scispace - formally typeset
Search or ask a question

Showing papers on "Cover (telecommunications) published in 2018"


Journal ArticleDOI
TL;DR: Experimental results show that this approach enhances the security and provides robust embedding of secret data in image, video, voice or text media.
Abstract: The aim of information hiding is to embed the secret information in a normal cover media such as image, video, voice or text, and then transmit the secret data through the transmission of the public information. The secret message should not be damaged when the processing is applied on the cover media. In order to ensure the invisibility of confidential information, complex texture objects should be suitable for embedding information. In this paper, an approach which corresponds multiple steganographic algorithms to complex texture objects was presented for hiding secret data. Firstly, complex texture regions based on objects detection are selected. Secondly, several different steganographic methods were used to hide secret data into the selected area block. Experimental results show that this approach enhances the security and provides robust embedding.

130 citations


Book ChapterDOI
01 Jan 2018
TL;DR: This chapter walks you through the setup and installation of tools required to run the Ethereum blockchain, and provides the basic commands required to interact with the Ethereum network.
Abstract: This chapter walks you through the setup and installation of tools required to run the Ethereum blockchain. We cover hardware requirements, operating system requirements, and software requirements. After covering the installation of the software, we provide the basic commands required to interact with the Ethereum network.

22 citations


Proceedings ArticleDOI
01 Sep 2018
TL;DR: This paper studied the performance of the optimal file size to camouflage and the hidden data method with cover image using Least Significant bit (LSB) and showed that the larger cover image can hidden larger text file up to size of cover image vary to the size ofcover image that used for hidden data.
Abstract: The Protection of information with steganography is the art and science of writing hidden is a hidden data method in various data type to conceal data and unauthorized person or attacker does not know these messages are camouflage. Moreover, we can send text or image was concealed by cover image and adjust some bits of the original to the receiver. The text or image file concealed within cover image can secure the original data from the attacker. In this paper, we studied the performance of the optimal file size to camouflage and the hidden data method with cover image using Least Significant bit (LSB). The dataset are text file (.txt), document File (.doc) and image file which have dimension as follow; 800x600, 1200x900, 1600x1200, 2000x1500, 2400x1800, 2800x2100, 3200x2400, 3600x2700 and 4000x3000 The image file sizes are 576KB, 1.14MB, 1.85MB, 2.66MB, 3.58MB, 4.57MB, 5.54MB, 6.46MB and 7.31MB respectively, that used as cover image which was concealed and decrypted from Stego image to plaintext. The result showed that the cover image size is 576 KB is the optimal file for hidden data 175 KB or 30% of the cover image. The cover image size is 4.57 MB is the optimal file for hidden data 2.10 MB or 45.95% of the cover image. And the cover image size is 7.31 MB which dimension is 4000*3000 can camouflage file up to 4.29 MB or 58.69% of the cover image. Therefore, the larger cover image can hidden larger text file up to size of cover image vary to the size of cover image that used for hidden data.

21 citations


Journal ArticleDOI
TL;DR: A steganographic approach of concealing the secret data so as to facilitate secure communication and the results show that the imperceptibility, i.e. non-detectability of secret data is well maintained.

19 citations


Journal ArticleDOI
TL;DR: The proposed method embeds from 2 to 6 bits of the message per pixel in each image component, whereas it can embed a minimum of 6 bits and a maximum of 13 bits of message per sample in audio component at the expense of no perceivable distortion and loss of the cover media quality.
Abstract: Steganography is a very useful technique which aims at preventing loss of privacy during the process of data communication, especially over the internet. It can involve different forms of media like image, video (i.e., image sequence), audio etc. We propose a novel steganographic approach in spatial domain using pixel value differencing (PVD) or sample value differencing (SVD) technique and Galois field (GF (28)) operations in order to provide a two layered security for hiding message bits. Our method not only has a very high embedding capacity, but is also capable of withstanding statistical attacks. The proposed method embeds from 2 to 6 bits of the message per pixel in each image component, whereas it can embed a minimum of 6 bits and a maximum of 13 bits of message per sample in audio component at the expense of no perceivable distortion and loss of the cover media quality.

