Fig 2 - uploaded by A. A. Zaidan
Content may be subject to copyright.
Types of Steganography. 

Types of Steganography. 

Source publication
Article
Full-text available
The rapid development of multimedia and internet allows for wide distribution of digital media data. It becomes much easier to edit, modify and duplicate digital information besides that, digital documents are also easy to copy and distribute, therefore it will be faced by many threats. It is a big security and privacy issue. Another problem with d...

Context in source publication

Context 1
... will then be a discussion of some specific techniques for hiding information in a variety of files and the attacks that may be used to bypass steganography. Fig 2 shows how information hiding can be broken down into different areas. Steganography can be used to hide a message intended for later retrieval by a specific individual or group. ...

Similar publications

Conference Paper
Full-text available
Nowadays, with the help of advanced technologies, an illegal copy of digital contents can be shared easily. Which rise copyright and authentication problems. Digital text documents are generated and shared daily through different internet technologies such as the cloud, etc. The protection of these documents is a challenging task for researchers. I...
Article
Full-text available
Watermarking protocols are designed for tracing illegal distributors when unauthorized copies are found. So far, most of the proposed schemes set up two or more watermarks embedded to a copy by the seller before it was sold. The main potential concerns of multiple watermarking are the image quality would be damaged and any earlier embedded watermar...
Conference Paper
Full-text available
Digital watermarking have been used for maintaining copyright information of the digital media for a decade. Digital watermarking is a technique used for embedding copyright information in the media files. The media file could be an image, an audio, a video, or a text. Steganography have been used in the Digital watermarking application. Steganogra...
Article
Full-text available
Benchmarking digital watermarking algorithms is not an easy task because different applications of digital watermarking often have very different sets of requirements and trade-offs between conflicting requirements. While there have been some general-purpose digital watermarking benchmarking systems available, they normally do not support complicat...

