scispace - formally typeset
Search or ask a question

Showing papers on "Cover (telecommunications) published in 2020"


Journal ArticleDOI
TL;DR: An overview of the major changes in the production of the land cover maps, that have led to this increased accuracy, including aligning with the Sentinel 2 satellite system in the grid and coordinate system, improving the metric extraction, adding better auxiliary data, and improving the biome delineations, as well as enhancing the expert rules.
Abstract: In May 2019, Collection 2 of the Copernicus Global Land Cover layers was released. Next to a global discrete land cover map at 100 m resolution, a set of cover fraction layers is provided depicting the percentual cover of the main land cover types in a pixel. This additional continuous classification scheme represents areas of heterogeneous land cover better than the standard discrete classification scheme. Overall, 20 layers are provided which allow customization of land cover maps to specific user needs or applications (e.g., forest monitoring, crop monitoring, biodiversity and conservation, climate modeling, etc.). However, Collection 2 was not just a global up-scaling, but also includes major improvements in the map quality, reaching around 80% or more overall accuracy. The processing system went into operational status allowing annual updates on a global scale with an additional implemented training and validation data collection system. In this paper, we provide an overview of the major changes in the production of the land cover maps, that have led to this increased accuracy, including aligning with the Sentinel 2 satellite system in the grid and coordinate system, improving the metric extraction, adding better auxiliary data, improving the biome delineations, as well as enhancing the expert rules. An independent validation exercise confirmed the improved classification results. In addition to the methodological improvements, this paper also provides an overview of where the different resources can be found, including access channels to the product layer as well as the detailed peer-review product documentation.

312 citations


Journal ArticleDOI
TL;DR: This paper compares the steganography algorithms of least significant bit and discrete wavelet transform in terms of efficiency and capacity of concealing multiple images within a single cover image.
Abstract: The protection of confidential information transmitted over the Internet and restricting access to specific classified data have become a major security and privacy issue. To conceal the existence of such data, digital image steganography is employed hiding the secret in questions within a cover image, arriving at a new image that is virtually indistinguishable from the original. Thus, concealed data within the cover image is prevented from being detected via unauthorized access. In light of the above, certain aspects, such as the capacity of the cover image and the imperceptibility, need to be analyzed and addressed as they constitute the crucial assessment parameters for the performance of the steganography algorithms. In this paper, we compare the steganography algorithms of least significant bit and discrete wavelet transform in terms of efficiency and capacity of concealing multiple images within a single cover image. We cover the mechanism of the embedding and extraction algorithms for multiple numbers of images to come up with knowledgeable remarks. Furthermore, performance of these stego-algorithms has been evaluated with regard to the capacity of the cover image, imperceptibility of the data, and security.

61 citations


Proceedings ArticleDOI
05 Mar 2020
TL;DR: The authors have explored techniques that blend cryptography & steganography together, which can be used for message authentication, message integrity & non-repudiation purpose.
Abstract: Data Transmission in network security is one of the most vital issues in today's communication world. The outcome of the suggested method is outlined over here. Enhanced security can be achieved by this method. The vigorous growth in the field of information communication has made information transmission much easier. But this type of advancement has opened up many possibilities of information being snooped. So, day-by-day maintaining of information security is becoming an inseparable part of computing and communication. In this paper, the authors have explored techniques that blend cryptography & steganography together. In steganography, information is kept hidden behind a cover image. In this paper, approaches for information hiding using both cryptography & steganography is proposed keeping in mind two considerations - size of the encrypted object and degree of security. Here, signature image information is kept hidden into cover image using private key of sender & receiver, which extracts the information from stego image using a public key. This approach can be used for message authentication, message integrity & non-repudiation purpose.

21 citations


Journal ArticleDOI
TL;DR: An Optical Character Recognition (OCR) based Steganographic technique is introduced, in which message, in its feature form, is embedded in the cover image, strengthening the data hiding objective of steganography.
Abstract: Steganography, the art of hiding information within information, has an added advantage over cryptography as the person viewing the object in which the information is hidden has no knowledge of the presence of any hidden information. The Least Significant Bit (LSB) embedding technique which is one of the widely used techniques ensures an indiscernible change in the cover image oblivious to the human eye. In this paper, an Optical Character Recognition (OCR) based Steganographic technique is introduced, in which message, in its feature form, is embedded in the cover image. We extract character level features from images which contain the textual message, and embed these features in the cover image, strengthening the data hiding objective of steganography. This is because an intruder has to know about the presence of features as hidden bits and even thereafter has to have trained OCR model to retrieve the texts from the decoded information i.e. from the features. We validate our results on an English Printed Character dataset (Chars74K Dataset), and present the evaluation results for varied LSBs.