17 citations


Journal ArticleDOI
01 Mar 2018
TL;DR: This paper presents an adaptive hybrid method for image steganography procedure based on bit reduction and pixel adjustment using the fuzzy logic and integer wavelet transform technique.
Abstract: Transform-based techniques partially address challenges like robustness and the imperceptibility in image steganography. Such approaches, however, increase the memory requirement and reduce the quality of the cover image and hiding capacity. Moreover, the steganography is always coupled with cryptography to strengthen the confidentiality. This paper presents an adaptive hybrid method for image steganography procedure based on bit reduction and pixel adjustment using the fuzzy logic and integer wavelet transform technique. The fuzzy set theory provides powerful tools to represent and process human knowledge in the form of fuzzy if-then rules that can resolve difficulties in image processing arising due to the uncertainty of the data, tasks, and results. We apply a bit reduction algorithm to each byte of the data which are to hide in the cover image. This decreases the memory usage and increases the capacity. The embedding of the input text into the cover image distorts the cover image. Hence, to minimize the visual difference between the cover image and the text embedded image, an optimum pixel adjustment algorithm is applied to the text embedded image. Simulation results demonstrate the effectiveness of our proposed approach.

17 citations


Journal ArticleDOI
TL;DR: An improved encrypted-domain-based reversible data hiding algorithm to embed two binary bits in each gray pixel of original cover image with minimum distortion of stego-pixels is employed in this paper.
Abstract: Reversible data hiding means embedding a secret message in a cover image in such a manner, to the point that in the midst of extraction of the secret message, the cover image and, furthermore, the secret message are recovered with no error. The goal of by far most of the reversible data hiding algorithms is to have improved the embedding rate and enhanced visual quality of stego image. An improved encrypted-domain-based reversible data hiding algorithm to embed two binary bits in each gray pixel of original cover image with minimum distortion of stego-pixels is employed in this paper. Highlights of the proposed algorithm are minimum distortion of pixel’s value, elimination of underflow and overflow problem, and equivalence of stego image and cover image with a PSNR of ∞ (for Lena, Goldhill, and Barbara image). The experimental outcomes reveal that in terms of average PSNR and embedding rate, for natural images, the proposed algorithm performed better than other conventional ones.

16 citations


Patent
09 Mar 2018
TL;DR: In this article, an urban intelligent manhole cover system consisting of an MCU and a detection module, a lock module, an alarm module, power supply module, wireless communication module and an identity identification module is presented.
Abstract: The invention provides an urban intelligent manhole cover system. The urban intelligent manhole cover system comprises a manhole cover, a manhole cover detector installed on the manhole cover, a basestation and a monitoring center; and the manhole cover detector comprises an MCU and a detection module, a lock module, an alarm module, a power supply module, a wireless communication module and an identity identification module which are connected with the MCU, and the base station and the monitoring center achieve communication through the Ethernet or a CDMA network. The invention provides a management method of the urban intelligent manhole cover system on the basis of the urban intelligent manhole cover system. The urban intelligent manhole cover system and the management method have theadvantages that on the basis of Internet-of-Things technologies such as the sensor technology, the geographic information technology and the computer network technology, the intelligence, networking and spatial visualization of urban manhole cover management are achieved, the manhole cover management mode is innovated, resource sharing is achieved, the urban management efficiency is improved, andthe urban management level is increased.

