Science method

Steganography - Science method

Discussion everything about data hiding in images and recent methods in this field
Filters
All publications are displayed by default. Use this filter to view only publications with full-texts.
Publications related to Steganography (10,000)
Sorted by most recent
Research Proposal
Full-text available
In this Topic, we welcome both original research papers and review articles on diverse topics such as: - Data security and emerging hybrid techniques. - Image and video encryption, watermarking, - steganography, and data hiding. - Multimedia security using blockchain. - Applications of multimedia security in smart cities. - Deep learning techniques...
Article
Full-text available
The integrity and security of medical data have become a big challenge for healthcare services applications. Images of hidden text represent steganography forms in which the image is exploited as an object to cover information and data. So, the data masking ability and image quality of the cover object are significant elements in image masking. In...
Article
Full-text available
Interpolation-based reversible data hiding (IRDH) is a method for embedding data in a reversible manner into digital images. It is based on the polynomial interpolation to hide the secret data bit stream in the coefficients of the interpolation polynomial. In this paper, an IRDH method that combines a modified neighbor mean interpolation is present...
Preprint
Full-text available
p>Since tokenization serves a fundamental preprocessing step in numerous language models, tokens naturally constitute the basic embedding units for generative linguistic steganography. However, token-based methods encounter challenges including limited embedding capacity and possible segmentation ambiguity. Despite existing character-level linguist...
Preprint
Full-text available
p>Since tokenization serves a fundamental preprocessing step in numerous language models, tokens naturally constitute the basic embedding units for generative linguistic steganography. However, token-based methods encounter challenges including limited embedding capacity and possible segmentation ambiguity. Despite existing character-level linguist...
Article
Full-text available
Chaotic systems have played a vital role within the domain of chaos-based image encryption, owing to its significant advantages including sensitivity to initial values, ergodicity and others. Nonetheless, the current low-dimensional and less-scroll chaotic systems exhibit low complexity and randomness, leading to unsatisfactory security performance...
Article
Full-text available
Over the past few decades, there have been several successful methods developed for steganography. One popular technique is the insertion method, which is favored for its simplicity and ability to hold a reasonable amount of hidden data. This study introduces an adaptive insertion technique based on the two-dimensional discrete Haar filter (2D DHF)...
Article
Full-text available
Generation and manipulation of three-dimensional (3D) optical polarization structures have received considerable interest because of their distinctive optical features and potential applications. However, the realization of multiple 3D polarization structures in a queue along the light propagation direction has not yet been reported. We propose and...
Preprint
Full-text available
The proposed visions for the sixth generation wireless communications network indicate that it will have the ability to transmit massive amounts of data in a very short time. These visions require the sixth-generation network to have a high level of security. This paper focuses on the confidentiality and privacy of data on the sixth-generation wire...
Article
Full-text available
In this paper, several ideas of data hiding in WebP images are presented. WebP is a long-known, but not very poplar file format that provides lossy or lossless compression of data, in the form of a still image or an animation. A great number of WebP features are optional, so the structure of the image offers great opportunities for data hiding. The...
Article
Full-text available
Steganography, the art of concealing confidential data within seemingly benign carrier data like images, audio, or text, presents an ongoing conundrum of simultaneously upholding security and efficiency. This paper introduces a novel algorithm designed to not only implement but also enhance the practice of steganography. The algorithm incorporates...
Article
Full-text available
It is important to securely send information through the Internet; thus, technologies for safely exchanging information are required. One such technology is steganography, which conceals confidential data in multimedia. Although numerous embedding methods have been proposed, increasing embedding capacity, controlling image-quality degradation, and...
Article
Full-text available
The art of message masking is called steganography. Steganography keeps communication from being seen by any other person. In the domain of information concealment within images, numerous steganographic techniques exist. Digital photos stand out as prime candidates due to their widespread availability. This study seeks to develop a secure, high-cap...