19 citations


Journal ArticleDOI
TL;DR: Experimental results show that the proposed CIHMSB method can conceal 2601 bits secret information per carrier with peak signal-to-noise ratio and reduce the Bit Error Rate of stego image in the case of distortion.
Abstract: With the rapid development of information technology recently, information security has become the focus of public concern. Information Hiding (IH) technology is an effective method to tackle the problem of information leakage incidents. In this paper, a novel coverless information hiding method based on the Most Significant Bit (MSB) of cover image is proposed (CIHMSB). Firstly, the cover image is segmented into a number of fragments. Secondly, in order to use the MSB of cover image to represent the secret information, the average intensity of each fragment is calculated. Thirdly, a one-to-one mapping between the MSB of the image fragment and the secret information is established using the mapping sequence (denote as $Km$ ), decided by the sender and the receiver in advance. This process produces a mapping flag (denote as $Kf$ ), which is sent by the sender along with the stego image. The objective of the proposed work is to increase hiding capacity, curtail the distortion of the stego image to improve its quality and reduce the Bit Error Rate ( $BER$ ) of stego image in the case of distortion. Experimental results show that the proposed method can conceal 2601 bits secret information per carrier with peak signal-to-noise ratio ( $PSNR$ ) of $\infty $ dB. What’s more, some stego image quality assessment parameters, such as structural similarity ( $SSIM$ ) index and universal image quality index ( $Qi$ ), are slightly better than existing information hiding methods. Furthermore, the proposed method has good performance against such as AGWN, salt & pepper noise, low-pass filtering and JPEG compression attacks.

17 citations


Journal ArticleDOI
TL;DR: An enhanced Least Significant Bit (eLSB) embedding technique in steganography is proposed, through which the quality of cover image is improved, when compared to typical LSB algorithm used in Steganography.
Abstract: Text Steganography has become a dominant research field in information sharing domain and many researches are being conducted to strengthen this area. Researches around the amount of secret message that could be stored in a given cover image is always critical for any steganography technique used to share the secret text. This research paper proposes an enhanced Least Significant Bit (eLSB) embedding technique in steganography, through which the quality of cover image is improved, when compared to typical LSB algorithm used in steganography. The proposed method employs in spatial domain and it does the secret message encoding in two phases. The first phase generates the metadata and embeds the header information in first few bytes of cover image and then the following phase takes care of processing secret message and storing the secret message in cover image using an optimized way, which is possible through analyzing secret text’s character sequences. Proposed work results into occupying lesser space for the given secret text in cover image and hence leads to the better stego image quality than existing LSB algorithms. As the algorithm works on optimizing secret message during embedding phase itself, this technique enables high capacity embedding rate, additional security due to secret message preprocessing and enhanced cover image quality. The results are compared with LSB algorithm and compared to Peak Signal to Noise Ratio (PSNR), Mean Square Error (MSE) and Root Mean Square Error (RMSE) values to prove the proposed algorithm performs better on secret text embedding in cover image.

