In today’s rapidly evolving landscape of communication technologies,ensuring the secure delivery of sensitive data has become an essential priority.To overcome these difficulties,different steganography and data encr...In today’s rapidly evolving landscape of communication technologies,ensuring the secure delivery of sensitive data has become an essential priority.To overcome these difficulties,different steganography and data encryption methods have been proposed by researchers to secure communications.Most of the proposed steganography techniques achieve higher embedding capacities without compromising visual imperceptibility using LSB substitution.In this work,we have an approach that utilizes a combinationofMost SignificantBit(MSB)matching andLeast Significant Bit(LSB)substitution.The proposed algorithm divides confidential messages into pairs of bits and connects them with the MSBs of individual pixels using pair matching,enabling the storage of 6 bits in one pixel by modifying a maximum of three bits.The proposed technique is evaluated using embedding capacity and Peak Signal-to-Noise Ratio(PSNR)score,we compared our work with the Zakariya scheme the results showed a significant increase in data concealment capacity.The achieved results of ourwork showthat our algorithmdemonstrates an improvement in hiding capacity from11%to 22%for different data samples while maintaining a minimumPeak Signal-to-Noise Ratio(PSNR)of 37 dB.These findings highlight the effectiveness and trustworthiness of the proposed algorithm in securing the communication process and maintaining visual integrity.展开更多
With the improvement of current online communication schemes,it is now possible to successfully distribute and transport secured digital Content via the communication channel at a faster transmission rate.Traditional ...With the improvement of current online communication schemes,it is now possible to successfully distribute and transport secured digital Content via the communication channel at a faster transmission rate.Traditional steganography and cryptography concepts are used to achieve the goal of concealing secret Content on a media and encrypting it before transmission.Both of the techniques mentioned above aid in the confidentiality of feature content.The proposed approach concerns secret content embodiment in selected pixels on digital image layers such as Red,Green,and Blue.The private Content originated from a medical client and was forwarded to a medical practitioner on the server end through the internet.The K-Means clustering principle uses the contouring approach to frame the pixel clusters on the image layers.The content embodiment procedure is performed on the selected pixel groups of all layers of the image using the Least Significant Bit(LSB)substitution technique to build the secret Content embedded image known as the stego image,which is subsequently transmitted across the internet medium to the server end.The experimental results are computed using the inputs from“Open-Access Medical Image Repositories(aylward.org)”and demonstrate the scheme’s impudence as the Content concealing procedure progresses.展开更多
Steganography aims to hide the messages from unauthorized persons for various purposes,e.g.,military correspondence,financial transaction data.Securing the data during transmission is of utmost importance these days.T...Steganography aims to hide the messages from unauthorized persons for various purposes,e.g.,military correspondence,financial transaction data.Securing the data during transmission is of utmost importance these days.The confidentiality,integrity,and availability of the data are at risk because of the emerging technologies and complexity in software applications,and therefore,there is a need to secure such systems and data.There are various methodologies to deal with security issues when utilizing an open system like the Internet.This research proposes a new technique in steganography within RGB shading space to achieve enhanced security compared with existing systems.We evaluate our approach with the help of diverse image quality evaluation techniques including MSE(Mean Square Error),RMSE(Root Mean Square Error),PSNR(Peak Signal-to-Noise Ratio),MAE(Mean Absolute Error),NCC(Normalized Cross-Correlation)and SSIM(Structural Similarity Index).Our experimental results demonstrate improved strength,intangibility,and security when contrasted with existing techniques and vindicate the effectiveness of this exploration work.The proposed approach achieved a 3.6701%average higher score for PSNR Correlation than the next best existing approach.Moreover,in PSNR with a variable amount of cipher embedded in the same images of the same dimensions,the proposed approach attained a 5.22%better score.Embedding the same size of cipher in images of different size resulted a 3.56%better score.展开更多
Recently, an edge adaptive image stegano- graphic method based on least significant bit (LSB) matching revisited (EA-LSBMR) has been proposed, which holds good visual quality and proper security under appropriate ...Recently, an edge adaptive image stegano- graphic method based on least significant bit (LSB) matching revisited (EA-LSBMR) has been proposed, which holds good visual quality and proper security under appropriate embedding rates. However, from the extensive experiments to EA-LSBMR, we find that the discrete Fourier transform (DFT) spectrum of pixelpairs differences histogram still reveals the presence of a secret message even in a low embedding rate. To enhance the security, a modified scheme is proposed in this paper, which can defeat the above-mentioned analysis and keep the visual quality better than EA-LSBMR in higher embedding rates. Experimental results using a latest universal steganalysis method have demonstrated the proposed method's good performance.展开更多