Article
Full-text available
This paper deciphers the sail on a proposition of a video steganography model with the use of a 3D DeepCNN- grounded autoencoder which allows extracting spatiotemporal features from still frames. It tends to hide frames of one video in another video taking into consideration equivalency in terms of size. For the phase of training the model, we’ve e...
Article
Full-text available
Multimedia-based Steganography is famous for its security purpose, These steganography techniques were used by our ancestors and it is still carried out now with better and vast technology. The aim is to provide better security in an effective and secure manner where the original data is covered and hidden by some of the media covers like video, au...
Article
Full-text available
Cryptography is required while interacting through an insecure media, such as internet. Unauthorised individuals have the ability to view and alter data as it is being transferred from one location to other. Cryptography is important in the realm of security of data. Cryptographic methods are being utilized to protect information against attackers...
Article
Full-text available
Maintaining the confidentiality and integrity of the messages during a transmission is one of the most important aims of encrypted communication systems. Many achievements were made using biomolecules to improve the quality of the messages in communication. At the same time, it is still a challenge to construct cooperative communications based on t...
Article
Full-text available
Multimedia content’s development and technological evolution have enhanced and even facilitated the application of steganography as a means to introduce hidden messages for cybercrime-related purposes. Artificial intelligence models have been widely implemented as a way to detect the presence of these messages in image content. However, the possibi...
Article
Full-text available
A Walk-through towards Network Steganography Techniques. Abstract. 2D and 3D digital multimedia files offer numerous benefits like excellent quality, compression, editing, reliable copying, etc. These qualities of the multimedia files, on the other hand, are the cause of fear including the fear of getting access to data during communication. Stegan...
Article
Full-text available
This paper proposes a new cover selection method for steganography. We focus on the scenario that the available images for selection contain diversified sources, i.e., nature images and metaverse images. For the scenario, we design a targeted strategy to evaluate the suitability for steganography of a candidate image, which selects images according...
Article
Full-text available
A Walk-through towards Network Steganography Techniques. Abstract. 2D and 3D digital multimedia files offer numerous benefits like excellent quality, compression, editing, reliable copying, etc. These qualities of the multimedia files, on the other hand, are the cause of fear including the fear of getting access to data during communication. Stegan...
Article
Full-text available
The mΘ structure introduce pure and applied mathematics using the set FpZ Fp [ fxpZ j ≡ e(x = 0(mod(p)))g, p prime, to then present mathematical structures resulting from the sets originally introduced F. Ayissi Eteme [6]. This work consists in defining on FpZ the notion of Hamming code according to mΘ set structure. We show a relation between mΘ p...
Article
Full-text available
Steganography is a method used to enhance the security of messages across networks, derived from the Greek words steganos (secret) and graphic (writing). Researchers have explored image steganography, a method that uses a photo as a cover material. The modern energy grid, known as the smart grid, offers flexibility, dependability, and efficiency in...
Article
Full-text available
Data security involves protecting digital information to prevent unauthorized access to computers, databases, and websites. Cryptography, encryption, and compression are key strategies for data protection. AES is a powerful cryptographic method. Confidentiality, authenticity, integrity, and non-repudiation are crucial for online communication. Steg...
Article
Full-text available
In the domain of digital steganography, the problem of efficient and accurate steganalysis is of utmost importance. Steganalysis seeks to detect the presence of hidden data within digital media, a task that is continually evolving due to advancements in steganographic techniques. This study undertakes a detailed exploration of the SRNet model, a pr...
Article
Full-text available
Steganography is the art of hiding messages in an image. This is a great way to send a secret message without drawing attention to it. Many technologies have been developed to ensure data security, and cryptography is considered one of the most important sciences used since the dawn of humanity. Using this proposed technique, we take the input text...
Article
Full-text available
Data steganography is widely used in message protection from being read, and mostly used methods based on LSB and LSB2 methods are not enough secure. In this research paper a modified LSB2 method will be introduced. This method will use a complex complicated key to enhance the data protection degree. The key will be used to rearrange the message st...