13 citations


Proceedings ArticleDOI
01 Jan 2018
TL;DR: A new steganographic model using dual image has been proposed to increase the obscurity of the secret as well as to make it more secure by using different dictionary word indexing scheme every time based on a random secret key that is appended in the embed key.
Abstract: A new steganographic model using dual image has been proposed to increase the obscurity of the secret as well as to make it more secure. It uses two different images namely reference image and cover image along with a secret embed key (stego key). Reference image is divided into blocks with assigned block-codes. Total number of blocks and other embedding parameters (block traversing direction, starting block etc.) are stored in the embed key. Secret message converted to binary and bit pairs are made. Bit pairs of secret message are encoded using the bit pairs of different blocks of reference image and sometimes updating a few LSB bits in the reference image. As an optional capacity enhancement module for text only secret messages dictionary word indexing based encoding is applied. Finally encoded bit stream is embedded into the cover image using any standard LSB technique with its own merits and demerits. LSB changes in the reference image are almost negligible. Embedding key is encrypted using public key of the receiver hence even if someone gets the encoded message it is not possible to get the secret message. As this model can use any existing LSB replacement scheme to embed encoded message into the cover image the state of the art security and other quality features are by default available to it. This is made more secure by using different dictionary word indexing scheme every time based on a random secret key that is appended in the embed key.

12 citations


Proceedings ArticleDOI
27 Apr 2018
TL;DR: A new mobile application designed to protect images stored on your mobile phone using Advanced Encryption Standard algorithm to secure images by encrypting it and Least Significant Bit algorithm to process the encrypted image and embed it into another image.
Abstract: In this paper, we developed a new mobile application designed to protect your images stored on your mobile phone using Advanced Encryption Standard algorithm to secure images by encrypting it and Least Significant Bit algorithm to process the encrypted image and embed it into another image. To achieve high level of encryption, a 256 bit length key of Advance Encryption Standard is used to maximize protection and Diffie-Hellman algorithm to secure the processed key to both parties without interference from outside. In steganography, the encrypted image will be invisible into the cover image in which potential hackers do not have any idea about the original image embedded inside of the cover image, and with this even if the hacker got the image it will still need the correct key to decrypt it or else the image will be deleted The study used Rapid Application Development Model as the project development methodology, which allows the preceding phase to iterate until the application is refined, requirements are gathered and allows early testing of the prototypes during every iteration to reduce the risk of any major issues in the final deployment of the application. With the use of ISO/IEC/IEEE 29119 Testing Standards, the application was evaluated in terms of its security, usability and reliability. Based on the evaluation results, the application satisfied the respondents and possible users with an overall mean rating 4.17 or acceptable.

12 citations


Journal ArticleDOI
TL;DR: The core of the work lies in a design and implementation of a method for the use of neural networks as a native coder and decoder of a secret message (digital watermark) with an emphasis on the minimum necessary level of image data modification – covermedium.

Journal ArticleDOI
TL;DR: In this paper, a detailed review of the current trends in digital image steganography, where the secret message is embedded in image cover source and analysis of the different approaches along with the impact on the choice of embedding algorithm, image cover selection, the image performance metrics with extensive focus given on adaptive image Steganography.
Abstract: Steganography and Steganalysis is an information hiding technique for data protection and security from unauthorized access and use. Steganography is defined as the art and science of covert information in plain sight in various media sources such as text, images, audio, video, network channel etc. so, as to not stimulate any suspicion; while steganalysis is the science of attacking the steganographic system to reveal the secret message. Steganography is often designed as a trade-off between robustness, imperceptibility and message payload hiding capacity. The paper provides detailed review of the current trends in digital image steganography, where the secret message is embedded in image cover source and analysis of the different approaches along with the impact on the choice of embedding algorithm, image cover selection, the image performance metrics with extensive focus given on adaptive image steganography, which is currently the most secure steganographic system applicable in spatial, transform and side-informed steganography. The research contributions have been summarized, with directions to future improvement.