16 citations


Journal ArticleDOI
TL;DR: A technique for embedding a secret message within that of a cover-image to ensure the interceptors will not observe the presence of such hidden data is presented and it is proved that the proposed method outperformed all the Joint Photographic Experts Group (the JPEG) and the Joint Quantization Table Modification (the JQTM) based method in terms of quality of image, security level and embedding capacity.
Abstract: Owing to the increasing growth in digital communication as well as the multimedia applications, security has now become a very significant problem in the communication as well as storage space of such images. The Visual Cryptography (VC) has been used for hiding the information that are in the images which is a special technique of encryption that is decrypted by a human visual system. In this paper, a technique for embedding a secret message within that of a cover-image to ensure the interceptors will not observe the presence of such hidden data is presented. The method has an essential conception by means of a simple Least Significant Bit (LSB) substitution. Being inspired by the steganography approach, the current work splits the cover images into n blocks of 8X 8 pixels and into a secret message of n partitions in order to improve the image quality and to increase the capacity of secret message along with its security level. For the purpose of improving this stego-image quality and for increasing the capacity of secret message along with its security level, being inspired by the current work that splits cover images into the n blocks of 8X 8 pixels and into a secret message of n partitions. In the proposed method, the Cuckoo Search (CS) is used for searching an approximate and optimal solution of finding any optimal substitution matrix to transform the message in every block as opposed to finding a single optimal matrix for substitution and the entire cover-image is presented. The final quality of its resulting in the stego-image, and its secret message and its capacity with the level of security of this method proposed will be calculated and then comparted to the other different methods. The results of the experiment proved that the proposed method outperformed all the Joint Photographic Experts Group (the JPEG) and the Joint Quantization Table Modification (the JQTM) based method in terms of quality of image, security level and embedding capacity.

15 citations


Proceedings ArticleDOI
01 Nov 2020
TL;DR: A new linguistic steganography method which encodes secret messages using self-adjusting arithmetic coding based on a neural language model which outperforms the previous state-of-the-art methods on four datasets by 15.3% and 38.9% in terms of bits/word and KL metrics, respectively.
Abstract: Linguistic steganography studies how to hide secret messages in natural language cover texts. Traditional methods aim to transform a secret message into an innocent text via lexical substitution or syntactical modification. Recently, advances in neural language models (LMs) enable us to directly generate cover text conditioned on the secret message. In this study, we present a new linguistic steganography method which encodes secret messages using self-adjusting arithmetic coding based on a neural language model. We formally analyze the statistical imperceptibility of this method and empirically show it outperforms the previous state-of-the-art methods on four datasets by 15.3% and 38.9% in terms of bits/word and KL metrics, respectively. Finally, human evaluations show that 51% of generated cover texts can indeed fool eavesdroppers.

15 citations


Journal ArticleDOI
TL;DR: This method is successful as the stego keeps the original meaning of the text in gross which makes it robust and undetectable, and shows good result in capacity ratio.
Abstract: The practice of transmitting secret data by using cover data is called steganography. At present, several versatile steganographic methods are available using different digital objects (e.g. image,...

13 citations


Journal ArticleDOI
TL;DR: The proposed algorithm is the first Steganography algorithm that can work for multiple cover image formats and utilized concepts like capacity pre-estimation, adaptive partition schemes and data spreading to embed secret data with enhanced security.
Abstract: This paper presents an image Steganography algorithm that can work for cover images of multiple formats. Having a single algorithm for multiple image types provides several advantages. For example, we can apply uniform security policies across all image formats, we can adaptively select the most suitable cover image based on data length, network bandwidth and allowable distortions, etc. We present our algorithm based on the abstract concept of image components that can be adapted for JPEG, Bitmap, TIFF and PNG cover images. To the best of our knowledge, the proposed algorithm is the first Steganography algorithm that can work for multiple cover image formats. In addition, we have utilized concepts like capacity pre-estimation, adaptive partition schemes and data spreading to embed secret data with enhanced security. The proposed method is tested for robustness against Steganalysis with favorable results. Moreover, comparative results for the proposed algorithm are very promising for three different cover image formats.

12 citations


Journal ArticleDOI
TL;DR: A completely reversible RDH method for encrypted halftone images based on matrix embedding, which can achieve a high embedding capacity with low distortion and is suitable for data-hiding applications such as the medical or printing applications where the reversibility is crucial.
Abstract: Reversible data hiding (RDH) is a data-hiding technique that embeds data into cover media such that it can be recovered distortion-free after the embedded data are retrieved. Currently, for RDH in encrypted halftone images (RDH-EH), the original cover image cannot be recovered once the watermark is extracted. In this paper, we present a RDH method for encrypted halftone images based on matrix embedding, which can achieve a high embedding capacity with low distortion. Since minimal information redundancy exists in encrypted halftone images, perfectly reversible algorithms appear to be difficult to implement. Nevertheless, we proposed a completely reversible RDH method for encrypted halftone images with high embedding capacity. To address the drawback of information redundancy, the pixels of the cover image are copied into two images to guarantee reversibility. The watermark is embedded into the first cover image by changing one pixel of each block using syndrome encoding, and into the second cover image by bit replacement. The experimental results show that the halftone image can be completely recovered after the embedded data are extracted. Furthermore, our algorithm can achieve moderate computational complexity, high embedding capacity and high visual quality of marked images. This scheme is suitable for data-hiding applications such as the medical or printing applications where the reversibility is crucial.