Steganography is a technique to hide the secret data into digital media without getting any unexpected notices. The traditional steganographic method, namely least significant bit (LSB) replacement, is a simple but ...Steganography is a technique to hide the secret data into digital media without getting any unexpected notices. The traditional steganographic method, namely least significant bit (LSB) replacement, is a simple but insecure scheme. To overcome the traditional drawbacks, this paper proposes a steganographic scheme, which is called double-layer hiding method. The experimental results confirm that the proposed scheme achieves better biding capacity with high ability of resisting security analysis.展开更多
There are many detectors for the least significant bit(LSB)steganography which is broadly used in hiding information in the digital images.The length of the hidden information is one of the most important parameters i...There are many detectors for the least significant bit(LSB)steganography which is broadly used in hiding information in the digital images.The length of the hidden information is one of the most important parameters in detecting steganographic information.Using 2-D gradient of a pixel and the distance between variables the proposed method gives the length of hidden information in natural grayscale images without original image.Extensive experimental results show good performance even at low embedding rate compared with other methods.Furthermore,the proposed method also works well disregarding the status of the embedded information.展开更多
A low power mixed signal DC offset calibration (DCOC) circuit for direct conversion receiver applica- tions is designed. The proposed DCOC circuit features low power consumption, fast settling time and a small die a...A low power mixed signal DC offset calibration (DCOC) circuit for direct conversion receiver applica- tions is designed. The proposed DCOC circuit features low power consumption, fast settling time and a small die area by avoiding the trade-off between loop response time and the high pass frequency of the DCOC servo loop in conventional analog DCOC systems. By applying the proposed DC offset correction circuitry, the output residue DC offset voltages are reduced to less than 38 mV and the DCOC loop settling time is less than 100 μs. The DCOC chip is fabricated in a standard 0.13μm CMOS technology and drains only 196 μA from a 1.2-V power supply with its chip area of only 0.372 ×0.419 mm^2.展开更多
基金in part by the Basic Science Research Program through the National Research Foundation of Korea(NRF)funded by the Ministry of Education(NRF-2021R1A6A1A03039493)by the 2024 Yeungnam University Research Grant.
文摘In today’s rapidly evolving landscape of communication technologies,ensuring the secure delivery of sensitive data has become an essential priority.To overcome these difficulties,different steganography and data encryption methods have been proposed by researchers to secure communications.Most of the proposed steganography techniques achieve higher embedding capacities without compromising visual imperceptibility using LSB substitution.In this work,we have an approach that utilizes a combinationofMost SignificantBit(MSB)matching andLeast Significant Bit(LSB)substitution.The proposed algorithm divides confidential messages into pairs of bits and connects them with the MSBs of individual pixels using pair matching,enabling the storage of 6 bits in one pixel by modifying a maximum of three bits.The proposed technique is evaluated using embedding capacity and Peak Signal-to-Noise Ratio(PSNR)score,we compared our work with the Zakariya scheme the results showed a significant increase in data concealment capacity.The achieved results of ourwork showthat our algorithmdemonstrates an improvement in hiding capacity from11%to 22%for different data samples while maintaining a minimumPeak Signal-to-Noise Ratio(PSNR)of 37 dB.These findings highlight the effectiveness and trustworthiness of the proposed algorithm in securing the communication process and maintaining visual integrity.
文摘With the improvement of current online communication schemes,it is now possible to successfully distribute and transport secured digital Content via the communication channel at a faster transmission rate.Traditional steganography and cryptography concepts are used to achieve the goal of concealing secret Content on a media and encrypting it before transmission.Both of the techniques mentioned above aid in the confidentiality of feature content.The proposed approach concerns secret content embodiment in selected pixels on digital image layers such as Red,Green,and Blue.The private Content originated from a medical client and was forwarded to a medical practitioner on the server end through the internet.The K-Means clustering principle uses the contouring approach to frame the pixel clusters on the image layers.The content embodiment procedure is performed on the selected pixel groups of all layers of the image using the Least Significant Bit(LSB)substitution technique to build the secret Content embedded image known as the stego image,which is subsequently transmitted across the internet medium to the server end.The experimental results are computed using the inputs from“Open-Access Medical Image Repositories(aylward.org)”and demonstrate the scheme’s impudence as the Content concealing procedure progresses.