Journal ArticleDOI
01 Sep 2018
TL;DR: The proposed scheme destroys the information in the image before and after the data implantation task to strongly obliterate both the cover information and the embedded bits, which establishes seven levels of encapsulated securities and strengthens the security of the scheme.
Abstract: Many clandestine applications send their secret information, e.g., investigation reports, to a destination by implanting them into an image document, like forensic evidence. In that case, both the document and the implanted information are secret and equally important. To protect the document’s information, called the cover information, from being disclosed, many reversible data embedding (RDE) schemes first destroy the cover information intentionally and then embed secrets into these destroyed contents. A reversible process in the receiver end retrieves both the implanted secrets and the cover information. The existing schemes suffer from less embedding capacity, i.e., embedded bits per pixel (bpp), because their reversible processes either are unable to implant bit(s) into every pixel or implant a chunk of message bits into a group of pixels where the length of the message bits is smaller than the number of pixels in the group. The article proposes a novel distortion-based RDE scheme that achieves an embedding capacity of 2 $$^{n}$$ bpp, where $$0\le n \le 3$$ . The proposed scheme destroys the information in the image before and after the data implantation task to strongly obliterate both the cover information and the embedded bits. During implementing this proposed process, the scheme establishes seven levels of encapsulated securities and, thus, strengthens the security of the scheme. The maximum embedding capacity and the lowest level of image distortion that are achieved by the proposed scheme are 8 bpp and 5 dB, respectively. These two values significantly dominate the same figures that are achieved in its competing schemes.

Journal ArticleDOI
TL;DR: An approach to the support of the selection of the best cover image out of a number of JPEG images, based on the application of the principles of optimality, and the results of experiments show that the considered approach allows us to select such an image from a set of cover images, for which the best visual quality of embedding is provided.
Abstract: In the presented research, the decision support in order to increase the efficiency of providing confidentiality of information with the use of methods of digital steganography is considered. These methods allow one to secretly transmit confidential information using various digital objects. When hiding information with the use of steganography, digital images are often used, among which compressed JPEG images are of the greatest popularity. The efficiency of information embedding into JPEG images substantially depends on properties of the source image used as a container. Therefore, in the considered field of information security, the relevant problem is to provide the decision support about the choice of digital cover objects that are the most suitable for the transmitting of the given amount of information. In the given paper, we provide an approach to the support of the selection of the best cover image out of a number of JPEG images, based on the application of the principles of optimality. T...

Proceedings ArticleDOI
01 May 2018
TL;DR: This paper comprehends the concept, details, properties, techniques and application of digital watermarking, which hides the secret information (Watermark) in multimedia data for the purpose of protection, copyright and authentication.
Abstract: This paper comprehend the concept, details, properties, techniques and application of digital watermarking. In today's era, with the increasing use of internet it's become challenging to secure data. In sequence to authenticate or protect digital media from the various attacks techniques like cryptography, steganography and digital watermarking are introduced. Digital watermarking technique hides the secret information (Watermark) in multimedia data for the purpose of protection, copyright and authentication. The secret information is submerged into the cover data with the minimum or negligible distortion of cover data.

Journal ArticleDOI
TL;DR: A reversible data hiding method that uses meaningful encrypted images that reduces distortion during image encryption, and features a data embedding scheme to conceal the existence of secret data from attackers.
Abstract: Encrypted image-based reversible data hiding methods have recently been introduced to conduct research on data encryption. In these methods, an image provider generates encrypted images that are supplied to a data sender. The data sender embeds secret data into the images in order to securely communicate with a data receiver. The data receiver can extract secret data and recover the cover image from the encrypted images. Past research has shown that attackers can easily become suspicious in such cases since all images are scrambled during communication. In this paper, we propose a reversible data hiding method that uses meaningful encrypted images. The proposed method is independent from image provider, data sender, and data receiver respectively by separating the images used and the secret data hidden from each other. In addition, the proposed method reduces distortion during image encryption, and features a data embedding scheme to conceal the existence of secret data from attackers. Experimental results show that the proposed method has high embedding capacity and yields satisfactory image quality with a meaningful image.

