Loading...
Search for: steganography
0.009 seconds

    Steganography in textiles

    , Article 4th International Symposium on Information Assurance and Security, IAS 2008, Napoli, 8 September 2008 through 10 September 2008 ; 2008 , Pages 56-61 ; 9780769533247 (ISBN) Shirali Shahreza, S ; Shirali Shahreza, M ; Sharif University of Technology
    2008
    Abstract
    Covert exchange of information has been long a significant and highlighted affair. Numerous methods have been devised for the matter of which steganography is a popular one. Already applied in the past, the method has been massive used following the invention of computer. This paper discusses a new application of steganography in textiles in which information is hidden in the images on the clothes. In this way, information is first hidden by computer in images by a special method. Then the provided images are printed on clothes. The related information is extracted after scanning the images by relevant programs. © 2008 IEEE  

    Persian/arabic unicode text steganography

    , Article 4th International Symposium on Information Assurance and Security, IAS 2008, Napoli, 8 September 2008 through 10 September 2008 ; 2008 , Pages 62-66 ; 9780769533247 (ISBN) Shirali Shahreza, M ; Shirali Shahreza, S ; Sharif University of Technology
    2008
    Abstract
    Sending information secretly and communicating covertly have been of great interest for ages. On the other hand, text documents have been widely used and consequently various methods for hiding information in texts (Text Steganography) have been developed so far. In this paper a new method is proposed to hide information in digital Persian and Arabic Unicode texts. In Persian and Arabic, each letter can have four different shapes regarding to its position in the word. In this method by using this feature of Persian and Arabic languages and the way which documents are saved in the Unicode Standard, the information is hidden in Unicode text documents. This method has a good hiding capacity... 

    Text steganography by changing words spelling

    , Article 2008 10th International Conference on Advanced Communication Technology, Phoenix Park, 17 February 2008 through 20 February 2008 ; Volume 3 , 2008 , Pages 1912-1913 ; 17389445 (ISSN); 9788955191356 (ISBN) Shirali Shahreza, M ; Sharif University of Technology
    2008
    Abstract
    One of the important issues in security fields is hidden exchange of information. There are different methods for this purpose such as cryptography and steganography. Steganography is a method of hiding data within a cover media so that other individuals fail to realize their existence. In this paper a new method for steganography in English texts is proposed. In this method the US and UK spellings of words substituted in order to hide data in an English text. For example "color" has different spelling in UK (colour) and US (color). Therefore the data can be hidden in the text by substituting these words  

    Image steganalysis based on SVD and noise estimation: Improve sensitivity to spatial LSB embedding families

    , Article IEEE Region 10 Annual International Conference, Proceedings/TENCON, 21 November 2011 through 24 November 2011, Bali ; 2011 , Pages 1266-1270 ; 9781457702556 (ISBN) Diyanat, A ; Farhat, F ; Ghaemmaghami, S ; Sharif University of Technology
    2011
    Abstract
    We propose a novel image steganalysis method, based on singular value decomposition and noise estimation, for the spatial domain LSB embedding families. We first define a content independence parameter, DS, that is calculated for each LSB embedding rate. Next, we estimate the DS curve and use noise estimation to improve the curve approximation accuracy. It is shown that the proposed approach gives an estimate of the LSB embedding rate, as well as information about the existence of the embedded message (if any). The proposed method can effectively be applied to a wide range of the image LSB steganography families in spatial domain. To evaluate the proposed scheme, we applied the method to a... 

    LSB ++: An improvement to LSB + steganography

    , Article IEEE Region 10 Annual International Conference, Proceedings/TENCON, 21 November 2011 through 24 November 2011, Bali ; 2011 , Pages 364-368 ; 9781457702556 (ISBN) Ghazanfari, K ; Ghaemmaghami, S ; Khosravi, S. R ; Sharif University of Technology
    Abstract
    The Least Significant Bit (LSB) substitution is an old and simple data hiding method that could almost effortlessly be implemented in spatial or transform domain over any digital media. This method can be attacked by several steganalysis methods, because it detectably changes statistical and perceptual characteristics of the cover signal. A typical method for steganalysis of the LSB substitution is the histogram attack that attempts to diagnose anomalies in the cover image's histogram. A well-known method to stand the histogram attack is the LSB + steganography that intentionally embeds some extra bits to make the histogram look natural. However, the LSB + method still affects the perceptual... 

