scispace - formally typeset
Search or ask a question

Showing papers on "Cover (telecommunications) published in 2015"


Journal ArticleDOI
Erol Gelenbe, Yves Caseau1
29 Jun 2015-Ubiquity
TL;DR: The authors evaluate the impact of different sectors of information and communication technologies (ICT) on energy consumption and CO2 emissions.
Abstract: In this article the authors evaluate the impact of different sectors of information and communication technologies (ICT) on energy consumption and CO2 emissions. ICT is understood to cover computer and peripheral equipment including local area networks, telecommunication equipment and networks, and data centers.

215 citations


Dissertation
01 Oct 2015
TL;DR: This thesis is devoted to investigate and develop steganography schemes for embedding secret images in image files with optimal performance in terms of imperceptibility of the hidden secrets, payload capacity, efficiency of embedding and robustness against steganalysis attacks.
Abstract: The rapid advancements in digital communication technology and huge increase in computer power have generated an exponential growth in the use of the Internet for various commercial, governmental and social interactions that involve transmission of a variety of complex data and multimedia objects. Securing the content of sensitive as well as personal transactions over open networks while ensuring the privacy of information has become essential but increasingly challenging. Therefore, information and multimedia security research area attracts more and more interest, and its scope of applications expands significantly. Communication security mechanisms have been investigated and developed to protect information privacy with Encryption and Steganography providing the two most obvious solutions. Encrypting a secret message transforms it to a noise-like data which is observable but meaningless, while Steganography conceals the very existence of secret information by hiding in mundane communication that does not attract unwelcome snooping. Digital steganography is concerned with using images, videos and audio signals as cover objects for hiding secret bit-streams. Suitability of media files for such purposes is due to the high degree of redundancy as well as being the most widely exchanged digital data. Over the last two decades, there has been a plethora of research that aim to develop new hiding schemes to overcome the variety of challenges relating to imperceptibility of the hidden secrets, payload capacity, efficiency of embedding and robustness against steganalysis attacks. Most existing techniques treat secrets as random bit-streams even when dealing with non-random signals such as images that may add to the toughness of the challenges.This thesis is devoted to investigate and develop steganography schemes for embedding secret images in image files. While many existing schemes have been developed to perform well with respect to one or more of the above objectives, we aim to achieve optimal performance in terms of all these objectives. We shall only be concerned with embedding secret images in the spatial domain of cover images. The main difficulty in addressing the different challenges stems from the fact that the act of embedding results in changing cover image pixel values that cannot be avoided, although these changes may not be easy to detect by the human eye. These pixel changes is a consequence of dissimilarity between the cover LSB plane and the secretimage bit-stream, and result in changes to the statistical parameters of stego-image bit-planes as well as to local image features. Steganalysis tools exploit these effects to model targeted as well as blind attacks. These challenges are usually dealt with by randomising the changes to the LSB, using different/multiple bit-planes to embed one or more secret bits using elaborate schemes, or embedding in certain regions that are noise-tolerant. Our innovative approach to deal with these challenges is first to develop some image procedures and models that result in increasing similarity between the cover image LSB plane and the secret image bit-stream. This will be achieved in two novel steps involving manipulation of both the secret image and the cover image, prior to embedding, that result a higher 0:1 ratio in both the secret bit-stream and the cover pixels‘ LSB plane. For the secret images, we exploit the fact that image pixel values are in general neither uniformly distributed, as is the case of random secrets, nor spatially stationary. We shall develop three secret image pre-processing algorithms to transform the secret image bit-stream for increased 0:1 ratio. Two of these are similar, but one in the spatial domain and the other in the Wavelet domain. In both cases, the most frequent pixels are mapped onto bytes with more 0s. The third method, process blocks by subtracting their means from their pixel values and hence reducing the require number of bits to represent these blocks. In other words, this third algorithm also reduces the length of the secret image bit-stream without loss of information. We shall demonstrate that these algorithms yield a significant increase in the secret image bit-stream 0:1 ratio, the one that based on the Wavelet domain is the best-performing with 80% ratio.For the cover images, we exploit the fact that pixel value decomposition schemes, based on Fibonacci or other defining sequences that differ from the usual binary scheme, expand the number of bit-planes and thereby may help increase the 0:1 ratio in cover image LSB plane. We investigate some such existing techniques and demonstrate that these schemes indeed lead to increased 0:1 ratio in the corresponding cover image LSB plane. We also develop a new extension of the binary decomposition scheme that is the best-performing one with 77% ratio. We exploit the above two steps strategy to propose a bit-plane(s) mapping embedding technique, instead of bit-plane(s) replacement to make each cover pixel usable for secret embedding. This is motivated by the observation that non-binary pixel decomposition schemes also result in decreasing the number of possible patterns for the three first bit-planes to 4 or 5 instead of 8. We shall demonstrate that the combination of the mapping-based embedding scheme and the two steps strategy produces stego-images that have minimal distortion, i.e. reducing the number of the cover pixels changes after message embedding and increasing embedding efficiency. We shall also demonstrate that these schemes result in reasonable stego-image quality and are robust against all the targeted steganalysis tools but not against the blind SRM tool. We shall finally identify possible future work to achieve robustness against SRM at some payload rates and further improve stego-image quality.