Article
Full-text available
This study introduces an innovative image steganography method that combines convolutional autoencoders with the ResNet architecture, evaluated using the CIFAR dataset. It overcomes traditional steganography limitations by leveraging deep learning, achieving high imperceptibility, low computational power needed and substantial hiding capacity. The...
Article
Full-text available
span>Cloud computing has introduced substantial advancements to the field of information technology, offering businesses enhanced features, flexibility, reliability, scalability, and a wide range of services. However, it also presents security challenges like data theft and manipulation. To minimize the risks associated with these threats, a model...
Article
Full-text available
The security and confidentiality of medical images are of utmost importance due to frequent issues such as leakage, theft, and tampering during transmission and storage, which seriously impact patient privacy. Traditional encryption techniques applied to entire images have proven to be ineffective in guaranteeing timely encryption and preserving th...
Article
Full-text available
To realize the act of covert communication in a public channel, steganography is proposed. In the current study, modern adaptive steganography plays a dominant role due to its high undetectability. However, the effectiveness of modern adaptive steganography is challenged when being applied in practical communication, such as over social network. Se...
Article
Full-text available
The internet of things (IoT) has become a popular technology in communication which utilizes the concept of connecting things together and exchanges information through various networks. Since data can be transferred through a wide range of channels, IoT systems suffer from potential data leakages. One of the common ways to reduce such risks is to...
Research Proposal
Full-text available
Multimedia data have dominated the Internet, and various devices are capable of producing and handling multimedia data such as audio, image, and video. Multimedia security is a major concern in the prevention of ownership and copyright problems. Multimedia security methodologies, such as digital watermarking, data encryption/decryption, steganograp...
Article
Full-text available
Data security involves protecting digital information to prevent unauthorized access to computers, databases, and websites. Cryptography, encryption, and compression are key strategies for data protection. AES is a powerful cryptographic method. Confidentiality, authenticity, integrity, and non-repudiation are crucial for online communication. Steg...
Preprint
Full-text available
Given the exponential growth of data transmission over the Internet, ensuring digital security has emerged as a paramount concern. In response to this, various disciplines, such as steganography, have been developed. Steganography operates on the principle of concealing confidential information within a carrier medium, thereby keeping it hidden fro...
Preprint
Full-text available
The proposed visions for the sixth generation wireless communications network indicate that it will have the ability to transmit massive amounts of data in a very short time. These visions require the sixth-generation network to have a high level of security. This paper focuses on the confidentiality and privacy of data on the sixth-generation wire...
Article
Full-text available
In today’s era of widespread web technology and cloud computing, ensuring data security has become a crucial concern across various industries. Instances of data breaches and vulnerabilities in cloud storage have emphasized the need for robust data protection and communication protocols, particularly in sectors like social media, military, and rese...
Conference Paper
Full-text available
The Most multimedia files, especially those containing private information are images. Since multimedia transmission takes place on public communication channels, it is more vulnerable to a wide range of threats as the internet community evolves. Every day, thousands of people upload and download millions of multimedia files. Steganography, the pra...
Conference Paper
Full-text available
Internet has spread to quite large area and has a great share in communication systems. The protection of data during transfer from one point to another has also gained importance because of attacks. Data can be sent and received as sound, image, text etc. Structure of digital image offers us advantages for hiding while transferring data. Therefore...
Article
Full-text available
The field of steganography has witnessed considerable advancements in square-pixel-based image processing (SIP). However, the application of steganography in Hexel (Hexagonal pixel)-based Image Processing (HIP) is still underexplored. This study introduces a pioneering spatial steganography method in the HIP domain called Reversible Logic-Based Hex...
Article
Full-text available
H.264/AVC is the most widely used video-coding standard today, and designing selective encryption (SE) algorithms for H.264/AVC has drawn extensive attention. Unfortunately, existing SE schemes cannot provide a good balance between security, bit rate, and encryption efficiency. In this paper, we propose a fast H.264/AVC SE scheme with syntax-preser...
