Loading...
Search for: steganography
0.01 seconds
Total 99 records

    Histogram shift steganography: A technique to thwart histogram based steganalysis

    , Article 2nd International Workshop on Computer Science and Engineering, WCSE 2009, 28 October 2009 through 30 October 2009, Qingdao ; Volume 2 , 2009 , Pages 166-170 ; 9780769538815 (ISBN) Mohsenzadeh, Y ; Mohajeri, J ; Ghaemmaghami, S ; Sharif University of Technology
    Abstract
    We present an image steganographic technique to preserve the first-order and the second-order statistics of the host image. Experimental results show that the proposed method can preserve the image quality and also resists typical statistical analysis based attacks. The new steganography method solves the distortion problem with the HKC algorithm and hence thwarts the Kuo attack. The method is based on the idea of histogram shift, in which two empty bins are produced in the image histogram that are then filled up using their neighboring bins through the embedding process. © 2009 IEEE  

    Semi-reversible quantization based data hiding using missing samples recovery technique

    , Article 16th International Conference on Telecommunications, ICT 2009, 25 May 2009 through 27 May 2009 ; 2009 , Pages 298-302 ; 9781424429370 (ISBN) Ameri, A ; Saberian, M. J ; Akhaee, M. A ; Marvasti, F ; Sharif University of Technology
    Abstract
    A blind semi-invertible quantization based data hiding scheme, which reconstructs the original signal with high precision has been proposed. In order to produce correlated quantization yielding reversibility of the quantization based approach, a new transform domain has been introduced. In decoder, by compensating the quantization error and using the iterative technique, the original signal is recovered; then the watermarked signal is compared with the reconstructed original signal and hidden data is retrieved. Simulation results show that the proposed method in comparison with other reversible methods imposes less distortion and thus a higher Signal to Noise Ratio (SNR) is achieved. © 2009... 

    Secure communication and archiving of low altitude remote sensing data using high capacity fragile data hiding

    , Article Multimedia Tools and Applications ; 2018 ; 13807501 (ISSN) Akhtarkavan, E ; Majidi, B ; Manzuri, M. T ; Sharif University of Technology
    Springer New York LLC  2018
    Abstract
    Fragile data hiding has been extensively used for secure transmission of the sensitive data using cover images, audios and videos. In the past decade, increasingly the remote sensing applications require transmission and archiving of large number of aerial images and videos. Storage and processing of remote sensing data in the public cloud computing and storage platforms, with servers outside the control of the data owners, requires sufficient attention to persevering the privacy of the data. Furthermore, in the past few years the applications of drones and unmanned aerial vehicles demand algorithms designed especially for low altitude remote sensing data. In this paper, a novel fragile data... 

    Secure communication and archiving of low altitude remote sensing data using high capacity fragile data hiding

    , Article Multimedia Tools and Applications ; Volume 78, Issue 8 , 2019 , Pages 10325-10351 ; 13807501 (ISSN) Akhtarkavan, E ; Majidi, B ; Manzuri, M. T ; Sharif University of Technology
    Springer New York LLC  2019
    Abstract
    Fragile data hiding has been extensively used for secure transmission of the sensitive data using cover images, audios and videos. In the past decade, increasingly the remote sensing applications require transmission and archiving of large number of aerial images and videos. Storage and processing of remote sensing data in the public cloud computing and storage platforms, with servers outside the control of the data owners, requires sufficient attention to persevering the privacy of the data. Furthermore, in the past few years the applications of drones and unmanned aerial vehicles demand algorithms designed especially for low altitude remote sensing data. In this paper, a novel fragile data... 

    Steganography in SMS by Sudoku puzzle

    , Article 6th IEEE/ACS International Conference on Computer Systems and Applications, AICCSA 2008, Doha, 31 March 2008 through 4 April 2008 ; 2008 , Pages 844-847 ; 9781424419685 (ISBN) Shirali Shahreza, M. H ; Shirali Shahreza, M ; Sharif University of Technology
    2008
    Abstract
    Sudoku puzzle is a logical game which has recently got very popular. Every day various mass media print these puzzles. As a result these puzzles are a suitable alternative for hidden data transfer. SMS (short message service) is one of the popular mobile-phone services. In this service people can write short messages and send it to each other through mobile phones. In this paper a method has been presented for Steganography (hiding data) in Sudoku puzzles and through SMS. In this method after hiding data in a Sudoku puzzle, the puzzle is sent in a way that it does not attract any attention. Steganography algorithm is based on order of place of numbers 1 through 9 in one of the specified row... 

