Página 1 dos resultados de 331 itens digitais encontrados em 0.009 segundos

Authentication and Data Hiding Using a Hybrid ROI-Based Watermarking Scheme for DICOM Images

Al-Qershi, Osamah M.; Khoo, Bee Ee
Fonte: Springer-Verlag Publicador: Springer-Verlag
Tipo: Artigo de Revista Científica
Português
Relevância na Pesquisa
46.39%
Authenticating medical images using watermarking techniques has become a very popular area of research, and some works in this area have been reported worldwide recently. Besides authentication, many data-hiding techniques have been proposed to conceal patient’s data into medical images aiming to reduce the cost needed to store data and the time needed to transmit data when required. In this paper, we present a new hybrid watermarking scheme for DICOM images. In our scheme, two well-known techniques are combined to gain the advantages of both and fulfill the requirements of authentication and data hiding. The scheme divides the images into two parts, the region of interest (ROI) and the region of non-interest (RONI). Patient’s data are embedded into ROI using a reversible technique based on difference expansion, while tamper detection and recovery data are embedded into RONI using a robust technique based on discrete wavelet transform. The experimental results show the ability of hiding patient’s data with a very good visual quality, while ROI, the most important area for diagnosis, is retrieved exactly at the receiver side. The scheme also shows some robustness against certain levels of salt and pepper and cropping noise.

Set theoretic framework for multimedia security and data hiding: applications to watermarking, steganography, fingerprinting, and beyond

Altun, H. Oktay (1978 - ); Bocko, Mark Frederick (1956 - ); Sharma, Gaurav
Fonte: University of Rochester Publicador: University of Rochester
Tipo: Tese de Doutorado Formato: Illustrations:ill.; Number of Pages:xxx, 225 leaves
Português
Relevância na Pesquisa
56.13%
Thesis (Ph. D.)--University of Rochester. Dept. of Electrical and Computer Engineering, 2012. ; The digital revolution is affecting our daily activities, changing our habits and indeed reshaping cultures around the world. The intellectual products of today are now primarily created and distributed in digital format. Furthermore, the Internet has become a pervasive communication and sharing network. All of these factors naturally have led to concerns over the security of digital information. Among the many proposed solutions to such concerns, digital watermarking has proven to be unique by its not requiring a safe auxiliary communication channel. However, proposed watermarking techniques and attacks against such methods make the watermarking problem dynamic, complicated, and challenging. We show that several of the requirements in watermarking applications can be mapped onto convex constraints or can be closely approximated as convex constraints. These include watermark detectability, robustness to added noise, multiple watermark detectability, imperceptibility, robustness against lossy compression, robustness against lowpass filtering attacks, robustness against non-linear soft/hard wavelet shrinkage denoising attacks...

Marcas d\'água de autenticação para imagens binárias: marcas reversíveis e marcas para o padrão JBIG2.; Authentication watermaking techniques for binary images: reversible watermarks and watermarks for JBIG2.

Pamboukian, Sergio Vicente Denser
Fonte: Biblioteca Digitais de Teses e Dissertações da USP Publicador: Biblioteca Digitais de Teses e Dissertações da USP
Tipo: Tese de Doutorado Formato: application/pdf
Publicado em 01/06/2007 Português
Relevância na Pesquisa
46.54%
Esteganografia é uma técnica utilizada para ocultar uma informação secreta dentro de outro tipo de informação sem perda de qualidade da informação hospedeira e com o objetivo de extrair a informação posteriormente. Esteganografia reversível permite a exata restauração (sem perda) do sinal hospedeiro original após a extração da informação oculta. Várias ténicas reversíveis têm sido desenvolvidas, mas nenhuma delas parece ser apropriada para imagens binárias. Uma técnica de marca d\'água faz uso de técnicas esteganográficas para inserir informação em uma imagem hospedeira, com o intuito de fazer uma asserção sobre a imagem no futuro. Uma marca d\'água de autenticação (AWT) insere uma informação oculta na imagem com a intenção de detectar qualquer alteração acidental ou maliciosa na imagem. Uma AWT normalmente usa criptografia de chave secreta ou chave pública para computar a assinatura de autenticação da imagem, inserindo-a na própria imagem. JBIG2 é um padrão internacional para compressão de imagens binárias (com ou sem perda). Ele decompõe a imagem em várias regiões (texto, meio-tom e genérica) e codifica cada região usando o método mais apropriado. A criação de AWTs seguras para imagens binárias comprimidas é um importante problema prático. Porém...