Citations

... Robustness refers to the ability of the embedded data to remain intact if the stego-system undergoes transformation, such as linear and non-linear filtering ;addition of random noise;and scaling, rotation and compression [21]. ...
... The embedded information is imperceptible if an average human is unable to distinguish between the images that do contain information and those that do not [21]. ...
... This is because an counts the number of 11s in the binary expansion of the integer n and b n is +1 if a n is even and −1 if a n is odd [68]. A flowchart of both the sender's and the receiver's algorithm is presented in then the rest of the secret data is embedded in the unvisited pixels in order which are 2, 3, 5, 6,8,9,11,12,14,15,17,18,20,21,23, ... . Second, As with regards to the color plane cycling, a different sequence is used, which is the Rudin-Shapiro sequence. ...
Thesis
Full-text available
Information security is the major concern now a days since number of internet users is increasing and secret information is getting shared every second. This has also hiked cyber crimes and threats of malicious access. So, to reduce the risk of private message detection, data security techniques should be implemented. Cryptography and steganography is a technique that is widely used to secure data so that data can not be accessed by unauthorized persons. Cryptography is the science of converting ordinary plain text into unintelligible text and vice-versa; on the other hand steganography is the art of hiding secret data in a cover medium such as videos, audios and images in order to avoid detection. The combination of both cryptography and steganography is widely proposed in previous studies because of its reliability in providing multiple protection. One of the cryptographic methods that have been used to secure the data is Data Encryption Standard (DES). This algorithm often implemented for the encryption process in an Automatic Teller Machine (ATM) and Subscriber Identity Module (SIM) card operator worldwide. This thesis proposes a double-layer secure message scheme, the first layer is of a cryptographic nature that encrypts the private message using Triple Data Encryption Standard (3DES), while the second layer is of a steganographic nature using different cover images as carriers, employing a number of mathematical sequences that determine the color-plane cycling for least significant bit (LSB) embedding. Arithmetic sequence is employed to determine the order of the cover image’s pixels in which the enciphered message is embedded in, whereas the specific color plane where the embedding occurs in the RGB pixel is based on a derived form of the Rudin-Shapiro sequence. For performance analysis, a number of metrics were calculated. The results show that the proposed scheme is well-suited for the purposes of message security and privacy.
... Confidentiality Information confidentiality prohibits unauthorised users to reach, utilise, copy or expose information when necessary [136,137]. Data confidentiality keeps information only for authorised people and systems [138,139]. Confidentiality ensures that only authorised people can gain access to confidential information. ...
Article
Electronic medical record (EMR) is currently a popular topic in e-health. EMR includes the health-related information of patients and forms the main factor of e-health applications. Moreover, EMR contains the legal records that are created in the medical centre and ambulatory environments. These records serve as the data source for electronic health record. Although hospitals utilise the EMR system, healthcare professionals experience difficultly in trusting this system. Studies devoted to EMR acceptance in hospitals are lacking, particularly those on the EMR system in the contexts of privacy and security concerns based on multi-criteria perspective. Thus, the current study proposes a decision support examination framework on how individual, security and privacy determinants influence the acceptance and use of EMR. The proposed framework is based on a multi-criteria perspective derived from healthcare professionals in Malaysia as frame of reference. The framework comprises four phases. The sub-factors of individual, security and privacy determinants were investigated in the two initial phases. Thereafter, the sub-factors were identified with uniform multi-criteria perspective to establish a decision matrix. The decision matrix used individual uniform as basis to cluster the sub-factors and user perspectives. Subsequently, a new ‘multi-criteria decision-making (MCDM) approach’ was adopted. Integrated technique for order of preference by similarity (TOPSIS) and analytic hierarchy process (AHP) were used as bases in employing the MCDM approach to rank each group of factors. K-means clustering was also applied to identify the critical factors in each group. Healthcare professionals in Malaysia were selected as respondents and 100 questionnaires were distributed to those employed in 5 Malaysian public hospitals. A conceptual model adapted from Unified theory of acceptance and use of technology 2 (UTAUT2) was employed to clarify the connection between individual, privacy and security determinants and EMR system acceptance and use in the selected context. After collecting the data sets (363), structural equation modelling was used to analyse data related to EMR acceptance and use. Results are as follows. (1) Five determinants (i.e. data integrity, confidentiality, non-repudiation, facilitating conditions and effort expectancy) exerted an explicit and important positive effect on EMR acceptance and use. (2) Three determinants (i.e. unauthorised, error and secondary use) exerted a direct and significant negative effect on EMR acceptance and use. (3) Three other determinants (i.e. authentication, performance expectancy and habit) insignificantly affected the behavioural intention of healthcare experts in Malaysia to use EMR.
... The World Wide Web has evolved significantly in different areas, especially multimedia technologies, involving extensive use of digital data such as images and videos. The information that vehicle in this world is a large database that requires an efficient way to meet the intellectual property [1][2]; this condition has become an important factor in the emergence of this technology. The digital image watermarking has been a reliable way to ensure that intellectual property [3][4]. ...
... Histogram equalization (1) 27.439 (2) 27.268 In this paper a robust watermarking method for copyright protection has been proposed. ...
Conference Paper
Full-text available
Over the last few years, development of internet and technology of media, the protection of have become very important. To protect multimedia data against illegal copying and transferring, the insertion of a signal (digital signature, watermark) has become a duty without modifying quality of the original image, the goal of this operation is to identify the owner and protect his intellectual property. Digital watermarking has been proposed as a solution to solving the problem by introducing invisible data (watermark) into original image. In this paper, we propose a study of digital images watermarking. This study is achieved by inserting watermark in different coefficients of DWT (LH, HL, HH) using SVD transform by searching the optimal block that have the maximum entropy which can be used to insert the watermark in original image. The experimental results show the different results of PSNR for each coefficient of DWT and the robustness against most attacks.
... The new information which is named watermark may contain random numbers or another special image that represents the owner. This watermark must be invisible and the viewer cannot differentiate between the original image and the watermarked image [22] and [23]. The watermark must be robust enough to withstand certain types of attacks. ...
Conference Paper
Full-text available
In digital world, we need to prove the real owner of any important digital image. In this article, we present a novel watermarking technique that depends on separating the three different colors from each other. Then, the edge energy of each separate color is computed. The color that contains the maximum edge energy is chosen to hide the watermark within it. The watermark is a degraded version of the original image which will be protected. The watermark pixels are rearranged depending on certain security key. Furthermore, the original image is divided into many blocks. These blocks are rearranged using another security key to harden the process of detecting the watermark. Each pixel of the degraded version of the image is hidden in certain corresponding block of the image. By this procedure, the watermark is very robust and it can prove the ownership for the real owner regardless the different attacks that it may be happened.
... Programmers want their application to be safe anywhere without the need to build ethic relations with their customers [23]. In this system a solution is suggested for this problem. ...
Conference Paper
Full-text available