Journal ArticleDOI
29 Jun 2018
TL;DR: A new improved technique that uses pixel indicator method to hide secret data bits in most significant bits of the cover image is proposed, and a central portion of image is selected to hidesecret message for more security.
Abstract: Steganography is the process of hiding secret message into a cover medium to conceal the existence of the message. The redundant nature of image pixels make them suitable medium to hide secret information. In this paper, a new improved technique that uses pixel indicator method to hide secret data bits in most significant bits (MSBs) of the cover image is proposed. Moreover, a central portion of image is selected to hide secret message for more security. Here, red channel is used as an indicator to hide secret message in 5 th and 6 th bits of either green channel or blue channel of RGB image. If the number of 1’s in red channel are even, green channel is used for embedding otherwise blue channel is used. The experimental results obtained by implementation of the proposed algorithm in MATLAB showed that the stego-images images are of high quality having high PSNR values. It provides better security and imperceptibility.

Patent
01 Nov 2018
TL;DR: In this article, an access cover to underground city infrastructure, particularly a cast iron or cast iron-concrete cover provided with a cover detection sensor connected with a radio frequency signal transmitting antenna through a transmitter, is described.
Abstract: An access cover to underground city infrastructure, particularly a cast iron or a cast iron-concrete cover provided with a cover detection sensor connected with a radio frequency signal transmitting antenna through a transmitter, characterised in that an antenna module (1) provided with a housing made of a material neutral to electromagnetic fields, preferably made of plastic, is installed in the through channel (4) with variable cross-section, and removably fixed at the bottom to a sensor module (2) located underneath the bottom of the cover (3), provided with a battery powered, low current electronic system containing a radio transmitter and an acceleration sensor or a gyroscope and an appropriate controller which detects changes to the position of cover (3) in space and in time, whereby the surface area of the sensor module (2) is greater than the surface area of the through channel (4). The object of the invention also includes a method of cover monitoring.

Journal ArticleDOI
TL;DR: The application as the implementation of proposed algorithm is proven feasible but only for personal use as some improvements still have to be implemented.
Abstract: Steganography is a method of hiding secret message in other innocuous looking object so that its presence is not revealed. In this paper, a message, which is a computer file of any type and size, is hidden in a selected cover or carrier, which is a computer file of certain types. The steganography method used in this paper is called append insertion steganography method. This method is chosen as an attempt to remove the limitation of message format, which appears in many popular steganography methods. To scramble the meaning of the hidden message, AES-256 (Rijndael algorithm) is used to encrypt the message with a secret passphrase. A special block of bytes is used to identify and verify the original message so it can be recovered while retaining its integrity. The C# programming language and .NET Framework are chosen to implement the algorithm into a Windows application. In this paper, one cover file contains exactly one message file. In the testing, five random files are used as secret message. Their integrity is calculated using SHA-256 before hiding and after recovery. In the testing, they all retain their integrity, proven by exact hash values. Thus, the application as the implementation of proposed algorithm is proven feasible but only for personal use as some improvements still have to be implemented.

Journal ArticleDOI
TL;DR: A new Lagrange interpolation-based encryption method is introduced to achieve high security of the hidden information with higher payload and better visual quality.
Abstract: Information hiding techniques have a significant role in recent application areas. Steganography is the embedding of information within an innocent cover work in a way which cannot be detected by any person without accessing the steganographic key. The proposed work uses a steganographic scheme for useful information with the help of human skin tone regions as cover image. The proposed algorithm has undergone Lagrange interpolation encryption for enhancement of the security of the hidden information. First, the skin tone regions are identified by using YCbCr color space which can be used as a cover image. Image pixels which belong to the skin regions are used to carry more secret bits, and the secret information is hidden in both horizontal and vertical sequences of the skin areas of the cover image. The secret information will hide behind the human skin regions rather than other objects in the same image because the skin pixels have high intensity value. The performance of embedding is done and is quite invisible by the vector discrete wavelet transformation (VDWT) technique. A new Lagrange interpolation-based encryption method is introduced to achieve high security of the hidden information with higher payload and better visual quality.

