Steganography is a technique for hiding secret messages while sending and receiving communications through a cover item.From ancient times to the present,the security of secret or vital information has always been a s...Steganography is a technique for hiding secret messages while sending and receiving communications through a cover item.From ancient times to the present,the security of secret or vital information has always been a significant problem.The development of secure communication methods that keep recipient-only data transmissions secret has always been an area of interest.Therefore,several approaches,including steganography,have been developed by researchers over time to enable safe data transit.In this review,we have discussed image steganography based on Discrete Cosine Transform(DCT)algorithm,etc.We have also discussed image steganography based on multiple hashing algorithms like the Rivest–Shamir–Adleman(RSA)method,the Blowfish technique,and the hash-least significant bit(LSB)approach.In this review,a novel method of hiding information in images has been developed with minimal variance in image bits,making our method secure and effective.A cryptography mechanism was also used in this strategy.Before encoding the data and embedding it into a carry image,this review verifies that it has been encrypted.Usually,embedded text in photos conveys crucial signals about the content.This review employs hash table encryption on the message before hiding it within the picture to provide a more secure method of data transport.If the message is ever intercepted by a third party,there are several ways to stop this operation.A second level of security process implementation involves encrypting and decrypting steganography images using different hashing algorithms.展开更多
This advanced paper presents a new approach to improving image steganography using the Ant Colony Optimization(ACO)algorithm.Image steganography,a technique of embedding hidden information in digital photographs,shoul...This advanced paper presents a new approach to improving image steganography using the Ant Colony Optimization(ACO)algorithm.Image steganography,a technique of embedding hidden information in digital photographs,should ideally achieve the dual purposes of maximum data hiding and maintenance of the integrity of the cover media so that it is least suspect.The contemporary methods of steganography are at best a compromise between these two.In this paper,we present our approach,entitled Ant Colony Optimization(ACO)-Least Significant Bit(LSB),which attempts to optimize the capacity in steganographic embedding.The approach makes use of a grayscale cover image to hide the confidential data with an additional bit pair per byte,both for integrity verification and the file checksumof the secret data.This approach encodes confidential information into four pairs of bits and embeds it within uncompressed grayscale images.The ACO algorithm uses adaptive exploration to select some pixels,maximizing the capacity of data embedding whileminimizing the degradation of visual quality.Pheromone evaporation is introduced through iterations to avoid stagnation in solution refinement.The levels of pheromone are modified to reinforce successful pixel choices.Experimental results obtained through the ACO-LSB method reveal that it clearly improves image steganography capabilities by providing an increase of up to 30%in the embedding capacity compared with traditional approaches;the average Peak Signal to Noise Ratio(PSNR)is 40.5 dB with a Structural Index Similarity(SSIM)of 0.98.The approach also demonstrates very high resistance to detection,cutting down the rate by 20%.Implemented in MATLAB R2023a,the model was tested against one thousand publicly available grayscale images,thus providing robust evidence of its effectiveness.展开更多
In this paper, the authors propose a new algorithm to hide data inside image using steganography technique. The proposed algorithm uses binary codes and pixels inside an image. The zipped file is used before it is con...In this paper, the authors propose a new algorithm to hide data inside image using steganography technique. The proposed algorithm uses binary codes and pixels inside an image. The zipped file is used before it is converted to binary codes to maximize the storage of data inside the image. By applying the proposed algorithm, a system called Steganography Imaging System (gig) is developed. The system is then tested to see the viability of the proposed algorithm. Various sizes of data are stored inside the images and the Peak signal-to-noise ratio (PSNR) is also captured for each of the images tested. Based on the PSNR value of each images, the stego image has a higher PSNR value. Hence this new steganography algorithm is very efficient to hide the data inside the image.展开更多