A Previously traditional methods were sufficient to protect the information, since it is simplicity in the past does not need complicated methods but with the progress of information technology, it become easy to attack systems, and detection of hiding methods became necessary to find ways parallel with the differing methods used by hackers, so the embedding methods could be under surveillance from system managers in an organization that requires the high level of security. This fact requires researches on new hiding methods and cover objects which hidden information is embedded in. It is the result from the researches to embed information in executable files, but when will use the executable file for cover they have many challenges must be taken into consideration which is any changes made to the file will be firstly detected by untie viruses; secondly the functionality of the file is not still functioning. In this paper, a new information hiding system is presented. The aim of the proposed system is to hide information (data file) after end of header file within execution file (EXEfile) to make sure changes made to the file will not be detected by universe and the functionality of the exe.file is still functioning after hiding process. Meanwhile, since the cover file might be used to identify hiding information, the proposed system considers overcoming this dilemma by using the execution file as a cover file.
... For example, TCP/IP packets are used to transport information over the internet. The pocket headers have unused space or other features that can be manipulated to hide information [21]. ...
... An example is in the layout of code distribution in a program or the layout of electronic circuits on a board. This type of 'marking' can be used to uniquely identify the design origin and can not be removed without significant change to the work [21].Table 1 Weaknesses of Method for Hiding Information. From the table above, it is clear that the main weaknesses of those methods are the size of the hidden data depends on the size of the cover file and any changes made are easily detected by anti virus software. ...
Article
Full-text available
With the rapid development of various multimedia technologies, more and more multimedia data are generated and transmitted in the medical, commercial, and military fields, which may include some sensitive information which should not be accessed by or can only be partially exposed to the general users. Therefore, security and privacy has become an important, Another problem with digital document and video is that undetectable modifications can be made with very simple and widely available equipment, which put the digital material for evidential purposes under question .With the large flood of information and the development of the digital format Information hiding considers one of the techniques which used to protect the important information. The main goals for this paper, provides a general overview of the New Classification Methods for Hiding Information into Two Parts: Multimedia Files and Non Multimedia Files.
... Research in information hiding has tremendous increased during the past decade with commercial interests driving the field [5],[7],[8]. Although the art of concealment " hidden information " as old as the history, but the emergence of computer and the evolution of sciences and techniques breathe life again in this art with the use of new ideas, techniques, drawing on the computer characteristics in the way representation of the data, well-known computer representation of all data including ( Multimedia) is binary these representations are often the digital levels and areas and change values-aware of slight not aware or felt by Means sensual of human such as hearing, sight, the advantage use of these properties to hide data in multimedia by replace the values of these sites to the values of data to be hidden, taking into account the acceptable limits for the changeover, and not exceeded to prevent degradation media container with a change becomes aware and felt by human [21]. It should be noted here that although the art of hidden information come in the beginning of the computer and its techniques However, the seriousness of the work in the stenography as a stand-alone science started in 1995. ...
... Robustness refers to the ability of the embedded data to remain intact if the stego-system undergoes transformation, such as linear and non-linear filtering; addition of random noise; and scaling, rotation, and loose compression [21]. ...
... The embedded information is imperceptible if an average human subject is unable to distinguish between carriers that do contain hidden information and those that do not. It is important that the embedding occurs without a significant degradation or loss of perceptual quality of the cover [14],[21]. ...
Article
Full-text available
The rapid development of multimedia and internet allows for wide distribution of digital media data. It becomes much easier to edit, modify and duplicate digital information .Besides that, digital documents are also easy to copy and distribute, therefore it will be faced by many threats. It is a big security and privacy issue, it become necessary to find appropriate protection because of the significance, accuracy and sensitivity of the information. Steganography considers one of the techniques which used to protect the important information. The main goals for this paper, to recognize the researchers for the main fundamentals of steganography. In this paper provides a general overview of the following subject areas: Steganography types, General Steganography system, Characterization of Steganography Systems and Classification of Steganography Techniques.
Article
In the age of technology and science advancement, even powerful governments are not immune from hackers and spies’ influence. Their most important and sensitive information is always being heard and subject to disclosure. Steganography is one of the main ways to improve security and data protection when transferring data over the Web. Steganography’s primary purpose is to convey messages in communication channels through text, image, audio, and video. From the above media, the text files usually use less memory for storage. Text-based steganography methods can be used in Web page texts and plain texts. In Web, the possibility of broadcasting texts (e.g., HTML codes and Hashtags in Social networks) with and without hidden information is the same. It means that the provided steganography system has high security and a Web pages’ viewer cannot realize what hidden information has been transmitted. To hide text, one can refer to the various methods, such as blank space, feature repetition, and the arrangement of elements on Web pages. In these methods, the secret message is hidden using the Web pages’ properties in the code or in the content. In this research, to increase the security of Persian messages transmitting on the networks, some text steganography methods are proposed. Experiments show the performance of the proposed methods.
Article
Full-text available
A review is conducted to deeply analyse and map the research landscape of current technologies in finger vein (FV) biometric authentication in medical systems into a coherent taxonomy. This research focuses on articles related to the keywords ‘biometrics’, ‘finger veins’ and ‘verification’ and their variations in three major databases, namely, Web of Science, ScienceDirect and IEEE Xplore. The final set of collected articles related to FV biometric authentication systems is divided into software- and hardware-based systems. In the first category, software development attempts are described. The experiment results, frameworks, algorithms and methods that perform satisfactorily are presented. Moreover, the experiences obtained from conducting these studies are discussed. In the second category, hardware development attempts are described. The final articles are discussed from three aspects, namely, (1) number of publications, (2) problem type, proposed solutions, best results and evaluation methods in the included studies and (3) available databases containing different scientific work collected from volunteers, such as staff and students. The basic characteristics of this emerging field are identified from the following aspects: motivations of using FV biometric technology in authentication systems, open challenges that impede the technology’s utility, authors’ recommendations and future research prospects. A new solution is proposed to address several issues, such as leakage of biometrics that leads to serious risks due to the use of stolen FV templates and various spoofing and brute-force attacks in decentralised network architectures in medical systems, including access points and various database nodes without a central point. This work contributes to literature by providing a detailed review of feasible alternatives and research gaps, thereby enabling researchers and developers to develop FV biometric authentication medical systems further. Insights into the importance of such a technology and its integration into different medical applications and fields are also provided.