A Data Hiding Technique to Synchronously Embed Physiological Signals in H.264/AVC Encoded Video for Medicine Healthcare

Peña, Raul; Ávila, Alfonso; Muñoz, David; Lavariega, Juan
Fonte: Hindawi Publishing Corporation Publicador: Hindawi Publishing Corporation
Tipo: Artigo de Revista Científica
Português
Relevância na Pesquisa
46.35%
The recognition of clinical manifestations in both video images and physiological-signal waveforms is an important aid to improve the safety and effectiveness in medical care. Physicians can rely on video-waveform (VW) observations to recognize difficult-to-spot signs and symptoms. The VW observations can also reduce the number of false positive incidents and expand the recognition coverage to abnormal health conditions. The synchronization between the video images and the physiological-signal waveforms is fundamental for the successful recognition of the clinical manifestations. The use of conventional equipment to synchronously acquire and display the video-waveform information involves complex tasks such as the video capture/compression, the acquisition/compression of each physiological signal, and the video-waveform synchronization based on timestamps. This paper introduces a data hiding technique capable of both enabling embedding channels and synchronously hiding samples of physiological signals into encoded video sequences. Our data hiding technique offers large data capacity and simplifies the complexity of the video-waveform acquisition and reproduction. The experimental results revealed successful embedding and full restoration of signal's samples. Our results also demonstrated a small distortion in the video objective quality...

Securing SQLJ Source Codes from Business Logic Disclosure by Data Hiding Obfuscation

Sivadasan, Praveen; Lal, P. Sojan
Fonte: Universidade Cornell Publicador: Universidade Cornell
Tipo: Artigo de Revista Científica
Publicado em 22/05/2012 Português
Relevância na Pesquisa
46.31%
Information security is protecting information from unauthorized access, use, disclosure, disruption, modification, perusal and destruction. CAIN model suggest maintaining the Confidentiality, Authenticity, Integrity and Non-repudiation (CAIN) of information. Oracle 8i, 9i and 11g Databases support SQLJ framework allowing embedding of SQL statements in Java Programs and providing programmer friendly means to access the Oracle database. As cloud computing technology is becoming popular, SQLJ is considered as a flexible and user friendly language for developing distributed applications in grid architectures. SQLJ source codes are translated to java byte codes and decompilation is generation of source codes from intermediate byte codes. The intermediate SQLJ application byte codes are open to decompilation, allowing a malicious reader to forcefully decompile it for understanding confidential business logic or data from the codes. To the best of our knowledge, strong and cost effective techniques exist for Oracle Database security, but still data security techniques are lacking for client side applications, giving possibility for revelation of confidential business data. Data obfuscation is hiding the data in codes and we suggest enhancing the data security in SQLJ source codes by data hiding...

Data Hiding in Video using Triangularization LSB Technique

Acharya, Subhashri; Srimany, Pramita; Kundu, Sanchari; Dastidar, JayatiGhosh
Fonte: Universidade Cornell Publicador: Universidade Cornell
Tipo: Artigo de Revista Científica
Publicado em 18/07/2015 Português
Relevância na Pesquisa
46.36%
The importance of data hiding in the field of Information Technology is a widely accepted. The challenge is to be able to pass information in a manner that the very existence of the message is unknown in order to repel attention of the potential attacker. Steganography is a technique that has been widely used to achieve this objective. However Steganography is often found to be lacking when it comes to hiding bulk data. Attempting to hide data in a video overcomes this problem because of the large sized cover object (video) as compared to an image in the case of steganography. This paper attempts to propose a scheme using which data can be hidden in a video. We focus on the Triangularization method and make use of the Least Significant Bit (LSB) technique in hiding messages in a video.