With the widespread use of the internet,there is an increasing need to ensure the security and privacy of transmitted data.This has led to an intensified focus on the study of video steganography,which is a technique ...With the widespread use of the internet,there is an increasing need to ensure the security and privacy of transmitted data.This has led to an intensified focus on the study of video steganography,which is a technique that hides data within a video cover to avoid detection.The effectiveness of any steganography method depends on its ability to embed data without altering the original video’s quality while maintaining high efficiency.This paper proposes a new method to video steganography,which involves utilizing a Genetic Algorithm(GA)for identifying the Region of Interest(ROI)in the cover video.The ROI is the area in the video that is the most suitable for data embedding.The secret data is encrypted using the Advanced Encryption Standard(AES),which is a widely accepted encryption standard,before being embedded into the cover video,utilizing up to 10%of the cover video.This process ensures the security and confidentiality of the embedded data.The performance metrics for assessing the proposed method are the Peak Signalto-Noise Ratio(PSNR)and the encoding and decoding time.The results show that the proposed method has a high embedding capacity and efficiency,with a PSNR ranging between 64 and 75 dBs,which indicates that the embedded data is almost indistinguishable from the original video.Additionally,the method can encode and decode data quickly,making it efficient for real-time applications.展开更多
Steganography technology has been widely used in data transmission with secret information.However,the existing steganography has the disadvantages of low hidden information capacity,poor visual effect of cover images...Steganography technology has been widely used in data transmission with secret information.However,the existing steganography has the disadvantages of low hidden information capacity,poor visual effect of cover images,and is hard to guarantee security.To solve these problems,steganography using reversible texture synthesis based on seeded region growing and LSB is proposed.Secret information is embedded in the process of synthesizing texture image from the existing natural texture.Firstly,we refine the visual effect.Abnormality of synthetic texture cannot be fully prevented if no approach of controlling visual effect is applied in the process of generating synthetic texture.We use seeded region growing algorithm to ensure texture’s similar local appearance.Secondly,the size and capacity of image can be decreased by introducing the information segmentation,because the capacity of the secret information is proportional to the size of the synthetic texture.Thirdly,enhanced security is also a contribution in this research,because our method does not need to transmit parameters for secret information extraction.LSB is used to embed these parameters in the synthetic texture.展开更多
With the popularity of adaptive multi-rate wideband (AMR-WB) audio in mobile communication, many AMR- WB based techniques, such as a similar compression architecture to transmit secret information during the process...With the popularity of adaptive multi-rate wideband (AMR-WB) audio in mobile communication, many AMR- WB based techniques, such as a similar compression architecture to transmit secret information during the process of compression, were proposed to transmit covert messages. However, if a sender does not have the original waveform audio format (WAV) audio, the architecture cannot be used. In this paper, a new covert message method, which takes effect after WAV audio is compressed into AMR-WB speech, is proposed. This method takes advantage of algebraic codebook search. Aiming at improving speed and reducing search space, it does not perform algebraic codebook search using the optimal search algorithm, and it does not reach the positions of non-zero pulses via depth-first tree search that characterizes the energy of audio. According to the features of search methods and the codebook index construction, every track in each subframe is analyzed to find the proper positions for embedding secret information. Experimental results show that the proposed method has satisfactory capacity and simplicity regardless of compression process.展开更多
In the healthcare system,the Internet of Things(IoT)based distributed systems play a vital role in transferring the medical-related documents and information among the organizations to reduce the replication in medica...In the healthcare system,the Internet of Things(IoT)based distributed systems play a vital role in transferring the medical-related documents and information among the organizations to reduce the replication in medical tests.This datum is sensitive,and hence security is a must in transforming the sensational contents.In this paper,an Evolutionary Algorithm,namely the Memetic Algorithm is used for encrypting the text messages.The encrypted information is then inserted into the medical images using Discrete Wavelet Transform 1 level and 2 levels.The reverse method of the Memetic Algorithm is implemented when extracting a hidden message from the encoded letter.To show its precision,equivalent to five RGB images and five Grayscale images are used to test the proposed algorithm.The results of the proposed algorithm were analyzed using statistical methods,and the proposed algorithm showed the importance of data transfer in healthcare systems in a stable environment.In the future,to embed the privacy-preserving of medical data,it can be extended with blockchain technology.展开更多
针对当前图像隐写方案存在阶梯效应,使其不可感知能力差,且其信息隐藏容量小(≤50%)等不足,设计了最优像素调整耦合基因算法的高容量图像隐写术。基于HDWT(Hara discerte wavelet transform)机制,构造隐藏信息长度计算模型,找出图像分...针对当前图像隐写方案存在阶梯效应,使其不可感知能力差,且其信息隐藏容量小(≤50%)等不足,设计了最优像素调整耦合基因算法的高容量图像隐写术。基于HDWT(Hara discerte wavelet transform)机制,构造隐藏信息长度计算模型,找出图像分块的频域表示,以改善隐写鲁棒性;根据载体图像与隐写图像之间的绝对误差,设计适应度函数,借助基因算法,获取最优映射函数,将秘密信息嵌入到HDWT系数中;并设计最优像素变换方案,降低载秘图像与载体图像之间的嵌入误差,显著增大隐写容量;再设计其提取机制,获取信息图像;以PSNR(peak signal to ratio)构建反馈机制,优化提取质量。仿真结果显示,与其他隐写机制相比,该算法具备更大的隐写容量和更强的不可感知性能;拥有更高的检测精度,可有效区分载体与隐写图像特征值。展开更多