Journal ArticleDOI
TL;DR: The research suggests the application of a text mining analysis technique to identify the knowledge structures of academic research in the field of telecommunications policy and to pinpoint future research opportunities.
Abstract: In an attempt to develop an understanding of existing research trends and to inform the development of new research in the field of telecommunications, literature reviews are being conducted. As an effort for investigating research trend, our research suggests the application of a text mining analysis technique to identify the knowledge structures of academic research in the field of telecommunications policy and to pinpoint future research opportunities. In this study, three analytical techniques were employed: a productivity analysis; a contents analysis based on topic modeling and word co-occurrence; and an author co-citation analysis based on a hierarchical clustering algorithm, multidimensional scaling, and a factor analysis. The findings from the research productivity analysis imply that the journal ‘Telecommunications Policy’ has greatly contributed to the publication of studies related to telecommunications policy. Moreover, our research institution analysis results indicate that telecommunication policy studies are undertaken by experts in various research fields. The contents and citation analysis results demonstrate that many studies related to telecommunications policy cover infrastructure-related topics, including the design, arrangement, and distribution of telecommunications networks. By contrast, recent studies are found to focus on the privacy and digital divide issues that may arise in connection with the application of telecommunications networks to other information technologies or industrial areas. However, the area of policy research that focuses on the application of information technologies still concentrates on the methods for the application of existing services—such as broadcasting and multimedia—without paying sufficient attention to the policy issues that may arise from the application of cloud computing, the Internet of Things, or big data analytics, services that have emerged with the recent expansion of wireless communications networks. In this sense, there is a need for discussions about the policies to respond to the increasing use of radio frequencies owing to the expansion of the Internet of Things, and to promote the efficient and safe control of data transmitted in real time on the wireless Internet. Studies of new technologies in the telecommunications policy field should be carried out in view of local and national characteristics. At the same time, further studies should consider efficient and reasonable ways to export telecommunications and networking technologies to countries that seek to invest in or expand their telecommunications networks to new information technologies. Expanding on this research, more text mining techniques for analyzing large amounts of text data and for clustering and visualizing them need to be considered.

Proceedings ArticleDOI
01 Nov 2018
TL;DR: An audio data hiding algorithm based on octal modulus function is presented that is aimed to securely transfer an imperceptible stego file and the performance is evaluated regarding both the capacity and quality.
Abstract: Data hiding is proposed as a solution that helps to secure any significant information. These techniques conceal the existence of a secret message that is confidentially inserted into multimedia covers such as text, audio, video, or image. Audio data hiding is a recent research topic which is aimed to securely transfer an imperceptible stego file. This stego is transferred to the destination carrying a high payload. Commonly, schemes in steganography are classified into two domains: time and frequency. In the time domain, varied LSB techniques are proposed but these techniques are known as the simplest algorithms in the field of steganography. In this paper, an audio data hiding algorithm based on octal modulus function is presented. This method is conducted based on modifying the cover samples. The original samples are subtracted by the difference between the secret message digit and the same sample remainder value. Three testing implementations are conducted by changing the base of unsigned integer (uint) function (e.g. uint8, uint16, or uint24) of the cover audio samples. The performance is evaluated regarding both the capacity and quality. This evaluation is performed based on varying the cover samples values using uint8, uint16, and uint24, so SNR values are approximately 32, 80, 129 dB, respectively. The values of SNR are obtained after fully embedding the cover file wherein each sample there are 3 secret bits.

