10 research outputs found
An Efficient Light-weight LSB steganography with Deep learning Steganalysis
Active research is going on to securely transmit a secret message or
so-called steganography by using data-hiding techniques in digital images.
After assessing the state-of-the-art research work, we found, most of the
existing solutions are not promising and are ineffective against machine
learning-based steganalysis. In this paper, a lightweight steganography scheme
is presented through graphical key embedding and obfuscation of data through
encryption. By keeping a mindset of industrial applicability, to show the
effectiveness of the proposed scheme, we emphasized mainly deep learning-based
steganalysis. The proposed steganography algorithm containing two schemes
withstands not only statistical pattern recognizers but also machine learning
steganalysis through feature extraction using a well-known pre-trained deep
learning network Xception. We provided a detailed protocol of the algorithm for
different scenarios and implementation details. Furthermore, different
performance metrics are also evaluated with statistical and machine learning
performance analysis. The results were quite impressive with respect to the
state of the arts. We received 2.55% accuracy through statistical steganalysis
and machine learning steganalysis gave maximum of 49.93~50% correctly
classified instances in good condition.Comment: Accepted pape
Development and analysis of IWT-SVD and DWT-SVD steganography using fractal cover
The assurance of secret data transmitted over the Internet and confining its access to explicit grouped information has become a significant security and protection issue. To hide the presence of such information, a robust and blind color image steganography algorithm, using fractal cover images, Singular Value Decomposition (SVD), Integer Wavelet Transform (IWT), and Discrete Wavelet Transform (DWT) is proposed in this paper. The proposed algorithm conceals the color secret image intelligently inside a fractal cover image thus creating a unique stego-image that is virtually a replica of the original cover image. The novelty of this proposed blind image hiding method lies in the fact that a small file size of a unique fractal image can be used to conceal a large amount of information payload. The fractal cover images can be implemented without debasing its quality to make the shrouded information sufficiently strong against image processing attacks. The algorithm possesses features like robustness, imperceptibility, security, and greater hiding capacity due to the application of fractal compression, DWT-SVD, and IWT-SVD hybrid transform schemes. The secret image is inserted in U and V components of the fractal cover with a scaling factor based on the HVS model and a stego-image with sufficiently large keyspace is created. Furthermore, the proposed work compares the performance analysis and security offered by IWT- SVD and DWT- SVD hybrid combinations for different fractal covers using certain metrics like PSNR (Peak Signal to Noise Ratio), MSE (Mean Square Error), SSIM (Structural Similarity Index), BRISQUE (Blind/ Reference less Image Spatial Quality Evaluator) score and Bits per pixel (BPP). The results prove that image degradation is very less (less than 0.6%) in the proposed algorithm even when the secret image file size is more than double the file size of the fractal cover image which also saves the bandwidth and storage requirements
Securing Criminal Records using R-Pi, QR code and Steganography
In today`s digital scenario it has become very essential to maintain secrecy of criminal records otherwise forgery could happen. Using steganography it is possible to provide security for the information which is communicated over the internet from one crime branch to the other. Steganography one of the emerging security fields works to mask the very existence of the message. A wide range of carrier file formats can be utilized, but digital steganography is the extremely beneficial data hiding technique to secure criminal image as well as the crime scene images. Various applications have various prerequisites of the steganography method utilized. In this paper, we proposed CRSS (Criminal Record Security System) an image steganography method with LSB and RSA technique for enhanced security and along with that Raspberry pi and GSM module is used. Thus, for a more secure approach, the proposed method hides the criminal`s confidential records such as criminal`s image, crime scene digital images etc. using LSB steganography and also encrypts the confidential data making use of a private key using RSA algorithm and then sends it to the desired end. The receiver then decrypts the confidential data to get the original criminal information. CRSS is also proposed to send a QR code to the receiver which hides sensitive data and may include criminal`s previous crime history and other written proofs which are scanned at the receiving end reveals the entire criminal record. The entire system is implemented on Raspberry Pi 3 processor and thus a secure transmission of data without traditional desktop dependency in a more economical way could be established.</jats:p
A Review Paper on Internet of Things and it’s Applications
Internet, a revolutionary invention, is always transforming into some new kind of hardware and software making it unpreventable for anyone. The type of communication that we see today is either human-to-human or human-to-device, but the Internet of Things (IoT) promises a great future for the internet where the type of communication is machine-to-machine (M2M). The Internet of Things (IoT) is defined as a paradigm in which objects provide with sensors, actuators, and processors communicate with each other to serve a meaningful purpose. In this paper we discussed IoT and its architecture. Further we explained different applications of IoT for users, IoT advantages and disadvantages