Journal ArticleDOI
31 Dec 2020-Symmetry
TL;DR: Wang et al. as discussed by the authors designed a flip VC for gray-scale and color cover images based on constraint error diffusion, which enjoys the following features: Color cover images, no computation needed for decoding, and no interference from cover image on the recovered secret image.
Abstract: Visual cryptography (VC) has found numerous applications in privacy protection, online transaction security, and voting security, etc. To counteract potential cheating attacks, Lin et al. proposed flip visual cryptography in 2010, where a second secret image can be revealed by stacking one share with a flipped version of another share. The second secret image can be designed as an additional verification mechanism. However, Lin’s scheme produces meaningless shares and is only applicable to binary secret images. It is interesting to explore whether it is possible to extend the flip VC to having cover images (i.e., extended VC) and these cover images are color images. This problem is challenging since too many restricting conditions need to be met. In this paper, we designed a flip VC for gray-scale and color cover images based on constraint error diffusion. We show that it is possible to meet all the constraints simultaneously. Compared with existing schemes, our scheme enjoys the following features: Color cover images, no computation needed for decoding, and no interference from cover image on the recovered secret image.

Journal ArticleDOI
TL;DR: A secure algorithm with Low Significant Bit method is used to hide an encrypted high-resolution color bitmap image in two selectively color images (i.e., two cover images) using MATLAB-GUI programming language.
Abstract: Encryption and hiding images are becoming a hot research area and a broad prospect for application. This article uses a secure algorithm with Low Significant Bit method to hide an encrypted high-resolution color bitmap image in two selectively color images (i.e., two cover images). The paper introduces a two-level hiding encrypted image using MATLAB-GUI programming language. In the beginning, with a key image using XOR bit operation, the original RGB image is encrypted. After that, the encrypted image is hidden into the first cover image. The cover image is then hidden into another cover to make the secret image safer without changing the perceptual quality for both covers. Then, the algorithm is tested on many bitmap images, which can be an important image, fingerprint image, samples of secret medicine, or bank account pattern. The correlation histograms demonstrate a high correlation for all encrypted images. The PSNR is used to find steganography quality for the two cover images after hiding the secret image showing a high quality for the two levels of hiding operation

Journal ArticleDOI
TL;DR: This study proposes a high-capacity RDH-EI scheme using multi-layer embedding that ensures that after extraction of the embedded additional data from the marked encrypted image, the original image is recovered completely.
Abstract: Reversible Data Hiding in Encrypted Images (RDH-EI) has gained much popularity in the field of signal processing and cloud computing. In this study, we propose a high-capacity RDH-EI scheme using multi-layer embedding. It ensures that after extraction of the embedded additional data from the marked encrypted image, the original image is recovered completely. Broadly, the method comprises three parties: the content owner, the data hider/ cloud owner, and the receiver. In the beginning, the image is encrypted by the content owner using encryption based on the chaotic behaviour of PWL-memristor and sent to the data hider. At the data hider's side, even-odd value embedding technique is applied in multiple layers of the encrypted image to increase the embedding capacity. Meanwhile, the auxiliary information consisting of location map (LM) for each layer and the number of layers, to be used in the recovery phase, is recorded during the embedding. After completing the embedding procedure, permutation operation is applied on the marked encrypted image to prevent the perceptual information leakage. Finally, at the receiver's side the embedded additional data and the original image is recovered losslessly with the help of valid keys and shared auxiliary information. From the experimental results, it is observed that the quality of the directly decrypted image is 51.0 dB or above. The advantage of the proposed scheme is that the PSNR is almost same for each layer, i.e. even for the n number of layers used, the PSNR is 51.0 dB or above. Moreover, we applied chosen plaintext attack to test the encryption function and in case of any cropping attack on the marked encrypted image during the transfer, the cover image can be recovered with less distortion.

