they have many challenges must be taken into consideration which is any changes made to the file will be firstly detected by untie viruses , secondly the functionality of the file is not still functioning. In this paper, a new information hiding system is presented. The aim of the proposed system is to hide information (data file) within image page of execution file (EXEfile) to make sure changes made to the file will not be detected by universe and the functionality of the exe.file is still functioning after hiding process. Meanwhile, since the cover file might be used to identify hiding information, the proposed system considers overcoming this dilemma by using the execution file as a cover file.

Journal ArticleDOI
TL;DR: This paper proposes a framework that will integrate both steganographic and cryptographic approaches within a hyiperd space of an EXE file for highly securing data that is hidden using both the advance encryption standard (AES) method and statistical technique (ST) computation.
Abstract: Steganography is an art that involves the concealing of information with the aim of making the communication invisible. Unlike cryptography, where the main aim is to secure communications from the Snooper by encoding that data in such a way that it becomes visible but not understood. In this paper, we propose a framework that will integrate both steganographic and cryptographic approaches within a hyiperd space of an EXE file. This approach will be used for highly securing data that is hidden; using both the advance encryption standard (AES) method and statistical technique (ST) computation. To further address the security issues, we will use the EXE as a cover for the hidden data; the executable file cover was selected in this approach because of its ability to hide huge amounts of data within a hyiperd space of an EXE file which in turn overcomes the problem of the data hiding quantity. The use of the EXE file also makes sure that the changes made to it will not be detected by anti-virus and its functionality will not be negatively affected after the hiding process, features of the short-term responses were simulated, and indicated that the size of the hidden data does depend on the size of the Unused Area1+ Unused Area 2 + Image Pages; within the cover file which is equal to 28% of the size of the exe.file before the hiding process. Most antivirus systems do not allow direct writing into executable files, so the approach of the proposed system is to prevent the hidden information from being disclosed by these systems and the exe.file still functioning normally after the data hiding process. Key words: Steganography, hidden data, encryption, advance encryption standard (AES).

Proceedings ArticleDOI
12 Mar 2010
TL;DR: A specific image based steganography technique for communicating information more securely between two locations is proposed and the author incorporated the idea of secret key for authentication at both ends in order to achieve high level of security.
Abstract: Steganography is a process that involves hiding a message in an appropriate carrier like image or audio. It is of Greek origin and means "Covered or hidden writing". The carrier can be sent to a receiver without any one except the authenticated receiver only knows existence of the information. Steganography is an emerging area which is used for secured data transmission over any public media. Considerable amount of work has been carried out by different researchers on steganography. In this paper, a specific image based steganography technique for communicating information more securely between two locations is proposed. The author incorporated the idea of secret key for authentication at both ends in order to achieve high level of security. Before the embedding operation the cover image is segmented in different objects through normalized cut. As a further improvement of security level, the information has been permuted, encoded through integer wavelet transformation by lifting scheme and segmented in different parts and then finally each part has been embedded through modified lsb embedding method on different cuts of the cover image to form different stego objects. Finally stego image is formed by combining different stego objects and transmit to the receiver side. At the receiver side different reverse operation has been carried out to get back the original information. The proposed embedding approach works by selecting the embedding pixels using some mathematical function and then finds the 8 neighborhood of the selected pixel and map each bit of the secret message in each of the neighbor pixel in a specified manner. Before embedding a checking has been done to find out whether the selected pixel or its neighbor lies at the boundary of the image or not.

Proceedings ArticleDOI
29 Nov 2010
TL;DR: A new linguistic approach for Steganography through Indian Languages by considering the flexible grammar structure of Indian Languages is presented and exhibits satisfactory result on some Indian Languages like Bengali.
Abstract: Steganography is the art and science of hiding a message inside another message without drawing any suspicion to the others so that the message can only be detected by its intended recipient. With the other Steganography methods such as Image, Audio, Video, a number of text Steganography algorithms have been introduced. This paper presents a new linguistic approach for Steganography through Indian Languages by considering the flexible grammar structure of Indian Languages. To add more security to the system, instead of hiding the original message it is converted to an irrelevant binary stream by comparing the message bits with the pixel values of an Image. Thereafter, the bits of this binary stream are encoded to some part-of-speech and by creating meaningful sentences starting with a suitable word belonging to the mapped part-of-speech, the proposed method hides the message inside a cover file containing some innocuous sentences. Similarly in receiving side, the algorithm finds the corresponding part-of-speech of the starting word of each sentence and place the bit stream of the mapped part-of-speech to recover the converted message. After comparing these bits with the Image pixels, the algorithm extracted the original message from the cover file. The proposed method exhibits satisfactory result on some Indian Languages like Bengali.

