scispace - formally typeset

Topic

Cover (telecommunications)

About: Cover (telecommunications) is a(n) research topic. Over the lifetime, 4261 publication(s) have been published within this topic receiving 30755 citation(s).
Papers
More filters

DOI
01 Nov 2021
Abstract: Rapid growth in technological development, the use of the internet has grown many folds. Along with it, the sharing of privacy information in networks creates ownership issues. In order to create a high level of security for sharing private information, the concept of steganography is introduced along with encryption based invisible watermarking techniques. The proposed system hides the encrypted private messages by using onetime pad which follows the concept LSB algorithm in spatial domain. The system combines steganography and encryption for enhancing the confidentiality of the intended messages. At first, the private information of the user is encrypted by using the onetime pad algorithm. Then the encrypted text is hidden the Least Significant Bit (LSB) of the different components of the color image in such a way that as to minimize the perceived loss of quality of the cover image. The beneficiary of the message is able to retrieve the hidden back and from the stego-image and extract the cipher text and find the plaintext from using the onetime pad algorithm. The proposed algorithm will be tested and analysed against three different hiding positions of color image components.

Journal ArticleDOI
Jeonghwan Heo1, Jechang Jeong1Institutions (1)
29 Oct 2021-Sensors
Abstract: With the recent development of video compression methods, video transmission on traditional devices and video distribution using networks has increased in various devices such as drones, IP cameras, and small IoT devices. As a result, the demand for encryption techniques such as MPEG-DASH for transmitting streams over networks is increasing. These video stream security methods guarantee stream confidentiality. However, they do not hide the fact that the encrypted stream is being transmitted over the network. Considering that sniffing attacks can analyze the entropy of the stream and scan huge amounts of traffic on the network, to solve this problem, the deception method is required, which appears unencrypted but a confidential stream. In this paper, we propose the new deception method that utilizes standard NAL unit rules of video codec, where the unpromised device shows the cover video and the promised device shows the secret video for deceptive security. This method allows a low encryption cost and the stream to dodge entropy-based sniffing scan attacks. The proposed stream shows that successful decoding using five standard decoders and processing performance was 61% faster than the conventional encryption method in the test signal conformance set. In addition, a network encrypted stream scan method the HEDGE showed classification results that our stream is similar to a compressed video.

Posted Content
Daewon Lee1Institutions (1)
Abstract: Steganography is one of the information hiding techniques, which conceals secret messages in cover media. Digital image and audio are the most studied cover media for steganography. However, so far, there is no research on steganography to utilize complex networks as cover media. To investigate the possibility and feasibility of complex networks as cover media for steganography, we introduce steganography of complex networks through three algorithms: BIND, BYMOND, and BYNIS. BIND hides two bits of a secret message in an edge, while BYMOND encodes a byte in an edge, without changing the original network structures. Encoding simulation experiments for the networks of Open Graph Benchmark demonstrated BIND and BYMOND can successfully hide random messages in the edge lists. BYNIS synthesizes edges by generating node identifiers from a given message. The degree distribution of stego network synthesized by BYNIS was mostly close to a power-law. Steganography of complex networks is expected to have applications such as watermarking to protect proprietary datasets, or sensitive information hiding for privacy preservation.

Proceedings ArticleDOI
20 Oct 2021
Abstract: Steganography is the art and science of hiding secret messages without being discovered by a potential attacker. In this paper we propose an application that uses a Message Processing-based Steganographic Algorithm and an Artificial Intelligence algorithm to colorize the recovered message using Convolutional Neural Networks. This solution gives the opportunity to hide a higher quantity of message data in the cover image. The structure of the application and an analysis of test results are presented in this paper.

DOI
07 Oct 2021
Abstract: Due to the need to protect the information sent over the Internet from being violated by unauthorized persons, many security solutions have appeared to overcome the problems of data leakage. From these solutions is encryption, but once the data is decoded, it will be easy to violate, so to increase the strength of protection, many have appeared. Masking algorithms and methods that extend to digital media copyright protection. In this research, we propose to encrypt and hide a group of images, where four images containing a biography were proposed by securely transferring them within a video of the receiving party. Where the protection process goes through two phases: the encryption phase using the development of the Vernam encryption algorithm, where each image is encrypted using a cut-out image from the video, which is the carrier of confidential data, and the encryption process produces three gray images, as this data is hidden using the least important bit method by masking The data is in random clips inside the video, depending on a secret key between the sender and the receiver, then the same secret key is used in the process of encrypting the video as well, which was used as a cover not to hide the four encrypted images of the CV.

Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20222
202189
2020171
2019207
2018210
2017194