Patent
11 Sep 2018
TL;DR: In this article, a multilayered convolutional computing system learns weights using the audio information and the video information from the plurality of information channels, wherein the trained weights cover both the audio and the visual information and are trained simultaneously.
Abstract: Techniques are described for machine-trained analysis for multimodal machine learning. A computing device captures a plurality of information channels, wherein the plurality of information channels includes contemporaneous audio information and video information from an individual. A multilayered convolutional computing system learns trained weights using the audio information and the video information from the plurality of information channels, wherein the trained weights cover both the audio information and the video information and are trained simultaneously, and wherein the learning facilitates emotional analysis of the audio information and the video information. A second computing device captures further information and analyzes the further information using trained weights to provide an emotion metric based on the further information. Additional information is collected with the plurality of information channels from a second individual and learning the trained weights factors in the additional information. The further information can include only video data or audio data.

Posted ContentDOI
TL;DR: In this paper, the authors considered the problem of secure and undetectable communication in a world where the only permitted communication method is via a government-mandated encryption scheme, using government-specified keys.
Abstract: We study secure and undetectable communication in a world where governments can read all encrypted communications of citizens. We consider a world where the only permitted communication method is via a government-mandated encryption scheme, using government-mandated keys. Citizens caught trying to communicate otherwise (e.g., by encrypting strings which do not appear to be natural language plaintexts) will be arrested. The one guarantee we suppose is that the government-mandated encryption scheme is semantically secure against outsiders: a perhaps advantageous feature to secure communication against foreign entities. But what good is semantic security against an adversary that has the power to decrypt? Even in this pessimistic scenario, we show citizens can communicate securely and undetectably. Informally, there is a protocol between Alice and Bob where they exchange ciphertexts that look innocuous even to someone who knows the secret keys and thus sees the corresponding plaintexts. And yet, in the end, Alice will have transmitted her secret message to Bob. Our security definition requires indistinguishability between unmodified use of the mandated encryption scheme, and conversations using the mandated encryption scheme in a modified way for subliminal communication. Our topics may be thought to fall broadly within the realm of steganography: the science of hiding secret communication in innocent-looking messages, or cover objects. However, we deal with the non-standard setting of adversarial cover object distributions (i.e., a stronger-than-usual adversary). We leverage that our cover objects are ciphertexts of a secure encryption scheme to bypass impossibility results which we show for broader classes of steganographic schemes. We give several constructions of subliminal communication schemes based on any key exchange protocol with random messages (e.g., Diffie-Hellman).

Proceedings ArticleDOI
21 Dec 2018
TL;DR: An LSB-based image steganography technique that uses YCbCr color space for the embedding process and the high correlation coefficient between the candidate cover images' skewness and kurtosis and the probability of detection obtained by the stego-images affirms that these properties of the candidatecover images can help in determining the most suitable candidate cover image to be used.
Abstract: Various researches in image steganography focusing on spatial domain specifically in the least Significant Bit (LSB) embedding method had been conducted to improve the embedding capacity while maintaining high imperceptibility. However, these improvements were countered by various statistical attacks. This paper presents an LSB-based image steganography technique that uses YCbCr color space for the embedding process. Also, a new cover selection method to strengthen the proposed embedding algorithm was introduced in this paper. The cover selection mechanism used the skewness and kurtosis of the candidate cover images as factors to determine if a candidate cover image will yield to a high probability of detection or not. The distortions analysis affirms that the stego-images produced by the embedding method obtained acceptable PSNRs and SSIMs, thus, proving that the stego-images are resistant to Human Visual System. Also, the embedding method presented in this paper produced stego-images that were given a low probability of detection of various statistical analysis attacks. Furthermore, the high correlation coefficient between the candidate cover images' skewness and kurtosis and the probability of detection obtained by the stego-images affirms that these properties of the candidate cover images can help in determining the most suitable candidate cover images to be used.