Preprint
Full-text available
Digital image steganography is a technique for hiding information in an image with the aim of hiding the presence of the information itself. A new steganography without embedding scheme is proposed in this paper to create stego images based only on secret information, in order to avoid image distortion caused by pixel modification-based embedding m...
Article
Full-text available
Securing data during transmission is critical to prevent unauthorized access, interception, or modification of the data. Data can be communicated securely while maintaining its confidentiality, integrity, and availability by using cryptographic algorithms and measures. In the proposed work, a hybrid data compression algorithm is proposed to increas...
Conference Paper
Full-text available
Multiplication between two square matrices is one of the fundamental computational approach in the domain of mathematics and computer science where it is fully recognized as a fore most technique for several interdisciplinary domain and sub domains like linear algebra, graph theory, multidimensional graphics, cryptographic computation, convolution...
Preprint
Full-text available
In image information hiding, steganography capacity and image quality are the key indicators. Keeping the image intact with high embedding capacity is a major challenge in information hiding technology. This paper presents an adaptive block image steganography scheme based on pixel value difference (PVD) and least significant bit (LSB). The scheme...
Preprint
Full-text available
The paper presents a highly effective steganography scheme designed to protect hidden data in the cloud. The proposed scheme addresses the challenges of concealing data in a decentralized manner while minimizing traces left behind by changing cover media. Two significant technical contributions are introduced: 1) The use of unchanged cover media as...
Article
Full-text available
The field of digital image processing plays an important role in education, security, health domain etc. Many researches have been carried out in order to hide data in some digital content but secure image transmission is still taken as one of concerned area. Steganography term is used nowadays which is the art and science to hide secret message by...
Article
Full-text available
The progression of entrenching the information into the digital carrier signal is known as steganography. The information that is send remains secure from any unauthorized access if the concept of steganography is applied to the transferred data. Various Stenographic techniques related to the video steganography have been proposed earlier but the s...
Technical Report
Full-text available
Steganography
Chapter
Full-text available
A healthcare rival has a data breach aimed at critical medical data. Healthcare data breaches affect patients, doctors, and hospitals in addition to being a problem and challenge for security specialists. Despite the variety of healthcare data breaches, they virtually always have the same effect. This study offers information on the numerous types...
Article
Full-text available
The exchange of confidential information should be done in a secure environment. Therefore, security is needed if the exchange of information is carried out using Internet media. The way to secure the information can be done using cryptography and steganography techniques. and vigenere cipher had been applied as cryptography techniques and the LSB...
Article
Full-text available
Digital images cannot be excluded as part of a popular choice of information representation. Covert information can be easily hidden using images. Several schemes are available to hide covert information and are known as steganography schemes. Steganalysis schemes are applied on stego-images to assess the strength of steganography schemes. In this...
Article
Full-text available
With the High Efficiency Video Coding (HEVC) becoming a popular video coding standard in the world, combing the HEVC standard with data hiding methods is a complex task. In this paper, we propose a video steganography method based on intra luma and chroma prediction modes for HEVC. Concerning the characteristics of the quadtree partition and the co...
Article
Full-text available
With increasing population and limited resources, a potential route for improving sustainability is increased reuse of waste materials. By re-looking at wastes, interesting properties and multifunctionalities can be discovered in materials previously explored. Despite years of research on bio-compatible fish scales, there is limited study on the fl...
Article
Full-text available
This research proposes a novel high-capacity-based reversible data embedding strategy for e-healthcare applications. The proposed reversible embedding scheme for electronic patient records (EPR) replaced the conventional embedding and interpolation techniques with a simple pixel-to-block-level transformation, repeated pixel differencing (RPD) and c...
Article
Full-text available
Recent advancements in digital technologies has greatly facilitated the huge growth of complex images over the internet channels leading to security threats causing unauthorised information access. Such complex images are perceived as a reliable means for secret communication. Hence an active research is carried out for steganalysis – a method to d...