Quantum data hiding in the presence of noise

Lupo, Cosmo; Wilde, Mark M.; Lloyd, Seth
Fonte: Universidade Cornell Publicador: Universidade Cornell
Tipo: Artigo de Revista Científica
Publicado em 21/07/2015 Português
Relevância na Pesquisa
46.52%
When classical or quantum information is broadcast to separate receivers, there exist codes that encrypt the encoded data such that the receivers cannot recover it when performing local operations and classical communication, but they can decode reliably if they bring their systems together and perform a collective measurement. This phenomenon is known as quantum data hiding and hitherto has been studied under the assumption that noise does not affect the encoded systems. With the aim of applying the quantum data hiding effect in practical scenarios, here we define the data-hiding capacity for hiding classical information using a quantum channel. With this notion, we establish a regularized upper bound on the data hiding capacity of any quantum broadcast channel and we prove that coherent-state encodings have a strong limitation on their data hiding rates. We then prove a lower bound on the data hiding capacity of channels that map the maximally mixed state to the maximally mixed state (we call these channels "mictodiactic"---they can be seen as a generalization of unital channels when the input and output spaces are not necessarily isomorphic) and argue how to extend this bound to generic channels and to more than two receivers.; Comment: 12 pages

Multiparty data hiding of quantum information

Hayden, Patrick; Leung, Debbie; Smith, Graeme
Fonte: Universidade Cornell Publicador: Universidade Cornell
Tipo: Artigo de Revista Científica
Publicado em 20/07/2004 Português
Relevância na Pesquisa
46.42%
We present protocols for multiparty data hiding of quantum information that implement all possible threshold access structures. Closely related to secret sharing, data hiding has a more demanding security requirement: that the data remain secure against unrestricted LOCC attacks. In the limit of hiding a large amount of data, our protocols achieve an asymptotic rate of one hidden qubit per local physical qubit. That is, each party holds a share that is the same size as the hidden state to leading order, with accuracy and security parameters incurring an overhead that is asymptotically negligible. The data hiding states have very unusual entanglement properties, which we briefly discuss.; Comment: 14 pages, 1 figure, 2 appendices

Quantumness of correlations, quantumness of ensembles and quantum data hiding

Piani, Marco; Narasimhachar, Varun; Calsamiglia, John
Fonte: Universidade Cornell Publicador: Universidade Cornell
Tipo: Artigo de Revista Científica
Português
Relevância na Pesquisa
46.35%
We study the quantumness of correlations for ensembles of bi- and multi-partite systems and relate it to the task of quantum data hiding. Quantumness is here intended in the sense of minimum average disturbance under local measurements. We consider a very general framework, but focus on local complete von Neumann measurements as cause of the disturbance, and, later on, on the trace-distance as quantifier of the disturbance. We discuss connections with entanglement and previously defined notions of quantumness of correlations. We prove that a large class of quantifiers of the quantumness of correlations are entanglement monotones for pure bipartite states. In particular, we define an entanglement of disturbance for pure states, for which we give an analytical expression. Such a measure coincides with negativity and concurrence for the case of two qubits. We compute general bounds on disturbance for both single states and ensembles, and consider several examples, including the uniform Haar ensemble of pure states, and pairs of qubit states. Finally, we show that the notion of ensemble quantumness of correlations is most relevant in quantum data hiding. Indeed, while it is known that entanglement is not necessary for a good quantum data hiding scheme...