78 citations


Patent
29 Jan 2015
TL;DR: In this paper, a portable electronic device including a wireless communication unit configured to provide wireless communication; a flexible display unit including a first part; a second part rotatable based on a first boundary portion of the first part and configured to cover and not cover the first parts; and a controller configured to display information on the flexible display units based the second and third parts covering or not covering the first portion.
Abstract: A portable electronic device including a wireless communication unit configured to provide wireless communication; a flexible display unit including a first part; a second part rotatable based on a first boundary portion of the first part and configured to cover and not cover the first part, and a third part rotatable based on a second boundary portion of the first part and configured to cover and not cover the first part; and a controller configured to display information on the flexible display unit based the second and third parts covering or not covering the first part

43 citations


Journal ArticleDOI
TL;DR: Theoretical analysis and extensive experiments are conducted to validate the correctness, security, and performance of the proposed scheme and it is shown that the client can fulfill the task of selective image encryption securely and save much overhead at the same time.

31 citations


Patent
18 Mar 2015
TL;DR: In this article, a multi-functional intelligent well cover system is described, which consists of a well cover, an intelligent integration device for performing intelligent processing on the well cover and an information acquisition device for obtaining relevant information of the well COVER.
Abstract: The invention discloses a multi-functional intelligent well cover system. The multi-functional intelligent well cover system is characterized by comprising a well cover, an intelligent integration device for performing intelligent processing on the well cover, an information acquisition device for obtaining relevant information of the well cover, and an auxiliary service device for providing application service to the intelligent integration device and the information acquisition device. The multi-functional intelligent well cover system can perform positioning, unique identification, alarm and monitoring on the well cover.

31 citations


Journal ArticleDOI
TL;DR: Advancements in the information technology make it easier for an individual to access to online health information and expand the use of such information increasingly, but it is required for anindividual to have high-level health literacy toAccess to correct information.

29 citations


Patent
Sung-Joon Won1, Oh Young Hak1
23 Jan 2015
TL;DR: In this article, a mobile terminal, a method, and a cover of the mobile terminal are provided for processing input, where a first input in the second area while the cover is closed over the touch screen is detected and the first input as a first control command is processed.
Abstract: A mobile terminal, a method in the mobile terminal, and a cover of the mobile terminal are provided for processing input. A first area of a touch screen of the mobile terminal corresponding to a window area of the cover is defined, and a second area of the touch screen of the mobile terminal corresponding to a non-window area of the cover is defined. A first input in the second area while the cover is closed over the touch screen is detected and the first input as a first control command is processed.

29 citations


Patent
25 Jun 2015
TL;DR: In this article, a cover for a mobile computing device, comprising a first side and a second side, with the first side in a first use configuration of the protective cover allowing access to a home button of the mobile device, and the second side in another use configuration blocking access to the home button.
Abstract: The present invention discloses a protective cover for a mobile computing device, comprising a first side and a second side, with the first side in a first use configuration of the protective cover allowing access to a home button of the mobile computing device, and the second side in a second use configuration of the protective cover blocking access to the home button of the mobile computing device.