    Adaptive steganography method based on contourlet transform

    , Article 2008 9th International Conference on Signal Processing, ICSP 2008, Beijing, 26 October 2008 through 29 October 2008 ; December , 2008 , Pages 745-748 ; 9781424421794 (ISBN) Sajedi, H ; Jamzad, M ; Sharif University of Technology
    2008
    Abstract
    In this paper, a new adaptive steganographic scheme based on contourlet transform is presented that provides large embedding capacity. In this method, embedding is done in contourlet transform domain. The contourlet coefficients with larger magnitude that correspond to the edges are selected for embedding. This selection is due to less sensitivity of human eyes to non-smooth regions. Each bit of secret data is embedded by exchanging the value of two coefficients in a 4×4 block of a contourlet subband. The proposed method is examined with two strong steganalysis algorithms and the results show that we could successfully embed data in a cover image with the capacity of 0.05 bits per pixel.... 

    High rate data hiding in speech using voicing diversity in an adaptive MBE scheme

    , Article 2008 IEEE Region 10 Conference, TENCON 2008, Hyderabad, 19 November 2008 through 21 November 2008 ; 2008 ; 1424424089 (ISBN); 9781424424085 (ISBN) Jahangiri, E ; Ghaemmaghami, S ; Sharif University of Technology
    2008
    Abstract
    This paper addresses a new approach to data hiding that leads to a high data embedding rate of tens of kbps in a typical digital voice file transmission scheme. The purpose of the proposed method is restricted to offline voice transmission that uses stego speech files in wave format. The basic idea of the algorithm is to embed encrypted covert message in the unvoiced bands of spectrum of the cover speech. Inaudibility of the proposed hiding scheme is investigated through both support vector machines (SVM)-based steganalysis and the ITU-T P.862 PESQ standard speech quality assessment. The results assure imperceptibility and transparency of the stego speech  

    A steganalysis method based on contourlet transform coefficients

    , Article 2008 4th International Conference on Intelligent Information Hiding and Multiedia Signal Processing, IIH-MSP 2008, Harbin, 15 August 2008 through 17 August 2008 ; 2008 , Pages 245-248 ; 9780769532783 (ISBN) Sajedi, H ; Jamzad, M ; Sharif University of Technology
    2008
    Abstract
    Steganalysis is a technique to detect the presence of hidden embedded information in a given data. Each steganalyzer is composed of feature extraction and feature classification components. Using features that are more sensitive to data hiding yields higher success in steganalysis. The present paper offers a new universal approach to steganalysis that uses statistical moments of contourlet coefficients as features for analysis. A non-linear SVM classifier is used to classify cover and stego images. The effectiveness of the proposed method is demonstrated by extensive experimental investigations. The proposed steganalysis method is compared with two well known steganalyzers against typical... 

    Cover selection steganography method based on similarity of image blocks

    , Article 8th IEEE International Conference on Computer and Information Technology Workshops, CIT Workshops 2008, Sydney, 8 July 2008 through 11 July 2008 ; 2008 , Pages 379-384 ; 9780769533391 (ISBN) Sajedi, H ; Jamzad, M ; Sharif University of Technology
    2008
    Abstract
    An advantage of steganography, as opposed to other information hiding techniques, is that the embedder can select a cover image that results in the least detectable stego image. In a previously proposed method, a technique based on block texture similarity was introduced where blocks of cover image were replaced with the similar secret image blocks; then indices of secret image blocks were stored in cover image. In this method, the blocks of secret image are compared with blocks of a set of cover images and the image with most similar blocks to those of the secret image is selected as the best candidate to carry the secret image. Using appropriate features for comparing image blocks,... 