Proceedings ArticleDOI
01 May 2020
TL;DR: A new method of forming sequences that takes into account the statistical properties of cover images is proposed that allows you to achieve low correlation, which provides reliable and safe hiding of information in digital images.
Abstract: This article discusses methods for hiding data in digital images by using pseudo-random sequences and direct spread spectrum technology We propose a new method of forming sequences that takes into account the statistical properties of cover images This allows you to achieve low correlation, which provides reliable and safe hiding of information in digital images The results of experimental studies show that the bit error rate in the recovered messages is significantly reduced At the same time, distortions of cover images remain at the same level

Journal ArticleDOI
TL;DR: Encryption and concealment techniques were used to protect data transferred from attackers using the encryption key and the Xnor gate, after which the encrypted information was hidden in a color image using the LSB algorithm.
Abstract: At the moment, with the great development of information and communications technology, the transfer of confidential and sensitive data through public communications such as the Internet is very difficult to keep them from hackers and attackers. Therefore, it is necessary to work on the development of new and innovative ways to transfer such information and protect it to ensure that it reaches the desired goal. The goal of a new technique to hide information design not only hides the secret message behind the center cover, but it also provides increased security. The most common way to transfer important and confidential data is through embedding it into cover medium files in a way that does not affect the accuracy of the carrier file, which is known as hiding. In this paper, encryption and concealment techniques were used to protect data transferred from attackers. The proposed method relied on encryption of confidential information using the encryption key and the Xnor gate, after which the encrypted information was hidden in a color image using the LSB algorithm. The method of concealment depends on the extraction of chromatic channels of three RGB for each pixel and specifying the channel in which the bit of the encryption message will be hidden. Some metrics have been adopted to measure the quality of the resulting picture after hiding as PSNR and MSE, and achieve good results.

Journal ArticleDOI
TL;DR: This work applies the deniability concept to solve the problem of the encryption scheme that allows the sender to claim the ciphertext is for some receiver group while actually it is for another receiver group.
Abstract: Attribute-based encryption (ABE) is a useful tool for sharing an encrypted data to a target group. In a ciphertext-policy ABE (CP-ABE) scheme, a ciphertext includes a policy to indicate its receivers and only those receivers can correctly decrypt the ciphertext. Since this design leaks the receiver identity, it may raise a new security issue about user privacy. Some hidden-policy ABE schemes, where the policy is secretly protected, are proposed to keep user privacy. However, these hidden-policy ABE schemes rely on the user trying all possibilities to decide if it belongs to the wanted receiver group. The decryption costs too much and every potential receiver will run the decryption process in vain since it does not know the policy. In this work, we apply the deniability concept to solve this problem. The encryption scheme allows the sender to claim the ciphertext is for some receiver group while actually it is for another receiver group. Both receiver groups can correctly decrypt the ciphertext except that the real group can get the real message and the cover group will get the cover message. While coercion, the sender can definitely claim the ciphertext is for the cover group and the real group is kept confidential.

Proceedings ArticleDOI
B. Pushpa1
11 Mar 2020
TL;DR: A new hybridization of data encryption model to shelter the diagnosis data in medical images is presented by the integration of 2D discrete wavelet transform technique with a proposed hybrid encryption scheme derived by the Integration of Blowfish and Two fish encryption algorithms.
Abstract: At present times, healthcare data stored in cloud is considered as a highly sensitive record, which should be hidden towards unauthorized accesses to protect the information about the patient. Hence, security related to cloud based medical data transmission receives significant attention among researchers and academicians. This study presents a new hybridization of data encryption model to shelter the diagnosis data in medical images. The proposed model is presented by the integration of 2D discrete wavelet transform technique with a proposed hybrid encryption scheme. The presented hybrid encryption scheme is derived by the integration of Blowfish and Two fish encryption algorithms. The presented model begins with the encryption of secrecy data and then concealed the outcome by the use of outcome in a cover image and 2D-DWT-1L or 2D-DWT-2L. The color images are utilized as cover images for concealing various text sizes. The outcome of the projected technique is tested against different benchmark images and the results are ensured by the use of different performance measures.