文摘Steganography is a technique for hiding secret messages while sending and receiving communications through a cover item.From ancient times to the present,the security of secret or vital information has always been a significant problem.The development of secure communication methods that keep recipient-only data transmissions secret has always been an area of interest.Therefore,several approaches,including steganography,have been developed by researchers over time to enable safe data transit.In this review,we have discussed image steganography based on Discrete Cosine Transform(DCT)algorithm,etc.We have also discussed image steganography based on multiple hashing algorithms like the Rivest–Shamir–Adleman(RSA)method,the Blowfish technique,and the hash-least significant bit(LSB)approach.In this review,a novel method of hiding information in images has been developed with minimal variance in image bits,making our method secure and effective.A cryptography mechanism was also used in this strategy.Before encoding the data and embedding it into a carry image,this review verifies that it has been encrypted.Usually,embedded text in photos conveys crucial signals about the content.This review employs hash table encryption on the message before hiding it within the picture to provide a more secure method of data transport.If the message is ever intercepted by a third party,there are several ways to stop this operation.A second level of security process implementation involves encrypting and decrypting steganography images using different hashing algorithms.
文摘This advanced paper presents a new approach to improving image steganography using the Ant Colony Optimization(ACO)algorithm.Image steganography,a technique of embedding hidden information in digital photographs,should ideally achieve the dual purposes of maximum data hiding and maintenance of the integrity of the cover media so that it is least suspect.The contemporary methods of steganography are at best a compromise between these two.In this paper,we present our approach,entitled Ant Colony Optimization(ACO)-Least Significant Bit(LSB),which attempts to optimize the capacity in steganographic embedding.The approach makes use of a grayscale cover image to hide the confidential data with an additional bit pair per byte,both for integrity verification and the file checksumof the secret data.This approach encodes confidential information into four pairs of bits and embeds it within uncompressed grayscale images.The ACO algorithm uses adaptive exploration to select some pixels,maximizing the capacity of data embedding whileminimizing the degradation of visual quality.Pheromone evaporation is introduced through iterations to avoid stagnation in solution refinement.The levels of pheromone are modified to reinforce successful pixel choices.Experimental results obtained through the ACO-LSB method reveal that it clearly improves image steganography capabilities by providing an increase of up to 30%in the embedding capacity compared with traditional approaches;the average Peak Signal to Noise Ratio(PSNR)is 40.5 dB with a Structural Index Similarity(SSIM)of 0.98.The approach also demonstrates very high resistance to detection,cutting down the rate by 20%.Implemented in MATLAB R2023a,the model was tested against one thousand publicly available grayscale images,thus providing robust evidence of its effectiveness.
文摘In this paper, the authors propose a new algorithm to hide data inside image using steganography technique. The proposed algorithm uses binary codes and pixels inside an image. The zipped file is used before it is converted to binary codes to maximize the storage of data inside the image. By applying the proposed algorithm, a system called Steganography Imaging System (gig) is developed. The system is then tested to see the viability of the proposed algorithm. Various sizes of data are stored inside the images and the Peak signal-to-noise ratio (PSNR) is also captured for each of the images tested. Based on the PSNR value of each images, the stego image has a higher PSNR value. Hence this new steganography algorithm is very efficient to hide the data inside the image.
文摘With the widespread use of the internet,there is an increasing need to ensure the security and privacy of transmitted data.This has led to an intensified focus on the study of video steganography,which is a technique that hides data within a video cover to avoid detection.The effectiveness of any steganography method depends on its ability to embed data without altering the original video’s quality while maintaining high efficiency.This paper proposes a new method to video steganography,which involves utilizing a Genetic Algorithm(GA)for identifying the Region of Interest(ROI)in the cover video.The ROI is the area in the video that is the most suitable for data embedding.The secret data is encrypted using the Advanced Encryption Standard(AES),which is a widely accepted encryption standard,before being embedded into the cover video,utilizing up to 10%of the cover video.This process ensures the security and confidentiality of the embedded data.The performance metrics for assessing the proposed method are the Peak Signalto-Noise Ratio(PSNR)and the encoding and decoding time.The results show that the proposed method has a high embedding capacity and efficiency,with a PSNR ranging between 64 and 75 dBs,which indicates that the embedded data is almost indistinguishable from the original video.Additionally,the method can encode and decode data quickly,making it efficient for real-time applications.