Journal ArticleDOI
TL;DR: A new system of information hiding using computation between cryptography and steganography is presented and the proposed system includes two main functions; first is the hiding of the information in the with in computation area which is unused area two and image page of PE-file (exe.file), and the extraction of the hiding information through three process.
Abstract: The internet and the World Wide Web have revolutionalized the way in which digital data is distributed. The widespread and easy access to multimedia content has motivated development of technologies for steganography or data hiding, so the strength of the combination between hiding and encryption science is due to the non-existence of standard algorithms to be used in hiding and encrypting secret messages. Also there are many ways in hiding methods such as combining several media (covers) with different methods to pass a secret message. Furthermore, there is no formal method to be followed to discover a hidden data. For this reason, the task of this paper becomes difficult. In this paper proposed a new system of information hiding using computation between cryptography and steganography is presented. The proposed system aim to hide information (data file) using computation between cryptography and steganography with in computation area which is unused area two and image page of any execution file (exe.file), to increase the degree of security and the amount of hidden data within exe file without change the size of cover file, to make sure changes made to the exe.file will not be detected by anti-virus and the functionality of the exe.file is still functioning. The system includes two main functions; first is the hiding of the information in the with in computation area which is unused area two and image page of PE-file (exe.file), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno file, extract the information, and decryption of the information). The proposed system is implemented by using Java.

Patent
24 Aug 2010
TL;DR: In this article, the authors propose a module adapted for use with a datacommunications equipment mounting structure, which includes a generally upright divider panel, a cover panel disposed generally parallel to the divider, the cover panel and divider panels being spaced apart from each other to form a gap.
Abstract: A module adapted for use with a datacommunications equipment mounting structure includes: a generally upright divider panel; a cover panel disposed generally parallel to the divider panel, the cover panel and divider panel being spaced apart from each other to form a gap; and a plurality of telecommunications cables, each of the telecommunications cables comprising a plurality of telecommunications patch cords, the cables comprising bundled patch cords at a first end and unbundled patch cords at a second opposite end, the cables being positioned in the gap between the divider panel and cover panel. The bundled patch cords at the cable first end include first interconnection terminals, and the unbundled patch cords at the second end include second interconnection terminals. The first terminals are located at first edges of the divider and cover panels. The unbundled patch cords are separately moveable between a stored position, in which the second terminals are located at second edges of the divider and cover panels, and an extended position, in which the second terminals are positioned away from the second edges of the divider and cover panels.

Proceedings ArticleDOI
15 Nov 2010
TL;DR: A new method of adaptive blind digital image watermarking in spatial domain is introduced and PSNR results of the proposed method as compared to the current approaches in this domain are introduced.
Abstract: This paper introduces a new method of adaptive blind digital image watermarking in spatial domain. Watermarking is a way to hide secret information in a cover image or host medium. Amount of information to hide in the cover image is limited because there is a trade-off between imperceptibility and payload of the data to hide. So increasing the payload in the cover image while watermark remain imperceptible is a critical aspect in watermarking process and has attracted many researchers in the recent past. In the proposed method both cover and secret images are partitioned into equal size blocks. Then host for each secret image block is intelligently selected through Genetic Algorithm (GA). GA helps in identifying the target blocks of the cover image such that with the LSB embedding, visual quality of the cover image and imperceptibility of secret image remains least affected. At the watermark extraction phase only watermarked image is required from which using Jigsaw Puzzle Solver (JPS) the secret image is reconstructed. In spite of increasing the payload 2 times experimental results have shown better imperceptibility i.e. PSNR results of the proposed method as compared to the current approaches in this domain.

Patent
James Edward Renwick1
13 Aug 2010
TL;DR: In this article, a cover is configured to overlie a touch screen of an electronic device, including an output portion configured to enable content presented on the touch screen to be visible to a user through the cover; and the cover including a plurality of distinct input portions each sharing a physical characteristic that demarcates each of the plurality as an input portion.
Abstract: A cover configured to overlie a touch screen of an electronic device the cover including an output portion configured to enable content presented on the touch screen to be visible to a user through the cover; and the cover including a plurality of distinct input portions each sharing a physical characteristic that demarcates each of the plurality of distinct input portions as an input portion, wherein each of the plurality of distinct input portions is configured to enable one of a plurality of touch sensitive areas of the touch screen to be actuated.

Patent
21 Jun 2010

Journal ArticleDOI
TL;DR: Simulation results show that the proposed scheme provides a good improvement in the visual quality of the extracted secret images and the cover image at the receiver and provides better hiding capacity for the cover images than earlier works.
Abstract: A novel visually imperceptible image hiding scheme based on VQ compression and LSB modification is introduced in this article. Multiple secret images can be simultaneously and imperceptibly hid into another cover image with the same image size by the proposed scheme. In order to reduce the volume of secret images to be hid, a codebook is first generated from the secret images and these images are encoded into binary indices by the vector quantization technique. Then the compressed data of secret images are embedded into the VQ codebook used in the encoding procedure by an adaptive least-significant-bits (LSB) modification technique. For the security purpose, the slightly modified codebook is further encrypted into a meaningless data stream by the DES cryptosystem. Finally, the encrypted codebook is embedded into the cover image using the greedy LSB modification technique. Simulation results show that the proposed scheme provides a good improvement in the visual quality of the extracted secret images and the cover image at the receiver. In addition, the proposed scheme provides better hiding capacity for the cover image than earlier works.