Quantum Data Hiding

DiVincenzo, David P.; Leung, Debbie W.; Terhal, Barbara M.
Fonte: Universidade Cornell Publicador: Universidade Cornell
Tipo: Artigo de Revista Científica
Publicado em 16/03/2001 Português
Relevância na Pesquisa
46.48%
We expand on our work on Quantum Data Hiding -- hiding classical data among parties who are restricted to performing only local quantum operations and classical communication (LOCC). We review our scheme that hides one bit between two parties using Bell states, and we derive upper and lower bounds on the secrecy of the hiding scheme. We provide an explicit bound showing that multiple bits can be hidden bitwise with our scheme. We give a preparation of the hiding states as an efficient quantum computation that uses at most one ebit of entanglement. A candidate data hiding scheme that does not use entanglement is presented. We show how our scheme for quantum data hiding can be used in a conditionally secure quantum bit commitment scheme.; Comment: 19 pages, IEEE style, 8 figures, submitted to IEEE Transactions on Information Theory

Reversible and Irreversible Data Hiding Technique

Sarkar, Tanmoy; Sanyal, Sugata
Fonte: Universidade Cornell Publicador: Universidade Cornell
Tipo: Artigo de Revista Científica
Português
Relevância na Pesquisa
46.38%
Steganography (literally meaning covered writing) is the art and science of embedding secret message into seemingly harmless message. Stenography is practice from olden days where in ancient Greece people used wooden blocks to inscribe secret data and cover the date with wax and write normal message on it. Today stenography is used in various field like multimedia, networks, medical, military etc. With increasing technology trends steganography is becoming more and more advanced where people not only interested on hiding messages in multimedia data (cover data) but also at the receiving end they are willing to obtain original cover data without any distortion after extracting secret message. This paper will discuss few irreversible data hiding techniques and also, some recently proposed reversible data hiding approach using images.; Comment: 4 pages, 3 figures

A Survey on Various Data Hiding Techniques and their Comparative Analysis

Kayarkar, Harshavardhan; Sanyal, Sugata
Fonte: Universidade Cornell Publicador: Universidade Cornell
Tipo: Artigo de Revista Científica
Publicado em 09/06/2012 Português
Relevância na Pesquisa
46.37%
With the explosive growth of internet and the fast communication techniques in recent years the security and the confidentiality of the sensitive data has become of prime and supreme importance and concern. To protect this data from unauthorized access and tampering various methods for data hiding like cryptography, hashing, authentication have been developed and are in practice today. In this paper we will be discussing one such data hiding technique called Steganography. Steganography is the process of concealing sensitive information in any media to transfer it securely over the underlying unreliable and unsecured communication network. Our paper presents a survey on various data hiding techniques in Steganography that are in practice today along with the comparative analysis of these techniques.; Comment: 9 pages, 1 table

An LSB Data Hiding Technique Using Prime Numbers

Dey, Sandipan; Abraham, Ajith; Sanyal, Sugata
Fonte: Universidade Cornell Publicador: Universidade Cornell
Tipo: Artigo de Revista Científica
Publicado em 29/03/2010 Português
Relevância na Pesquisa
46.35%
In this paper, a novel data hiding technique is proposed, as an improvement over the Fibonacci LSB data-hiding technique proposed by Battisti et al. First we mathematically model and generalize our approach. Then we propose our novel technique, based on decomposition of a number (pixel-value) in sum of prime numbers. The particular representation generates a different set of (virtual) bit-planes altogether, suitable for embedding purposes. They not only allow one to embed secret message in higher bit-planes but also do it without much distortion, with a much better stego-image quality, and in a reliable and secured manner, guaranteeing efficient retrieval of secret message. A comparative performance study between the classical Least Significant Bit (LSB)method, the Fibonacci LSB data-hiding technique and our proposed schemes has been done. Analysis indicates that image quality of the stego-image hidden by the technique using Fibonacci decomposition improves against that using simple LSB substitution method, while the same using the prime decomposition method improves drastically against that using Fibonacci decomposition technique. Experimental results show that, the stego-image is visually indistinguishable from the original cover-image.; Comment: 6 Pages...