Proceedings ArticleDOI
09 Sep 2020
TL;DR: Survey of modalities and encryption algorithms used to strength in LSB steganography finds many algorithms employed to raise the security of hidden data must be unreadable.
Abstract: Steganography is a clever technique for concealing information within a digital cover medium, and without causing any significant distortion or modification in this medium. There are many media that can hide information such as text, images, audio and video file, the stronger the method used, the more difficult it was to disclose. Image Steganography is the most common used, as digital images are widely used over the Internet. The importance of Image Steganography lies in maintaining the confidentiality and privacy of the information exchanged. One of the most commonly flexible and efficient used concealment techniques is the Least Significant Bit (LSB) replacement technology, but it is very simple and easy to break, so the hidden data must be unreadable. There are many algorithms employed to raise the security of hidden data. This paper surveyed some of recent researches and highlight modalities and encryption algorithms used to strength in LSB steganography.

Journal ArticleDOI
TL;DR: A new crypto technique-based ciphertext shifting algorithm has been designed to improve the security for previous work that combining cryptographic and steganographic, and is inspected to be a very strong technique that can prevent common cryptography attacks such as a dictionary or brute-force attacks.

Journal ArticleDOI
TL;DR: This paper proposes a data hiding scheme for high quality stego-images in the encrypted images based on a homomorphic encryption algorithm and matrix embedding method using Golay code, which has good embedding efficiency.
Abstract: This paper proposes a data hiding scheme for high quality stego-images in the encrypted images based on a homomorphic encryption algorithm and matrix embedding method. To achieve the message embedding in the encryption domain, we first present an image encryption algorithm satisfying additive homomorphism based on the stream cipher. Then, we offer a matrix embedding method using Golay code, which has good embedding efficiency. In the proposed scheme, we pre-code the least significant bit (LSB) vectors of the cover image into the codewords before image encryption, so that we can implement the matrix embedding in the encrypted image. The experimental results show that the proposed scheme has excellent security performance. We can get a high quality stego-image after the image decryption and recover the cover image into a fidelity image while providing considerable payload.


Journal ArticleDOI
01 Feb 2020
TL;DR: The purpose of this application is to prepare data or files to be hidden on the cover image of the file to help the confidentiality of information or data on heavy equipment companies.
Abstract: Electronic documents are information that is permitted or stored in a way that is requested by a computer or other electronic device to be installed, assigned or processed. These documents consist of text, graphics or spreadsheets. For the current technological developments that improve progress, security is very important in companies that are difficult to avoid the follow-up of information by parties who are not responsible. One method that can be used to obtain digital documents is using Steganography and Cryptography technology by using Discrete Cosine Transform (DCT) technology and Advanced Desktop Encryption Standard (AES-192) algorithm based on Java Desktop. The purpose of this application is to prepare data or files to be hidden on the cover image of the file. Before inserting with the closing image file, the file is encrypted with a symmetrical key using the AES-192 algorithm. The benefits obtained in this application, the confidentiality of information or data on this heavy equipment company can be difficult with good and safe. With this application it is expected to help the confidentiality of information or data on heavy equipment companies. .

Book ChapterDOI
01 Jan 2020
TL;DR: An improved LSB steganography technique to optimize the algorithm hiding the bits in different channels selected dynamically using key is discussed and a platform leveraging cryptographic algorithms and verification using face data in pipeline is proposed to help keep data more secure.
Abstract: In last few years, information security has become a significant part of data communication. In order to address this crucial point in data communication to secure the confidential data, steganography and cryptography can be combined to give better results. Steganography is a practice to hide any confidential or sensitive information into another information that plays as the cover for the information, adding a layer of security on top of science of secret writing, known as cryptography. In this paper, we discuss an improved LSB steganography technique to optimize the algorithm hiding the bits in different channels selected dynamically using key. We further propose a platform leveraging cryptographic algorithms and verification using face data in pipeline to help keep data more secure.