    Universal image steganalysis against spatial-domain steganography based on energy distribution of singular values

    , Article 7th International Conference on Information Technology and Application, ICITA 2011 ; 2011 , Pages 179-183 ; 9780980326741 (ISBN) Shojaei Hashemi, A ; Soltanian Zadeh, H ; Ghaemmagham, S ; Kamarei, M ; Sharif University of Technology
    Abstract
    A passive image steganalysis method is proposed to universally detect spatial-domain steganography schemes. It is shown to have better performance than universal steganalyzers known to be powerful in spatial domain, including the WFLogSv and the WAM methods. This level of accuracy is the result of improving the WFLogSv steganalyzer by considering a more comprehensive relationship between the singular values of each image block and the linear correlation of the rows and the columns. That is, instead of the closeness of the lower singular values to zero, the energy distribution of the singular values is investigated. An innovative measure is proposed for this investigation, which is inspired... 

    Closure of sets: A statistically hypersensitive system for steganalysis of least significant bit embedding

    , Article IET Signal Processing ; Volume 5, Issue 4 , July , 2011 , Pages 379-389 ; 17519675 (ISSN) Khosravirad, S. R ; Eghlidos, T ; Ghaemmaghami, S ; Sharif University of Technology
    2011
    Abstract
    This study introduces a new scheme for steganalysis of the least significant bit (LSB) embedding, based on the idea of closure of sets (CoS), which is independent of the type of cover signal, applicable to both spatial and transform domains. The CoS is referred to as some special subsets that could be found in a common space whose elements relate to higher-order statistical properties of the signal. The proposed scheme is used for steganalysis of the LSB steganography of greyscale TIFF and JPEG images and audio signals, employing a set of accurate and monotone features that are extracted based on the CoS definition. It is shown that significant improvement to the detection accuracy in... 

    A sparse representation-based wavelet domain speech steganography method

    , Article IEEE/ACM Transactions on Speech and Language Processing ; Volume 23, Issue 1 , 2015 , Pages 80-91 ; 23299290 (ISSN) Ahani, S ; Ghaemmaghami, S ; Wang, Z. J ; Sharif University of Technology
    Abstract
    In this paper, we present a novel speech steganography method using discrete wavelet transform and sparse decomposition to address the undetectability concern in speech steganography. The proposed speech steganography method exploits the sparse representation to embed secret messages into higher semantic levels of the cover signal, resulting in increased undetectability. The proposed method also yields improvements on both stego signal quality and embedding capacity, which are the two major requirements of a steganography algorithm. Our experimental results illustrate that the stego signals generated by the proposed method are perceptually indistinguishable from the original cover signals,... 

    Image steganography based on sparse decomposition in wavelet space

    , Article Proceedings 2010 IEEE International Conference on Information Theory and Information Security, ICITIS 2010, 17 December 2010 through 19 December 2010, Beijing ; 2010 , Pages 632-637 ; 9781424469406 (ISBN) Ahani, S ; Ghaemmaghami, S ; Sharif University of Technology
    Abstract
    Sparse decomposition of wavelet coefficients of cover image blocks for data hiding is addressed in this paper. By using the proposed algorithm, the embedded secret message can be reliably extracted without resorting to the original image. We use all four sub-images (LL, LH, HL and HH) of the 2D wavelet transform for data embedding without losing the image imperceptibility. An over-complete dictionary matrix is estimated by using the KSVD dictionary learning algorithm, and then the secret message bits are inserted in the sparse representation of the wavelet coefficients over the estimated dictionary. This is believed to be one of the first approaches to the image data hiding that uses the... 

    High capacity image steganography in wavelet domain

    , Article 2010 7th IEEE Consumer Communications and Networking Conference, CCNC 2010, 9 January 2010 through 12 January 2010, Las Vegas, NV ; 2010 ; 9781424451760 (ISBN) Sarreshtedari, S ; Ghaemmaghami, S ; Sharif University of Technology
    2010
    Abstract
    A new high capacity method for transform domain image steganography is introduced in this paper. The proposed steganography algorithm works on the wavelet transform coefficients of the original image to embed the secret data. As compared to current transform domain data hiding methods, this scheme can provide a larger capacity for data hiding without sacrificing the cover image quality. This is achieved through retaining integrity of the wavelet coefficients at high capacity embedding. This improvement to capacity-quality trading-off interrelation is analyzed in detailed and experimentally illustrated in the paper  

