scholarly journals A Weighted Stego Image Detector for Sequential LSB Replacement

Author(s):  
Andrew D. Ker

Steganography is a technique of concealing secret text or image within another image.In this paper, abetterand efficient steganography methodfor hiding imagesand/or text into a color image is proposed. The proposed techniqueis based on two irreversible methods of spatial domain Least Significant Bit (LSB) and Pixel Value Differencing and Modulus Function (PVDMF 1) and one Haar Wavelet Transformation of the frequency domain. The proposed method works in four stages: at the first stage, Haar Wavelet Transformation is applied on the input image and transformed Haar coefficients are obtained. At the second stage, Haar coefficients and secret image are converted into binary form, before applying the LSB replacement method on the green channel by replacing the first two Most Significant Bits (MSB) of the input image withthe last two LSB bits of the secret image. Inthe third stage, modified PVDMF 1 is applied on intermediate stego imagesafter hiding the image by dividing the image into two non-overlapping consecutive pixels of pixels for hiding text. Inthe fourth stage, Inverse Haar Wavelet Transformation is applied to get the stego image. The proposed method offers high hiding capabilitywith goodvisual quality. The visual quality of the stego image is measured by using three widely used objective quality assessment matrices PSNR, RMSE,and SSIM. Furthermore, Regular/Singular (RS) analysis is applied on stego imagesto check theirresistanceagainst RS attack. The hiding capacity and quality assessment results are compared with some existing methods. It is evidentfrom the comparison that the proposed processis superior in termsof visual quality and hiding capacity.


Author(s):  
Oladotun O. Okediran ◽  
Adeyemi A. Sijuade ◽  
Wajeed B. Wahab

Conventional voting techniques have been employed over the years in most elections. However, each of these techniques has attendant short comings. The existing conventional voting systems have been subjected to gross abuse and irregularities. Electronic voting (e-voting) which is emerging as an alternative to these conventional voting systems, though highly promising, is not also totally free of flaws; information security issues bordering on privacy, integrity and verifiability of the electronic ballots casted are still significant in most implementations of e-voting systems. In this paper, we developed a security scheme that was based on a hybrid Rivest-Sharma-Adleman (RSA) algorithm and Advance Encryption Standard (AES) algorithm with Least Significant Bit (LSB) replacement algorithm for securing ballot information in an e-voting system. An e-voting system with multiple voting channels which includes poll site voting, mobile voting and remote internet voting was developed in the contextual Nigerian scenario. The electronic ballots casted via the system during experimental usage were encrypted using the hybrid RSA-AES algorithm to circumvent the problems of privacy, integrity and verifiability associated with many e-voting systems. The encrypted ballots were then hidden using LSB replacement algorithm to improve their integrity. The image quality of the cover image used and stego image obtained from the security scheme developed was quantitatively assessed using Peak Signal to Noise Ratio (PSNR), Mean Square Error (MSE) and Correlation. Furthermore, a performance evaluation based on users' perception of the developed e-voting system showed that the system satisfied most of the generic security requirements for electronic voting.


1987 ◽  
Author(s):  
E. Bigler ◽  
F. Polack ◽  
S. Lowenthal

1999 ◽  
Author(s):  
Tom J. C. Bruijns ◽  
Robert F. Bury ◽  
Falko Busse ◽  
Andrew G. Davies ◽  
Arnold R. Cowen ◽  
...  

Author(s):  
Laura Falaschetti ◽  
Lorenzo Manoni ◽  
Romel Calero Fuentes Rivera ◽  
Danilo Pau ◽  
Gianfranco Romanazzi ◽  
...  

2015 ◽  
Vol 54 (35) ◽  
pp. 10467 ◽  
Author(s):  
Geng Wang ◽  
Fei Xing ◽  
Minsong Wei ◽  
Zheng You

2018 ◽  
Author(s):  
Andysah Putera Utama Siahaan ◽  
Solly Aryza

Steganography is related to the addition of information to a given medium (referred to as cover media) without making visible changes to it. Most of the proposed steganography techniques cannot be applied to store large-scale data. In the new technique for RGB image steganography, color intensity (R-G-B) is used to determine the number of bits you want to store in each pixel. Meanwhile, to improve the security of stored confidential files, cryptographic methods will be applied. The Paillier cryptosystem invented by Pascal Paillier in 1999 is a probabilistic asymmetric algorithm for public key cryptography. The security of the Paillier algorithm depends on the problem of calculating the n-residue class that is believed to be very difficult to compute. This problem is known as the Composite Residuosity (CR) and is the basis of this Paillier cryptosystem. The software created can save secret files into a digital image into a stego image. The secret file can be extracted out through the extraction process.


2020 ◽  
Author(s):  
Xinyang Ying ◽  
Guobing Zhou

Abstract The reversible data hiding allows original image to be completely recovered from the stego image when the secret data has been extracted, it is has drawn a lot of attentions from researchers. In this paper, a novel Taylor Expansion (TE) based stereo image reversible data hiding method is presented. Since the prediction accuracy is essential to the data hiding performance, a novel TE based predictor using correlations of two views of the stereo image is proposed. TE can fully exploit strong relationships between matched pixels in the stereo image so that the accuracy of the prediction can be improved. Then, histogram shifting is utilized to embed data to decrease distortion of stereo images, and multi-level hiding can increase embedding capacity. Experimental results show that the proposed method is superior to some existing data hiding methods considering embedding capacity and the quality of the stego stereo images.


Sign in / Sign up

Export Citation Format

Share Document