基金This research is supported by the Higher Education Commission(HEC),Pakistan through its initiative of National Center for Cyber Security for the affiliated Security Testing-Innovative Secured Systems Lab(ISSL)established at University of Engineering&Technology(UET)Peshawar,Grant No.2(1078)/HEC/M&E/2018/707.
文摘Steganography aims to hide the messages from unauthorized persons for various purposes,e.g.,military correspondence,financial transaction data.Securing the data during transmission is of utmost importance these days.The confidentiality,integrity,and availability of the data are at risk because of the emerging technologies and complexity in software applications,and therefore,there is a need to secure such systems and data.There are various methodologies to deal with security issues when utilizing an open system like the Internet.This research proposes a new technique in steganography within RGB shading space to achieve enhanced security compared with existing systems.We evaluate our approach with the help of diverse image quality evaluation techniques including MSE(Mean Square Error),RMSE(Root Mean Square Error),PSNR(Peak Signal-to-Noise Ratio),MAE(Mean Absolute Error),NCC(Normalized Cross-Correlation)and SSIM(Structural Similarity Index).Our experimental results demonstrate improved strength,intangibility,and security when contrasted with existing techniques and vindicate the effectiveness of this exploration work.The proposed approach achieved a 3.6701%average higher score for PSNR Correlation than the next best existing approach.Moreover,in PSNR with a variable amount of cipher embedded in the same images of the same dimensions,the proposed approach attained a 5.22%better score.Embedding the same size of cipher in images of different size resulted a 3.56%better score.
基金supported in part by the National Science Foundation of China for Distinguished Young Scholars under Grant No. 61025013Sino-Singapore JRP under Grant No. 2010DFA11010+1 种基金National NSF of China under Grant No. 61073159Fundamental Research Funds for the Central Universities under Grant No. 2009JBZ006
文摘Recently, an edge adaptive image stegano- graphic method based on least significant bit (LSB) matching revisited (EA-LSBMR) has been proposed, which holds good visual quality and proper security under appropriate embedding rates. However, from the extensive experiments to EA-LSBMR, we find that the discrete Fourier transform (DFT) spectrum of pixelpairs differences histogram still reveals the presence of a secret message even in a low embedding rate. To enhance the security, a modified scheme is proposed in this paper, which can defeat the above-mentioned analysis and keep the visual quality better than EA-LSBMR in higher embedding rates. Experimental results using a latest universal steganalysis method have demonstrated the proposed method's good performance.
基金supported by the National Science Council Foundation of Taiwan under Grant No. NSC-100-2218-E-468-002-MY2
文摘Steganography is a technique to hide the secret data into digital media without getting any unexpected notices. The traditional steganographic method, namely least significant bit (LSB) replacement, is a simple but insecure scheme. To overcome the traditional drawbacks, this paper proposes a steganographic scheme, which is called double-layer hiding method. The experimental results confirm that the proposed scheme achieves better biding capacity with high ability of resisting security analysis.
基金The National Natural Science Foundation ofChina(No.60372076)
文摘There are many detectors for the least significant bit(LSB)steganography which is broadly used in hiding information in the digital images.The length of the hidden information is one of the most important parameters in detecting steganographic information.Using 2-D gradient of a pixel and the distance between variables the proposed method gives the length of hidden information in natural grayscale images without original image.Extensive experimental results show good performance even at low embedding rate compared with other methods.Furthermore,the proposed method also works well disregarding the status of the embedded information.
文摘A low power mixed signal DC offset calibration (DCOC) circuit for direct conversion receiver applica- tions is designed. The proposed DCOC circuit features low power consumption, fast settling time and a small die area by avoiding the trade-off between loop response time and the high pass frequency of the DCOC servo loop in conventional analog DCOC systems. By applying the proposed DC offset correction circuitry, the output residue DC offset voltages are reduced to less than 38 mV and the DCOC loop settling time is less than 100 μs. The DCOC chip is fabricated in a standard 0.13μm CMOS technology and drains only 196 μA from a 1.2-V power supply with its chip area of only 0.372 ×0.419 mm^2.