Patent
12 Feb 2010
TL;DR: In this paper, a protection cover for portable terminals such as a cellular phone is provided, which enables to view and operate a touch screen from the outside without opening the cover, and a decoration member installed on the girth back side of the front cover improves decoration of the terminal.
Abstract: PURPOSE: A protection cover for portable terminals such as a cellular phone is provided, which enables to view and operate a touch screen from the outside without opening the cover. CONSTITUTION: A portable terminal protection cover comprises a front cover(10) supporting the front side of the portable terminal; a rear cover(20) supporting the rear side; a connection part(30) connecting the front and rear covers. A transparent window(50) formed in the front cover makes a screen exposed outside. A decoration member installed on the girth back side of the front cover improves decoration of the terminal. Auxiliary operation holes(56) are formed in the portion where buttons are placed so that each button can be exposed to the outside. Holes(57,58) for receiving and sending voices are formed in the location that a receiver and a transmitter are located to enable telephone call.


01 Jan 2010
TL;DR: Experimental results show that this algorithm not only has good imperceptibility and is robust against different kinds of attacks, such as noise adding, re-quantizing,re-sampling, MP3 compression, and so on, but also has high-capacity, and can realize the blind detection.
Abstract: Audio information hiding hides the secret message into the audio data flows by some characteristics of human auditory systemAn audio information hiding algorithm with high-capacity which based on chaotic and wavelet transform is proposed,which,scrambles the secret message by chaotic sequences,and then one-to-one hides those into the high and low frequency of the wavelet field of the cover message by changing the cover message's wavelet domain coefficient's polarity based on the features that audio sample dots inversion has little influence on the human hearingExperimental results show that this algorithm not only has good imperceptibility and is robust against different kinds of attacks,such as noise adding,re-quantizing,re-sampling,MP3 compression,and so on,but also has high-capacity,and can realize the blind detection

Patent
Motohide Shiozawa1
28 Jan 2010
TL;DR: A control apparatus configured to control an image forming system, in forming a transparent image so as to cover color images fixed on a sheet, applies a transparent toner on an area on which an image can be formed and which is other than an area that a user desires to increase the glossiness thereof as mentioned in this paper.
Abstract: A control apparatus configured to control an image forming system, in forming a transparent image so as to cover color images fixed on a sheet, applies a transparent toner on an area on which an image can be formed and which is other than an area that a user desires to increase the glossiness thereof.

Book ChapterDOI
01 Jan 2010
TL;DR: Design patterns are an appropriate means to code solution knowledge within different areas of science and practice and were invented in the building architecture sciences but were quickly applied to information science and other disciplines.
Abstract: Design patterns are an appropriate means to code solution knowledge within different areas of science and practice. They cover a description of the problem with the problem context, a description of a possible solution to the problem, and ancillary conditions of this solution. Initially design patterns were invented in the building architecture sciences but were quickly applied to information science and other disciplines.


Journal ArticleDOI
TL;DR: This paper deals with "Multimedia Steganography" in the most common forms of multimedia- Image, Video and Audio.
Abstract: In a highly digitalized world we live today, the data to be transmitted are confidential at times, and in such cases there are many malicious intruders who try to access this information. Steganography is one recent method to provide reliable security. Steganography is the science of embedding data into different covers such that the data embedded is imperceptible; the aim is to embed and deliver secret messages in digital objects without suspicion. The covers that can be used cover all forms of digital multimedia. This paper deals with “Multimedia Steganography” in the most common forms of multimedia- Image, Video and Audio.

Proceedings ArticleDOI
29 Nov 2010
TL;DR: This paper presents a new approach for steganography in Indian Languages that is able to hide a secret message in the text and shows how easily the secret message can be recovered by the intended receiver.
Abstract: Steganography is the method to hide a message inside another message without drawing any suspicion to the others and that the message can only be detected by its intended recipient. With the other steganography methods such as Image, Audio, Video, a number of text steganography algorithms have been introduced. This paper presents a new approach for steganography in Indian Languages. Considering the availability of more feature code able characters and flexible grammar structure of Indian Languages this approach is able to hide a secret message in the text. The text, after replacing feature code able characters with the transformed versions, can be used as cover media. Similarly by applying a reverse method to the cover file, we show how easily the secret message can be recovered by the intended receiver.

Proceedings ArticleDOI
11 Dec 2010
TL;DR: An improvement over this attack that, by employing a weighted mean of the observed relative receiver popularity, is more accurate than the original one based upon arithmetic mean is presented.
Abstract: The Statistical Disclosure Attack against a particular user of an anonymity system is known to be very effective in determining, after long-term observation of the system, the set of receivers that user sends messages to. This paper first presents an improvement over this attack that, by employing a weighted mean of the observed relative receiver popularity, is more accurate than the original one based upon arithmetic mean. Second, a mathematical analysis is presented of this attack on a model, in which senders blend dummy messages with real ones. It is shown that despite such sender-generated dummy cover traffic, the attack can proceed almost unhindered. The analysis substantiates earlier empirical indications of the ineffectiveness of this countermeasure.