A reversible high embedding capacity data hiding technique for hiding secret data in images

Kumar, P. Mohan; Shunmuganathan, K. L.
Fonte: Universidade Cornell Publicador: Universidade Cornell
Tipo: Artigo de Revista Científica
Publicado em 09/04/2010 Português
Relevância na Pesquisa
46.3%
As the multimedia and internet technologies are growing fast, the transmission of digital media plays an important role in communication. The various digital media like audio, video and images are being transferred through internet. There are a lot of threats for the digital data that are transferred through internet. Also, a number of security techniques have been employed to protect the data that is transferred through internet. This paper proposes a new technique for sending secret messages securely, using steganographic technique. Since the proposed system uses multiple level of security for data hiding, where the data is hidden in an image file and the stego file is again concealed in another image. Previously, the secret message is being encrypted with the encryption algorithm which ensures the achievement of high security enabled data transfer through internet.; Comment: IEEE Publication format, International Journal of Computer Science and Information Security, IJCSIS, Vol. 7 No. 3, March 2010, USA. ISSN 1947 5500, http://sites.google.com/site/ijcsis/

Quantum data hiding with spontaneous parameter down-conversion

Guo, Guang-Can; Guo, Guo-Ping
Fonte: Universidade Cornell Publicador: Universidade Cornell
Tipo: Artigo de Revista Científica
Português
Relevância na Pesquisa
46.33%
Here we analyze the practical implication of the existing quantum data hiding protocol with Bell states produced with optical downconverter. We show that the uncertainty for the producing of the Bell states with spontaneous parameter down-conversion should be taken into account, because it will cause serious trouble to the hider encoding procedure. A set of extended Bell states and a generalized Bell states analyzer are proposed to describe and analyze the possible states of two photons distributing in two paths. Then we present a method to integrate the above uncertainty of Bell states preparation into the dating hiding procedure, when we encode the secret with the set of extended Bell states. These modifications greatly simplify the hider's encoding operations, and thus paves the way for the implementation of quantum data hiding with present-day quantum optics.; Comment: 4 pages, 1 figure, adding some analyse for security proof, to be appear in Phys. Rev. A

Data Hiding Techniques Using Prime and Natural Numbers

Dey, Sandipan; Abraham, Ajith; Bandyopadhyay, Bijoy; Sanyal, Sugata
Fonte: Universidade Cornell Publicador: Universidade Cornell
Tipo: Artigo de Revista Científica
Publicado em 18/03/2010 Português
Relevância na Pesquisa
46.46%
In this paper, a few novel data hiding techniques are proposed. These techniques are improvements over the classical LSB data hiding technique and the Fibonacci LSB data-hiding technique proposed by Battisti et al. \cite{r1}. The classical LSB technique is the simplest, but using this technique it is possible to embed only in first few bit-planes, since image quality becomes drastically distorted when embedding in higher bit-planes. Battisti et al. \cite{r1} proposed an improvement over this by using Fibonacci decomposition technique and generating a different set of virtual bit-planes all together, thereby increasing the number of bit-planes. In this paper, first we mathematically model and generalize this particular approach of virtual bit-plane generation. Then we propose two novel embedding techniques, both of which are special-cases of our generalized model. The first embedding scheme is based on decomposition of a number (pixel-value) in sum of prime numbers, while the second one is based on decomposition in sum of natural numbers. Each of these particular representations generates a different set of (virtual) bit-planes altogether, suitable for embedding purposes. They not only allow one to embed secret message in higher bit-planes but also do it without much distortion...