25 citations


Journal ArticleDOI
TL;DR: This paper has analyzed the security loopholes and performance issues of the existing algorithm and proposed an improved algorithm on the same basis, and performance of both the algorithms are tested against several visual and statistical attacks.

19 citations


Proceedings ArticleDOI
01 Nov 2015
TL;DR: The NITICS1 project is focused on assistance to elderly people in their homes and its main goal is to develop a complex system which would cover all aspects from elderly people's safety to convenient living.
Abstract: The NITICS1 project is focused on assistance to elderly people in their homes. Its main goal is to develop a complex system which would cover all aspects from elderly people's safety to convenient living. This paper describes briefly NITICS system, its architecture and UWB localization subsystem. Infrastructure and developed devices are presented. Results of selected laboratory tests of UWB localization subsystem are described and analysed.

17 citations


Proceedings ArticleDOI
01 Feb 2015
TL;DR: This paper focuses on concealing multiple secret images in a single 24-bit cover image using LSB substitution based image steganography, and reveals that the proposed method successfully secures the high capacity data keeping the visual quality of transmitted image satisfactory.
Abstract: Cryptography and steganography are the two major fields available for data security. While cryptography is a technique in which the information is scrambled in an unintelligent gibberish fashion during transmission, steganography focuses on concealing the existence of the information. Combining both domains gives a higher level of security in which even if the use of covert channel is revealed, the true information will not be exposed. This paper focuses on concealing multiple secret images in a single 24-bit cover image using LSB substitution based image steganography. Each secret image is encrypted before hiding in the cover image using Arnold Transform. Results reveal that the proposed method successfully secures the high capacity data keeping the visual quality of transmitted image satisfactory.

Journal ArticleDOI
TL;DR: An overview of image steganography and the techniques used for hiding data in the cover image to obtain stego image and the evaluation of performance is based on the value of PSNR.
Abstract: The emerging Internet Technology has led to the need of high level of security of data during its transmission. For this purpose steganography plays a major role in society. Steganography is basically the art of secretly hiding data or message in any cover medium such as an image, audio or video. Hence it allows secret communication to take place without the knowledge of any unintended user. This article gives a brief overview of image steganography and the techniques used for hiding data in the cover image to obtain stego image. The evaluation of performance is based on the value of PSNR.

Journal Article
TL;DR: The proposed algorithm is an amalgamation of text encryption, audio steganography and audio encryption which encodes the cipher text into the cover audio using LSB encoding and transfers the encrypted secret data to the receiver.
Abstract: With the growing importance of the internet, secure transmission of information is crucial. Steganography and cryptography helps in providing this much needed data confidentiality. Steganography hides secret information into a cover medium and cryptography converts data into an unrecognizable form. In this paper, the authors proposed a novel approach for concealing data. The proposed algorithm is an amalgamation of text encryption, audio steganography and audio encryption. In the first step, the original text message is encrypted using modified Vigenere cipher algorithm. This cipher text gets embedded into the cover audio using LSB encoding, in the second step. Further, the audio file is then subjected to transposition making use of Blum Blum Shub pseudo random number generator. This scrambled stegno audio is transmitted to the receiver which carries the encrypted secret data.

Patent
20 Jul 2015
TL;DR: A personal cloud contained in a case for a portable computing device such as a tablet personal computer (PC), mobile phones, portable media players, or the like as discussed by the authors, can be fitted with memory, a network connection, two-way wireless charging, external memory slots, external connections and other components for portable personal cloud computing.
Abstract: A personal cloud contained in a case for a portable computing device such as a tablet personal computer (PC), mobile phones, portable media players, or the like. The personal cloud case may be fitted with memory, a network connection, two-way wireless charging, external memory slots, external connections and other components for portable personal cloud computing.