    Adaptive image steganography with mod-4 embedding using image contrast

    , Article 2010 7th IEEE Consumer Communications and Networking Conference, CCNC 2010, 9 January 2010 through 12 January 2010, Las Vegas, NV ; 2010 ; 9781424451760 (ISBN) Ramezani, M ; Ghaemmaghami, S ; Sharif University of Technology
    2010
    Abstract
    A new adaptive steganography method based on image contrast to improve the embedding capacity and imperceptibility of the stego images is presented. The method exploits the average difference between the gray level values of the pixels in 2x2 blocks of non-overlapping spatially and their mean gray level in order to select valid blocks for embedding. The method was tested on different gray scale images. Results show that our proposed approach provides larger embedding capacity, while being less detectable by steganalysis methods such as χ2 attack and machine learning steganalysis systems, as compared to some well-known adaptive and non-adaptive steganography algorithms  

    Secure steganography based on embedding capacity

    , Article International Journal of Information Security ; Volume 8, Issue 6 , 2009 , Pages 433-445 ; 16155262 (ISSN) Sajedi, H ; Jamzad, M ; Sharif University of Technology
    2009
    Abstract
    Mostly the embedding capacity of steganography methods is assessed in non-zero DCT coefficients. Due to unequal distribution of non-zero DCT coefficients in images with different contents, images with the same number of non-zero DCT coefficients may have different actual embedding capacities. This paper introduces embedding capacity as a property of images in the presence of multiple steganalyzers, and discusses a method for computing embedding capacity of cover images. Using the capacity constraint, embedding can be done more secure than the state when the embedder does not know how much data can be hidden securely in an image. In our proposed approach, an ensemble system that uses... 

    Steganography Based on Sparse Decomposition

    , Ph.D. Dissertation Sharif University of Technology Ahani, Soodeh (Author) ; Ghaem Maghami, Shahrokh (Supervisor)
    Abstract
    The goal of this thesis is using sparse decomposition to design secure steganography algorithms to insert secret data into the different cover signals. We propose data embedding in higher semantic levels of the cover signal to reach this goal. Sparse decomposition represents a signal as a linear combination of its structural elements. Data insertion into the sparse coefficients slightly changes the effect of structural elements in the signal representation. So, quality of the stego signal is preserved and such a steganography method leads to higher imperceptibility. In addition, data insertion into the higher semantic levels leads to the higher undetectability. Steganalyzers use statistical... 

    Steganalysis Using Statistical Properties of Digital Signal

    , M.Sc. Thesis Sharif University of Technology Khosravirad, Saeed Reza (Author) ; Ghaemmaghami, Shahrokh (Supervisor) ; Eghlidos, Taraneh (Supervisor)
    Abstract
    Steganography is the art and technique of concealing secret message in ordinary data cover, transmitted over a public channel, in a way that eavesdroppers, as well as the channel users, cannot detect the presence of the secret message. However, steganalysis tries to detect this type of covert communication using some effective analysis techniques. Steganalysis is often based on statistical properties of the suspicious signal that are expected to change due to the message embedding process. Secret message (which mostly is a set of pseudo-random bits because of cryptography) affects the statistical features of the cover signal. So far, many steganalysis techniques have been reported that are... 

    Selecting a reliable steganography method

    , Article MCIT'2010 : International Conference on Multimedia Computing and Information Technology, 2 March 2010 through 4 March 2010, SharjahMCIT'2010 ; 2010 , Pages 69-72 ; 9781424470037 (ISBN) Sajedi, H ; Jamzad, M ; Sharif University of Technology
    2010
    Abstract
    Due to the various contents of images, the stego images produced by a steganography method may have different levels of undetectability against steganalyzers. In other words, a steganography method may cause less detectable statistical artifacts on some images compared to other images. In this paper, we analyze different features of images to find the similarity between proper cover images for each steganography method Similarity between images is modeled in form of fuzzy if-then rules using an evolutionary algorithm. Subsequently for hiding secret data in a cover image, we suggest a reliable steganography method that results in an undetectable stego image against most recently reported... 

