Locally most-powerful detector for secret key estimation in spread spectrum image steganography

Author(s):  
Shalin P. Trivedi ◽  
Rajarathnam Chandramouli
2018 ◽  
Vol 14 (6) ◽  
pp. 753-763 ◽  
Author(s):  
Mohammed A. Fadhil Al-Husainy ◽  
Hamza Abbass A. Al-Sewadi

2019 ◽  
Vol 10 (4) ◽  
pp. 731 ◽  
Author(s):  
Mohammed Abbas Fadhil Al-Husainy ◽  
Diaa Mohammed Uliyan

Author(s):  
Anukul Pandey ◽  
Barjinder Singh Saini ◽  
Butta Singh ◽  
Neetu Sood

Signal processing technology comprehends fundamental theory and implementations for processing data. The processed data is stored in different formats. The mechanism of electrocardiogram (ECG) steganography hides the secret information in the spatial or transformed domain. Patient information is embedded into the ECG signal without sacrificing the significant ECG signal quality. The chapter contributes to ECG steganography by investigating the Bernoulli's chaotic map for 2D ECG image steganography. The methodology adopted is 1) convert ECG signal into the 2D cover image, 2) the cover image is loaded to steganography encoder, and 3) secret key is shared with the steganography decoder. The proposed ECG steganography technique stores 1.5KB data inside ECG signal of 60 seconds at 360 samples/s, with percentage root mean square difference of less than 1%. This advanced 2D ECG steganography finds applications in real-world use which includes telemedicine or telecardiology.


Author(s):  
Priyadharshini R ◽  
Priyadharshini V ◽  
Vijeletchumi R ◽  
Beaulah David

The Aim of this paper is to bolster security of the traditional cash dispenser machine (ATM) model. So a replacement is proposed that enhances the general expertise, usability and convenience of the group action at the ATM. ATM are wide used these days by the people however its exhausting to hold their ATM card all over. The user might forget their ATM PIN number. This paper is developed for identification and authentication of ATM users so creating face as key. Options like face recognition, image steganography and mobile application management are used for sweetening of privacy of users and security of accounts. Face recognition technology helps the machine to spot each and every user unambiguously. Image steganography is the technique used for the image of user by embedding it into an another image and keep. Its one among the ways utilized to guard the image of users from malicious attacks and hackers. The mobile application helps the particular account holders to supply permission to others to do the ATM transactions. The mobile application contains options like secret key and amount withdrawal to offer confirmation. It helps folks to access another person’s ATM account in emergency with their authentication. This utterly eliminates all the possibilities of fraud thanks to larceny and duplicity of the ATM cards. Moreover, the experiment is that the method in ATM security framework to enhance security and innovative ATM group action.


Sign in / Sign up

Export Citation Format

Share Document