Article
Full-text available
Proposed paper is a unique DWT based method for steganography. The Covering image is divided into four sub bands using transform technique DWT. Two different privet images set fixed in the HL and HH sub-bands respectively. When inserted privet images are spread within each band and use a semi random succession and only one Session key. Privet image...
Article
Full-text available
Compared with modification-based steganography, the coverless steganography models have stronger anti-detection performance. However, the limitations of low embedding capacity and image quality are existing in current coverless steganographic models. The image style transfer is a generation task that translates a style to another while maintaining...
Article
Full-text available
Genome steganography has emerged as a promising field for transmitting large amounts of data over an untrusted channel in the last two decades. DNA has many advantages over other multimedia cover mediums. Substitution is the most common approach to developing a DNA-based steganography algorithm. Components of the secret message are converted to DNA...
Conference Paper
Full-text available
Audio steganography is a tool for concealing data (a secret message) inside an audio signal (a carrier). It is regarded as an essential approach for information security. This paper presents a proposed technique for audio signal steganography, which is implemented in the wavelet domain, with a preprocessing enhancement step. First, adaptive Wiener...
Article
Full-text available
This study introduces J-HMMSteg, an adaptive and secure JPEG image steganography technique designed for data embedding with minimal distortion. J-HMMSteg employed a block-wise analysis approach to detect shifts in image statistics and was performed in three phases. Firstly, it constructed statistical features of the images by analyzing intra-interb...
Article
Full-text available
Video steganography is a technique that involves hiding secret messages within a video while minimising any noticeable changes or distortions. The proposed work aims to embed multimedia data such as text, image, audio, or video inside a cover video in a secure and inconspicuous manner using different phases such as input preprocessing, frame select...
Preprint
Full-text available
p>Generative linguistic steganography aims to embed information into natural language texts with imperceptibility to achieve covert transmission, while segmentation ambiguity in unsegmented languages could induce decoding errors. Existing disambiguating ways are based on removing tokens of candidate pools, which could degrade statistical impercepti...
Preprint
Full-text available
p>Generative linguistic steganography aims to embed information into natural language texts with imperceptibility to achieve covert transmission, while segmentation ambiguity in unsegmented languages could induce decoding errors. Existing disambiguating ways are based on removing tokens of candidate pools, which could degrade statistical impercepti...
Article
Full-text available
In this paper, we propose an efficient non-linear post-processing placed downstream of an image encryption scheme. It consists firstly to encrypt the plaintext image by the confusion-diffusion technique using chaotic functions. Then, the resulting image is added to a chaotically generated image having the same dimensions. Obtained result passed thr...
Article
Full-text available
In this work, we'll develop a novel text message steganography concept. In the proposed system, in fact, there is no hiding process in the cover-image, but the image is very important in retrieving the plaintext after it has been encrypted. The suggested system depends on comparing the bits of message, want to be hidden, with bits of the cover imag...
Article
Full-text available
The subject of the study is the process of protecting acoustic information in critical computer systems to ensure the required level of system security. The purpose of the article is to study the method of protecting acoustic information in critical computer systems by means of masking to ensure the impossibility of unauthorized access to the syste...
Article
Full-text available
The article is devoted to the introduction of digital watermarks, which formthe basis for copyright protection systems. Methods in this area are aimed at embedding hidden markers that are resistant to various container transformations. This paper proposes a method for embedding a digital watermark into bitmap images using Lagrange interpolation and...
Conference Paper
Full-text available
One of the most significant areas of computer science, steganography deals with the imperceptible and undetectable concealment of information. Whereas, steganography analysis finds hidden information in observable data without knowledge of method. This is especially true after tying the mechanism of concealing or protecting data with deep learning...
Chapter
Full-text available
Steganography, or hiding messages in plain sight, is a form of information hiding that is most commonly used for covert communication. As modern steganographic mediums include images, text, audio, and video, this communication method is being increasingly used by bad actors to propagate malware, exfiltrate data, and discreetly communicate. Current...