Book ChapterDOI
23 Jun 2018
TL;DR: The results show that the proposed method not only had a high embedding capacity but also reduced the growing size ratio between the original cover and stego cover and the security of the proposed approach was improved through improving imperceptibility and by using Stego-key.
Abstract: Text steganography is regarded as the most challenging type to hide secret data to a text file because it is not enough unnecessary information compared with other carrier files. This study aimed to deal with the capacity (how much data can be hidden in the cover carrier) and security (the inability of disclosing the data by an unauthorized party) issues of text steganography. Generally, the data hiding capacity of text steganography is limited, and imperceptibility is very poor. Therefore, a new scheme was suggested to improve the two-letter word technique by using the Lempel-Ziv-Welch algorithm. This scheme can hide 4 bits in each position of a two-letter word in the cover text by inserting a nonprinting Unicode symbol. Each two-letter word can have four different locations in the text. Some experiments were conducted on the proposed method (enhancement) and our previous method (two-letter word) to compare their performance applying twelve secret message samples in terms of capacity and Jaro-Winkler. On the other hand, the performance of our proposed method was compared with other related studies in terms of capacity. The results show that the proposed method not only had a high embedding capacity but also reduced the growing size ratio between the original cover and stego cover. In addition, the security of the proposed approach was improved through improving imperceptibility and by using stego-key.

Proceedings ArticleDOI
01 Dec 2018
TL;DR: An improved and new approach for hiding secret messages in audio clips using a security key and a Genetic Algorithm to embed the message bits into cover audio samples.
Abstract: In today's world, transmission of secret and important data has various security issues. Information security has become a major issue in the field of data communication. One of the many techniques used to resolve these security issues is Audio Steganography. Audio Steganography means hiding some data in an audio file so that the intruder cannot know about the data. In this paper, we present an improved and new approach for hiding secret messages in audio clips. We use a security key and a Genetic Algorithm to embed the message bits into cover audio samples. One or two message bits are embedded in different Least Significant Bit (LSB) layers of each sample. We have successfully tested proposed technique on several audio sequences. The experimental results show clear demonstration that the proposed technique has higher message embedding capacity and provides less distortion to the output sequences.

Patent
26 Jul 2018
TL;DR: In this paper, a voice command device consisting of a speaker, a microphone, a wireless communication module, and a processing device is used to scan for wireless advertising packets from a plurality of medical devices at an interval and detect a wireless advertising packet from a medical device of the plurality of devices.
Abstract: Embodiments cover a voice command device and a server computing device that communicates with the voice command device. In one embodiment, a voice command device comprises a speaker, a microphone, a wireless communication module, and a processing device. The processing device is to scan for wireless advertising packets from a plurality of medical devices at an interval and detect a wireless advertising packet from a medical device of the plurality of medical devices as a result of the scanning. The processing device is further to receive medical data for a living entity from the medical device and send the medical data to a server computing device, wherein the server computing device is to generate a message associated with the medical data. The processing device is to receive the message and output the message via the speaker.

Journal ArticleDOI
TL;DR: Cover, editorial board, submission guidelines, table of contents, and message from editor Heather E. Duncan are all available.
Abstract: Cover, editorial board, submission guidelines, table of contents, and message from editor Heather E. Duncan.

Patent
17 Apr 2018
TL;DR: In this article, a video cover extraction method and device based on a video title was proposed, which includes acquiring a cover set of a video, wherein the cover set contains at least one to-be-selected cover image.
Abstract: The invention discloses a video cover extraction method and device based on a video title. The method includes: acquiring a cover set of a video, wherein the cover set contains at least one to-be-selected cover image; inputting the video title of the video into a semantic-feature extraction module, which is obtained through training, to obtain a video title feature; inputting each to-be-selected cover image in the cover set into an image feature extraction module, which is obtained through training, to obtain a cover image feature of each to-be-selected cover image; and calculating a distancebetween the video title feature and the cover image feature of each to-be-selected cover image, and determining a should-be-selected cover image according to a calculation result. By adopting the scheme, automated selection of a video cover with a high relevance degree with the video title can be realized, a matching degree of the video cover and video contents and the title can be increased, anduser experience can be improved.