Proceedings ArticleDOI
01 Dec 2015
TL;DR: In this paper, cover message and encrypted secret message are encoded into noise-like shares using (2, 2) VC where concept of digital invisible ink of steganography is incorporated with VC (DIIVC) to hide secret message.
Abstract: This paper presents two layered security for data hiding by combining steganography and visual cryptography (VC). Classically, VC encrypts a secret image into noise like images called as shares and decrypts secret message by stacking of shares, whereas steganography hides secret into another image called as cover image, where only intended receiver decodes the message. Steganography often encodes secret message using secret key before hiding into another image. In this paper, cover message and encrypted secret message are encoded into noise-like shares using (2, 2) VC where concept of digital invisible ink of steganography is incorporated with VC (DIIVC) to hide secret message. Unlike typical steganography, shares are modified to conceal secret message instead of cover image. At receiver, decryption of shares using conventional VC results poor contrast cover image. Apparently, this result appears as sole secret disclosed using VC whereas only intended receiver has knowledge of secret message. Further, intended receiver retrieves encrypted secret message by applying proposed DIIVC algorithm on resultant cover image. Finally, original secret message is revealed using secret key.

Patent
Yongjoon Jeon1, Kim Geon Soo1
01 Sep 2015
TL;DR: In this article, a method and apparatus enabling an electronic device to execute various functions when a flip cover is closed is described, in which if a screen is covered with or closed by a cover device for the electronic device, a covered area including at least a part of the remaining area of the screen except for an open area is activated, and a function corresponding to a user input inputted onto the covered area is executed.
Abstract: Provided is a method and apparatus enabling an electronic device to execute various functions when a flip cover is closed, in which if a screen is covered with or closed by a cover device for the electronic device, a covered area including at least a part of the remaining area of the screen except for an open area is activated, and a function corresponding to a user input inputted onto the covered area is executed.

Proceedings ArticleDOI
19 Aug 2015
TL;DR: A new measure to evaluate the hiding ability of the cover image based on Fisher Information Matrix and Gaussian Mixture Model is proposed and shown to improve the performance of various steganography algorithms obviously.
Abstract: Steganography is the art of hiding information in ways that prevents the detection of hidden messages. Image steganography, which hides messages into a cover image for secret transmission, attracts increasing attention in social media era. Currently, most works focus on designing message embedding algorithms to avoid the stego images being distinguished from normal ones via visual observation or statistical analysis. This paper aims to make the detection of the stego images more difficult by selecting the suitable cover images. We propose a new measure to evaluate the hiding ability of the cover image based on Fisher Information Matrix and Gaussian Mixture Model. Experiments on standard dataset validate that the cover image with good hiding ability can improve the performance of various steganography algorithms obviously. Moreover, the proposed measure provides a statistical explanation of the existing cover image selection techniques and shows better performance against steganalysis.

Journal ArticleDOI
TL;DR: The experimental results demonstrate that the improved APMS strategies can strike excellent balances between the steganographic transparency and bandwidth, and significantly outperform both the former ones and other previous approaches.

Journal Article
TL;DR: In this paper, various steganography methods are analyzed and also classification and applications are covered.
Abstract: Steganography is an art for hiding the secret information inside other information which are digitally cover. The definition of steganography can also be given as study of unseen communication that usually deals with existence of communicated message. The hidden message can be text, audio, image or video accordingly to that it can be cover from either image or video. In steganography, hiding information achieved to insert a message into cover image which generates a stego image. In this paper, we have analyze various steganography methods and also covered classification and applications.

Patent
16 Dec 2015
TL;DR: In this article, an audio cover displaying method and apparatus is presented, which belongs to the field of electronic technology application, and is used for displaying audio covers in a single form.
Abstract: The present disclosure relates to an audio cover displaying method and apparatus, and belongs to the field of electronic technology application. The method comprises the steps: receiving an acquisition request sent by a terminal for requesting a target cover image; acquiring the target cover image according to the acquisition request, wherein the target cover image is a dynamic cover image and/or a static cover image corresponding to an audio; and sending the target cover image to the terminal, wherein the terminal is configured to display the target cover image. According to the method and the apparatus, a problem of a single form for displaying an audio cover is solved. The present disclosure achieves the beneficial effects of enriching displaying forms of the audio cover and enabling the audio cover to be displayed more flexibly. The present disclosure is used for displaying an audio cover.