Journal ArticleDOI
08 Dec 2020
TL;DR: Using the Least Significant Bit (LSB) method as the insertion method and modification method to optimize the LSB performance in inserting messages of 1 to 4 bits, the results of research on the insertion with cover images and message images using PNG format based on information shows the best number of bits with 1-bit message insertion.
Abstract: Security and confidentiality are very important aspects for users of information technology. To avoid messages that are sent falling on unauthorized parties and news occurs on the message. There are many ways that can be done for housing data or messages to be sent. One of them is steganography. Steganography is a technique of inserting messages into other media, so that the message will be hidden and what will appear is other media to insert messages. Steganography requires a message and cover. Cover is the medium used to enter messages. This study aims to include a message in the form of an image on the cover in the form of an image in JPG and PNG formats. In this study, using the Least Significant Bit (LSB) method as the insertion method and modification method to optimize the LSB performance in inserting messages of 1 to 4 bits. From the results of research on the insertion with cover images and message images using PNG format based on information and PSNR shows the best number of bits with 1-bit message insertion while in the process of extracting message images from cover images that have gone through the insertion process using PNG format based on cooperation and MAPE shows best bit count with 4 bit message insertion. Decrease, the more bits that are inserted, the quality cover will decrease but the extraction result is the higher the quality increase in the return message.

MonographDOI
27 Feb 2020
TL;DR: To cover all the needs and requirements of mobile networks in the future, the predicted usage of the mobile networks has been split into three use-cases: enhanced mobile broadband, ultra-reliable l networks, and enhanced mobile Broadband 2.0.
Abstract: To cover all the needs and requirements of mobile networks in the future, the predicted usage of the mobile networks has been split into three use-cases: enhanced mobile broadband, ultra-reliable l ...

Journal ArticleDOI
TL;DR: Formatting should not be a requirement during initial submission, but only after a paper has passed peer review and been approved for publication, allowing academics to optimize their time and energy.
Abstract: Academics are under constant pressure to optimize their time. Formatting requirements imposed on academics by journals or editors during initial manuscript submission may waste precious time, energy, and financial resources, especially if a paper is desk-rejected, and even more so when there are multiple rejections. Formatting, which does not reflect a manuscript’s academic quality, should not be a requirement during initial submission, but only after a paper has passed peer review and been approved for publication. Several publishers offer a formatting-free option during initial submission, allowing academics to optimize their time and energy.

Journal ArticleDOI
TL;DR: This paper generates password at random basis in a unique way based on system time and date and sends this confidential password using steganography by implementing a totally new embedding and extraction technique based on exact length of bits in binary representation of ASCII values.
Abstract: Data hiding is a technique for secure transmission of confidential data. Many data hiding techniques exist and steganography is the most important one. This paper presents a new steganography method in spatial domain. We use steganography to send confidential information from sender to receiver. Here, we generate password at random basis in a unique way based on system time and date. Then we send this confidential password using steganography by implementing a totally new embedding and extraction technique based on exact length of bits in binary representation of ASCII values. Here, confidential text information is embedded into cover image generating a stego image and sent to receiver maintaining top level secrecy.

Journal ArticleDOI
TL;DR: This research endeavor enhances one of the most famous images Steganography technique called the Least Significant Bit (LSB) Steganographers, from the security and information-theoretic standpoint by taking a known-cover and known-message attack scenario.
Abstract: The endangerment of online data breaches calls for exploring new and enhancing existing sneaky ways of clandestine communication to tailor those to match the present and futuristic technological and environmental needs, to which malicious intruders wouldn't have an answer. Cryptography and Steganography are the two distinct techniques that, for long, have remained priority choices for hiding vital information from the unauthorized. But the visibility of the encrypted contents makes these vulnerable to attack. Also, the recent legislative protection agreed to law enforcement authorities in Australia to sneak into pre-shared cryptographic secret keys (PSKs) shall have a devastating impact on the privacy of the people. Hence, the need of the hour is to veil in the encrypted data underneath the cover of Steganography, whose sole intent is to hide the very existence of information. This research endeavor enhances one of the most famous images Steganography technique called the Least Significant Bit (LSB) Steganography, from the security and information-theoretic standpoint by taking a known-cover and known-message attack scenario. The explicit proclamation of this research endeavor is that the security of LSB Steganography lies in inducing uncertainty at the time of bit embedding process. The test results rendered by the proposed methodology confers on the non-detectability and imperceptibility of the confidential information along with its strong resistance against LSB Steganalysis techniques.

Proceedings ArticleDOI
25 Feb 2020
TL;DR: This paper designed and implemented a forward private dynamic SSE scheme that can run smoothly on resource-constrained devices and eventually be adopted by IoT services and achieves efficient computational operations and supports the multi-client model.