An LSB Data Hiding Technique Using Natural Numbers

Dey, Sandipan; Abraham, Ajith; Sanyal, Sugata
Fonte: Universidade Cornell Publicador: Universidade Cornell
Tipo: Artigo de Revista Científica
Publicado em 20/03/2010 Português
Relevância na Pesquisa
46.4%
In this paper, a novel data hiding technique is proposed, as an improvement over the Fibonacci LSB data-hiding technique proposed by Battisti et al,based on decomposition of a number (pixel-value) in sum of natural numbers. This particular representation again generates a different set of (virtual) bit-planes altogether, suitable for embedding purposes. We get more bit-planes than that we get using Prime technique.These bit-planes not only allow one to embed secret message in higher bit-planes but also do it without much distortion, with a much better stego-image quality, and in a reliable and secured manner, guaranteeing efficient retrieval of secret message. A comparative performance study between the classical Least Significant Bit(LSB) method, the Fibonacci LSB data-hiding technique and the proposed schemes indicate that image quality of the stego-image hidden by the technique using the natural decomposition method improves drastically against that using Prime and Fibonacci decomposition technique. Experimental results also illustrate that, the stego-image is visually indistinguishable from the original cover-image. Also we show the optimality of our technique.; Comment: 6 Pages, 5 Figures, IEEE Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing...

The Art of Data Hiding with Reed-Solomon Error Correcting Codes

Ishengoma, Fredrick R.
Fonte: Universidade Cornell Publicador: Universidade Cornell
Tipo: Artigo de Revista Científica
Publicado em 18/11/2014 Português
Relevância na Pesquisa
46.35%
With the tremendous advancements in technology and the Internet, data security has become a major issue around the globe. To guarantee that data is protected and does not go to an unintended endpoint, the art of data hiding (steganography) emerged. Steganography is the art of hiding information such that it is not detectable to the naked eye. Various techniques have been proposed for hiding a secret message in a carrier document. In this paper, we present a novel design that applies Reed-Solomon (RS) error correcting codes in steganographic applications. The model works by substituting the redundant RS codes with the steganographic message. The experimental results show that the proposed design is satisfactory with the percentage of decoded information 100% and percentage of decoded secret message 97. 36%. The proposed model proved that it could be applied in various steganographic applications.

Data Hiding Techniques using number decompositions

Borgohain, Rajdeep
Fonte: Universidade Cornell Publicador: Universidade Cornell
Tipo: Artigo de Revista Científica
Publicado em 19/06/2012 Português
Relevância na Pesquisa
46.51%
Data hiding is the art of embedding data into digital media in a way such that the existence of data remains concealed from everyone except the intended recipient. In this paper, we discuss the various Least Significant Bit (LSB) data hiding techniques. We first look at the classical LSB data hiding technique and the method to embed secret data into cover media by bit manipulation. We also take a look at the data hiding technique by bit plane decomposition based on Fibonacci numbers. This method generates more bit planes which allows users to embed more data into the cover image without causing significant distortion. We also discuss the data hiding technique based on bit plane decomposition by prime numbers and natural numbers. These methods are based on mapping the sequence of image bit size to the decomposed bit number to hide the intended information. Finally we present a comparative analysis of these data hiding techniques.; Comment: 5 pages, 1 figure, 4 tables

A Blind Data Hiding Technique with Error Correction Abilities and a High Embedding Payload

Liang,H. Y.; Cheng,C. H.; Yang,C. Y.; Zhang,K. F.
Fonte: UNAM, Centro de Ciencias Aplicadas y Desarrollo Tecnológico Publicador: UNAM, Centro de Ciencias Aplicadas y Desarrollo Tecnológico
Tipo: Artigo de Revista Científica Formato: text/html
Publicado em 01/04/2013 Português
Relevância na Pesquisa
66.25%
Least significant bit (LSB) embedding is a simple steganographic technique used in the spatial domain that involves replacing the LSB of each pixel in the cover work with the information bits being hidden to achieve information secrecy. However, considering the current prevalence of information theft and sabotage, the stego image produced using LSB embedding cannot prevent malicious illegal acts. Therefore, this study proposes a blind data hiding technique that combines block-coded modulation (BCM) codes with LSB embedding. The proposed method not only provides error correction capabilities to prevent errors during the extraction process, but also has a superior embedding payload. The peak signal noise ratio (PSNR) exceeds 40 dB by using our proposed method. Regarding the simulation results, the proposed method provides a superior PSNR compared to LSB embedding and a higher embedding payload than that offered by other steganographic techniques with error correction capabilities.