Patent
12 Mar 2015
TL;DR: In this article, a sheet information generation process for generating sheet information to create a cover sheet 60 which covers the photographed skin, and provides for the user the cover sheet manufactured on the basis of the generated sheet information.
Abstract: PROBLEM TO BE SOLVED: To provide an image processing apparatus, etc. capable of manufacturing a novel cover sheet reliably covering a discolored site on the face or body surface of a user while reducing the burden on the user, the cover sheet easily and accurately conforming to individual users.SOLUTION: On the basis of the data of a skin image of a user photographed by the user, etc. and having a color sample and grid information while managing the information of each user, an image processing system 1 according to the embodiment executes a sheet information generation process for generating sheet information to create a cover sheet 60 which covers the photographed skin, and provides for the user the cover sheet 60 manufactured on the basis of the generated sheet information.

Proceedings ArticleDOI
01 Dec 2015
TL;DR: The primary purpose of this paper is to provide two levels of security through a two step process, rather than hidden the message bits directly in cover image, they are scrambled in a random order generated by 2D Arnold Cat Map after that encrypted message is hidden behind a cover image using basic LSB method.
Abstract: Steganography and Cryptography are two integral parts of information security. Cryptography is the science of using mathematics to encrypt and decrypt data; the data are converted into some other gibberish form, and then the encrypted data are transmitted. Steganography is the art of hidden communications, encoding/embedding hidden information in cover media in such a way so as not to provoke an eavesdropper's suspicion. If a message is encrypted and hidden with a steganographic method it provides an additional layer of protection and reduces the chance of the hidden message being detected. The primary purpose of this paper is to provide two levels of security through a two step process, rather than hidden the message bits directly in cover image, they are scrambled in a random order generated by 2D Arnold Cat Map after that encrypted message is hidden behind a cover image using basic LSB method. MSE (Mean Square Error) and PSNR (Peak Signal to Noise Ratio) are two common quality measurements to measure the difference between the cover-image and the stego-image. Results showed that the proposed method gives better results than simple LSB with higher PSNR and lower MSE.

Proceedings ArticleDOI
05 Mar 2015
TL;DR: A new steganography method for spatial domain has been proposed, which includes a new mapping technique for the secret messages, which is a combination of encryption of the message first then hiding the message into the cover image which provides double security.
Abstract: In this paper, a new steganography method for spatial domain has been proposed, which includes a new mapping technique for the secret messages. The algorithm coverts any kinds of message to text using bit manipulation tables, applies hill cipher techniques to it and finally hides the message into red, green and blue images of a selected image. Therefore, the proposed algorithm is a combination of encryption of the message first then hiding the message into the cover image which provides double security. The result of the proposed algorithm is analyzed and discussed using MSE, PSNR, SC, AD, MD and NAE. The histogram of the cover and stegano image is also shown.

Proceedings ArticleDOI
01 Sep 2015
TL;DR: A novel algorithm of image steganography is proposed to implant a secret text message into a cover image using YCbCr color space model and 2D Haar Discrete Wavelet Transform and allows extracting of secret message without errors.
Abstract: Steganography is the process of implanting secret message in a cover data without causing degradation neither to the cover information nor to the secret message implanted in the cover data. Most of the steganographic techniques are applied on images, texts, and protocols. In this paper a novel algorithm of image steganography is proposed to implant a secret text message into a cover image using YC b C r color space model and 2D Haar Discrete Wavelet Transform. In this proposed technique, input text in ASCII code is encrypted by AES what ensures, that the relative letter frequency of a plain text secret message will be disturbed. Proposed technique also solves conversion between color space models RGB and YC b C r in spite of modification in component C b by the secret message. This step allows extracting of secret message without errors what is a very important characteristic, because change of only one bit causes extracting of different character. Performance of the proposed algorithm has been gauged by the peak signal to noise ratio (PSNR) and mean square error (MSE) for the stego image.

Patent
Baekdoosan Lee1
20 Oct 2015
TL;DR: In this article, an input control method and an electronic device are provided, which includes a display, a memory for storing data, and a processor functionally connected to the display and the memory.
Abstract: An input control method and an electronic device are provided. The electronic device includes a display, a memory for storing data, and a processor functionally connected to the display and the memory. The processor detects a first input, determines whether a cover for the electronic device is covered on the display when the first input is detected, wherein the cover includes a first visual region and a second visual region, and displays first data corresponding to the first input through at least one of a first region and a second region of the display when the cover covers the display, wherein the first region is arranged in a location corresponding to the first visual region and the second region is arranged in a location corresponding to the second visual region.