    Steganography in wireless application protocol

    , Article IASTED International Conference on Internet and Multimedia Systems and Applications, Innsbruck, 13 February 2006 through 15 February 2006 ; Volume 2006 , 2006 , Pages 91-95 ; 0889865663 (ISBN); 9780889865662 (ISBN) Shirali Shahreza, M ; Sharif University of Technology
    2006
    Abstract
    Mobile phone and Internet technologies have progressed along each other. The importance of both these technologies has resulted in the creation of a new technology for establishing wireless Internet connection through mobile phone, known as Wireless Application Protocol (WAP). However, considering the importance of the issue of data security and especially establishing hidden communications, many methods have been presented. In the meanwhile, steganography is a relatively new method. In this paper, a method for hidden exchange of data has been presented by using steganography on WML pages (WML stands for Wireless Markup Language, which is a language for creating web pages for the WAP). The... 

    Secure steganography using Gabor filter and neural networks

    , Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) ; Volume 4920 LNCS , 2008 , Pages 33-49 ; 03029743 (ISSN); 3540690166 (ISBN); 9783540690160 (ISBN) Jamzad, M ; Zahedi Kermani, Z ; Sharif University of Technology
    2008
    Abstract
    The main concern of steganography (image hiding) methods is to embed a secret image into a host image in such a way that it causes minimum distortion to the host; to make it possible to extract a version of secret image from the host in such a way that the extracted version of secret image be as similar as possible to its original version (this should be possible even after usual attacks on the host image), and to provide ways of embedding secret images with larger size into a given host image. In this paper we propose a method that covers all above mentioned concerns by suggesting the idea of finding from an image data base, the most suitable host for a given secret image. In our method,... 

    A High Capacity Image Steganography in Wavelet Transform Domain

    , M.Sc. Thesis Sharif University of Technology Sarreshtedari, Saeed (Author) ; Ghaemmaghami, Shahrokh (Supervisor)
    Abstract
    Recent developments of internet technology and digital media have led to the rapid growth of the steganography systems. Steganography is the art and science of concealing a secret message in a cover without leaving a perceptible or detectable trace of the message. Therefore, steganography methods, capable of embedding the largest possible amount of data with least distortion to the cover media, are highly demanding. The LSB steganography is a primary and simple method with high embedding capacity, where higher robustness is achieved if it is applied to the cover signal in the transform domain. However, regardless of the embedding domain, an essential robustness issue with the LSB... 

    Performance improvement of spread spectrum additive data hiding over codec-distorted voice channels

    , Article European Signal Processing Conference ; Volume. 97, Issue. 9 , 2014 , pp. 2510-2514 ; ISSN: 22195491 Boloursaz, M ; Kazemi, R ; Behnia, F ; Akhaee, M. A ; Sharif University of Technology
    Abstract
    This paper considers the problem of covert communication through dedicated voice channels by embedding secure data in the cover speech signal utilizing spread spectrum additive data hiding. The cover speech signal is modeled by a Generalized Gaussian (GGD) random variable and the Maximum A Posteriori (MAP) detector for extraction of the covert message is designed and its reliable performance is verified both analytically and by simulations. The idea of adaptive estimation of detector parameters is proposed to improve detector performance and overcome voice non-stationarity. The detector's bit error rate (BER) is investigated for both blind and semi-blind cases in which the GGD shape... 

    Multi-dimensional correlation steganalysis

    , Article MMSP 2011 - IEEE International Workshop on Multimedia Signal Processing ; 2011 ; 9781457714337 (ISBN) Farhat, F ; Diyanat, A ; Ghaemmaghami, S ; Aref, M. R ; Sharif University of Technology
    2011
    Abstract
    Multi-dimensional spatial analysis of image pixels have not been much investigated for the steganalysis of the LSB Steganographic methods. Pixel distribution based steganalysis methods could be thwarted by intelligently compensating statistical characteristics of image pixels, as reported in several papers. Simple LSB replacement methods have been improved by introducing smarter LSB embedding approaches, e.g. LSB matching and LSB+ methods, but they are basically the same in the sense of the LSB alteration. A new analytical method to detect LSB stego images is proposed in this paper. Our approach is based on the relative locations of image pixels that are essentially changed in an LSB... 