    On the effect of spatial to compressed domains transformation in LSB-based image steganography

    , Article 7th IEEE/ACS International Conference on Computer Systems and Applications, AICCSA-2009, Rabat, 10 May 2009 through 13 May 2009 ; 2009 , Pages 260-264 ; 9781424438068 (ISBN) Sarreshtedari, S ; Ghotbi, M ; Ghaemmaghami, S ; Sharif University of Technology
    2009
    Abstract
    This paper introduces an efficient scheme to image steganography by introducing the hidden message (payload) insertion in spatial domain and transforming the stego-image to compressed domain. We apply a recently-proposed LSB method in order to obtain better statistical behavior of the stego-message and subsequently, the obtained stego-image is transformed and quantized in order to enhance the security of hiding. Performance analysis comparisons confirm a higher efficiency for our proposed method. Compared to recently-proposed approaches, our method offers the advantage that it combines an efficient LSB method with transform domain security. © 2009 IEEE  

    An improved version of persian/arabic text steganography using "La" word

    , Article Proceedings of IEEE 2008 6th National Conference on Telecommunication Technologies and IEEE 2008 2nd Malaysia Conference on Photonics, NCTT-MCP 2008, 26 August 2008 through 28 August 2008, Putrajaya ; 2008 , Pages 372-376 ; 9781424422159 (ISBN) Shirali Shahreza, M ; Shirali Shahreza, M. H ; Sharif University of Technology
    2008
    Abstract
    By expanding communication, in some cases there is a need for hidden communication. Steganography is one of the methods used for hidden exchange of information. Steganography is a method to hide the information under a cover media such as image or text. One of the text steganography methods for Persian and Arabic texts is "La" steganography method. But that method increases the file size and changes the apparent of the text. In this paper a method for solving these problems is proposed. In Persian and Arabic, each letter can have four different shapes regarding to its position in the word. In this method by using this feature of Persian and Arabic languages and the way which documents are... 

    Improvements of image-steganalysis using boosted combinatorial classifiers and gaussian high pass filtering

    , Article 2008 4th International Conference on Intelligent Information Hiding and Multiedia Signal Processing, IIH-MSP 2008, Harbin, 15 August 2008 through 17 August 2008 ; 2008 , Pages 1508-1511 ; 9780769532783 (ISBN) Asadi, N ; Jamzad, M ; Sajedi, H ; Sharif University of Technology
    2008
    Abstract
    Powerful universal steganalyzers were proposed in the literature during the past few years. In addition some studies have been conducted on improvements of current steganalysis results using information fusion techniques, merging available feature vectors, etc. This paper presents two independent ideas, which can be used together, to obtain higher accuracy in detecting stego images. First, we propose the use of boosted fusion methods to aggregate outputs of multiple steganalyzers. Second, we investigate how passing high frequencies through filtering can enhance the results of steganalysis techniques. In this work, it is shown that, through different tests over the state-of-the-art... 

    Design and implementation of three different methods for announcing exam grades on the web

    , Article 8th IEEE International Conference on Advanced Learning Technologies, ICALT 2008, Santander, 1 July 2008 through 5 July 2008 ; 2008 , Pages 335-337 ; 9780769531670 (ISBN) Shirali Shahreza, M ; Sharif University of Technology
    2008
    Abstract
    After the emergence of modern technologies in the field of information technologies (IT), virtual learning has attained a new form. The way of announcing exams' grades is an important topic in e-learning. For announcing exams' grades on the web, various methods have been proposed. In this paper, first some common methods for announcing students' grades are reviewed, then three new methods which are named "Virtual Grade", "Steganography Grades", and "Grade HIP" are introduced and the result of implementing these methods for announcing the grades of some courses at the some Iranian universities are provided. Also these methods and their results are analyzed. Finally these three new methods are... 

    Improving mobile banking security using steganography

    , Article 4th International Conference on Information Technology-New Generations, ITNG 2007, Las Vegas, NV, 2 April 2007 through 4 April 2007 ; 2007 , Pages 885-887 ; 0769527760 (ISBN); 9780769527765 (ISBN) Shirali Shahreza, M ; Sharif University of Technology
    2007
    Abstract
    Upon development of m-commerce as one of the new branches of e-commerce, m-banking has emerged as one of the main divisions of m-commerce. As the m-banking was received very well, it has embarked upon supply of various services based on different systems and with the aid of various services such as the Short Messaging Service (SMS). However, in spite of its advantages, m-banking is facing some challenges as well. One of these challenges is the issue of security of this system. This paper presents a method for increasing security of the information requested by users with the use of steganography method. In this method, instead of direct sending of the information, it is hidden in a picture...