Journal ArticleDOI
TL;DR: The simulation results show that the hiding capacity is increased in DPM method when compared to other Difference Expansion techniques, and the combined difference expansion and encryption algorithm provides high embedding capacity along with high security.
Abstract: Reversible Watermarking is the technique of embedding secret messages into a cover image and recovering both the embedded secret message and the cover image without any distortion. One of the high quality and popular reversible data hiding methods is Difference Expansion method. In this paper, Difference Pair Mapping (DPM) method is used to embed the message into the cover image. The DPM method is based on predicting the pixel values and hiding the secret data with arbitrary threshold. The simulation results show that the hiding capacity is increased in DPM method when compared to other Difference Expansion techniques. Further, in order to provide security, DNA based encryption algorithm is used to resist the statistical and exhaustive attacks 2382 C. Vinoth Kumar, V. Natarajan and P. Poonguzhali over the image. The combined difference expansion and encryption algorithm provides high embedding capacity along with high security.

10 Dec 2015
TL;DR: Both gray scale and colorful images can be used as image cover, except the image contains 100% black and 100% white, and the capacity of stored data hiding of messages can be larger than the image.
Abstract: This research discussed about the data hiding information using steganography and cryptography. New method are discussed to secure data without change the quality of image as cover medium. Steganographic method is used by find the similarity bit of the message with bit of the MSB (Most Significant Bit) image cover. Finding of similarity process is done by divide and conquer method.The results are bit indexposition, thenthenencrypted using cryptographic. In this paper we using DES (Data Encryption Standard) algorithm. We use data information as message, images, and key as an input. Then, we use our method to secure message. The output is encrypted bit index which containt data hiding information and can be used to secure the messages. To reconstruct the contents, we require the same image and same key. Outcomes of our method can be used to secure the data. The advantages of this method are the capacity of stored data hiding of messages can be larger than the image. The image quality will not change and the capacity of stored messages can be larger than the image. Acoording to the research, both gray scale and colorful images can be used as image cover, except the image contains 100% black and 100% white. Bit matching process on image which have much variety of color takes less time. The damage of messages due to the addition of “salt and pepper” noise starts from 0.00049of MSE.

Book ChapterDOI
01 Jan 2015
TL;DR: A LSB image Steganography technique to hide multiple secret images in a cover image which is in a YCbCr color space format using Integer Wavelet Transform (IWT) there is no optical variation between the stego image and the original cover image.
Abstract: Steganography is one in all the foremost persuasive approaches to mask the presence of hidden data inside a cover object. Images are one of the suitable cover objects for the Steganography. Current trends support, digital image files as the cover file to hide multiple secret images. Steganography presents the clandestine information can be covered in mediums like image, video and audio. This paper provides a LSB image Steganography technique to hide multiple secret images in a cover image which is in a YCbCr color space format using Integer Wavelet Transform (IWT). There is no optical variation between the stego image and the original cover image. The proposed hardware architecture gives very fast, programmable & cost effective hardware solution in the area of Secure Communication.


Patent
04 Mar 2015
TL;DR: In this paper, a novel urban intelligent bus station management system consisting of a plurality of terminals and a data processing center is described, where each terminal comprises an advertising module, a public service module, touch screen and a wireless communication module.
Abstract: The invention discloses a novel urban intelligent bus station management system. The novel urban intelligent bus station management system comprises a plurality of terminals and a data processing center, and is characterized in that each terminal comprises an advertising module, a public service module, a touch screen and a wireless communication module, wherein the data processing center comprises a data receiving module, a data storage module, a data calling module and a log record module. The novel urban intelligent bus station management system is provided with the public service module; through the arranged functional modules, the novel urban intelligent bus station management system can be used for propagating external images of a city, and introducing tourist attractions, cultural landscape, and places of interest of the local city; meanwhile, an arranged public security module has a very important effect on maintaining the stability of social security; the urban traffic transportation convenience is improved by a taxi convenient module, so that good convenience is brought to tourists and passengers; meanwhile, instant information (including earthquake, flood, mudslide and other urban public information) can cover and be distributed in a large area in the first time by an instant information distribution function of the system, so that the city is managed effectively, and the interaction of urban population and foreign tourists can be promoted.