    Steganalysis of internet data, a feasibility study

    , Article 2011 International Symposium on Computer Networks and Distributed Systems, CNDS 2011, Tehran, 23 February 2011 through 24 February 2011 ; 2011 , Pages 61-66 ; 9781424491544 (ISBN) Gholampour, I ; Khalilian, H ; Ghaemmaghami, S ; Sharif University of Technology
    2011
    Abstract
    This paper addresses the feasibility of applying realtime steganalysis to the Internet data. To reach a practical solution, we have employed offline procedures to minimize the volume of the data to be processed by an online real-time system. Possible offline services that can be provided to an online system then led us to appropriate network designs for the online system. To go into detail of the online systems, we have carefully analyzed some well-known, state-of-the-art steganalysis algorithms and estimated their processing power and memory requirements. Some formulas are derived to relate the network bit rate with the number of the processing units, their processing power, and memory... 

    On limits of embedding in 3D images based on 2D Watson's model

    , Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 1 October 2010 through 3 October 2010 ; Volume 6526 LNCS , October , 2011 , Pages 293-304 ; 03029743 (ISSN); 9783642184048 (ISBN) Kavehvash, Z ; Ghaemmaghami, S ; Sharif University of Technology
    2011
    Abstract
    We extend the Watson image quality metric to 3D images through the concept of integral imaging. In the Watson's model, perceptual thresholds for changes to the DCT coefficients of a 2D image are given for information hiding. These thresholds are estimated in a way that the resulting distortion in the 2D image remains undetectable by the human eyes. In this paper, the same perceptual thresholds are estimated for a 3D scene in the integral imaging method. These thresholds are obtained based on the Watson's model using the relation between 2D elemental images and resulting 3D image. The proposed model is evaluated through subjective tests in a typical image steganography scheme  

    A new solution for password key transferring in steganography methods by CAPTCHA through MMS technology

    , Article 2007 International Conference on Information and Emerging Technologies, ICIET, Karachi, 6 July 2007 through 7 July 2007 ; 2007 , Pages 136-141 ; 1424412463 (ISBN); 9781424412464 (ISBN) Shirali Shahreza, M ; Shirali Shahreza, M. H ; Sharif University of Technology
    2007
    Abstract
    The Multimedia Messaging System (MMS) allows a user of a mobile phone to send messages containing multimedia objects, such as images, audio or video clips. On the other hand establishing hidden communication is an important subject of discussion that has gained increasing importance nowadays with the development of the Internet. One of the methods introduced for establishing hidden communication is steganography. Therefore steganography in MMS is an interesting idea. One of the problems in steganography methods is the security of transferring password key used for steganography between sender and receiver of secure data. In this paper a new method is proposed for solving this problem using... 

    Sending mobile software activation code by SMS using steganography

    , Article 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2007, Kaohsiung, 26 November 2007 through 28 November 2007 ; Volume 1 , February , 2007 , Pages 554-557 ; 0769529941 (ISBN); 9780769529943 (ISBN) Shirali Shahreza, M. H ; Shirali Shahreza, M ; Sharif University of Technology
    2007
    Abstract
    Now we are able to offer numerous softwares for mobile phones after the advances in mobile phone industry. Most of these softwares should be bought in order that we can use them. Some of these softwares are sharewares and after buying them you have to insert an activation code given by the manufacturing company based on your mobile IMEI code in order to activate the software. In this paper a new method is introduced for sending the mobile software activation code by SMS (Short Message Service). In this method the activation code is hidden in an SMS picture message by steganography method and sent to the user. The software extracting the activation code from the picture and compare it with... 

    Taking multiple-choise quiz by SMS on mobile phones including analyzing property

    , Article Journal of Computers (Finland) ; Volume 2, Issue 2 , 2007 , Pages 53-60 ; 1796203X (ISSN) Shirali Shahreza, M ; Sharif University of Technology
    Academy Publisher  2007
    Abstract
    Recently Mobile Learning (M-Learning) has attracted much attention. Due to advantages of SMS (Short Messaging Service) on mobile phones we present a safe and protected method for taking multiple-choice quizzes by using the SMS on mobile phones in this paper. In this method questions of quiz are sent to students along with their answers through some SMS messages. The students will receive their grades immediately after answering the questions and this grade is also sent to the instructor or professor along with the student's answers through an SMS Picture Message. Answers of questions and the student's grade are hidden in SMS picture message through stenography and then they are sent. The...