基金This work was mainly supported by National Natural Science Foundation of China(No.61370218)Public Welfare Technology and Industry Project of Zhejiang Provincial Science Technology Department(No.2016C31081,No.LGG18F020013)。
文摘Steganography technology has been widely used in data transmission with secret information.However,the existing steganography has the disadvantages of low hidden information capacity,poor visual effect of cover images,and is hard to guarantee security.To solve these problems,steganography using reversible texture synthesis based on seeded region growing and LSB is proposed.Secret information is embedded in the process of synthesizing texture image from the existing natural texture.Firstly,we refine the visual effect.Abnormality of synthetic texture cannot be fully prevented if no approach of controlling visual effect is applied in the process of generating synthetic texture.We use seeded region growing algorithm to ensure texture’s similar local appearance.Secondly,the size and capacity of image can be decreased by introducing the information segmentation,because the capacity of the secret information is proportional to the size of the synthetic texture.Thirdly,enhanced security is also a contribution in this research,because our method does not need to transmit parameters for secret information extraction.LSB is used to embed these parameters in the synthetic texture.
基金supported by the Fundamental Research Funds for the Central Universities (2016JX06)the National Natural Science Foundation of China (61472369)
文摘With the popularity of adaptive multi-rate wideband (AMR-WB) audio in mobile communication, many AMR- WB based techniques, such as a similar compression architecture to transmit secret information during the process of compression, were proposed to transmit covert messages. However, if a sender does not have the original waveform audio format (WAV) audio, the architecture cannot be used. In this paper, a new covert message method, which takes effect after WAV audio is compressed into AMR-WB speech, is proposed. This method takes advantage of algebraic codebook search. Aiming at improving speed and reducing search space, it does not perform algebraic codebook search using the optimal search algorithm, and it does not reach the positions of non-zero pulses via depth-first tree search that characterizes the energy of audio. According to the features of search methods and the codebook index construction, every track in each subframe is analyzed to find the proper positions for embedding secret information. Experimental results show that the proposed method has satisfactory capacity and simplicity regardless of compression process.
文摘In the healthcare system,the Internet of Things(IoT)based distributed systems play a vital role in transferring the medical-related documents and information among the organizations to reduce the replication in medical tests.This datum is sensitive,and hence security is a must in transforming the sensational contents.In this paper,an Evolutionary Algorithm,namely the Memetic Algorithm is used for encrypting the text messages.The encrypted information is then inserted into the medical images using Discrete Wavelet Transform 1 level and 2 levels.The reverse method of the Memetic Algorithm is implemented when extracting a hidden message from the encoded letter.To show its precision,equivalent to five RGB images and five Grayscale images are used to test the proposed algorithm.The results of the proposed algorithm were analyzed using statistical methods,and the proposed algorithm showed the importance of data transfer in healthcare systems in a stable environment.In the future,to embed the privacy-preserving of medical data,it can be extended with blockchain technology.
文摘针对当前图像隐写方案存在阶梯效应,使其不可感知能力差,且其信息隐藏容量小(≤50%)等不足,设计了最优像素调整耦合基因算法的高容量图像隐写术。基于HDWT(Hara discerte wavelet transform)机制,构造隐藏信息长度计算模型,找出图像分块的频域表示,以改善隐写鲁棒性;根据载体图像与隐写图像之间的绝对误差,设计适应度函数,借助基因算法,获取最优映射函数,将秘密信息嵌入到HDWT系数中;并设计最优像素变换方案,降低载秘图像与载体图像之间的嵌入误差,显著增大隐写容量;再设计其提取机制,获取信息图像;以PSNR(peak signal to ratio)构建反馈机制,优化提取质量。仿真结果显示,与其他隐写机制相比,该算法具备更大的隐写容量和更强的不可感知性能;拥有更高的检测精度,可有效区分载体与隐写图像特征值。