Dissertations / Theses on the topic 'Images - Steganography'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Images - Steganography.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Zakaria, Ahmad. "Batch steganography and pooled steganalysis in JPEG images." Thesis, Montpellier, 2020. http://www.theses.fr/2020MONTS079.
Full textABSTRACT:Batch steganography consists of hiding a message by spreading it out in a set of images, while pooled steganalysis consists of analyzing a set of images to conclude whether or not a hidden message is present. There are many strategies for spreading a message and it is reasonable to assume that the steganalyst does not know which one is being used, but it can be assumed that the steganographer uses the same embedding algorithm for all images. In this case, it can be shown that the most appropriate solution for pooled steganalysis is to use a single quantitative detector (i.e. one that predicts the size of the hidden message), to evaluate for each image the size, the hidden message (which can be zero if there is none), and to average the sizes (which are finally considered as scores) obtained over all the images.What would be the optimal solution if now the steganalyst could discriminate the spreading strategy among a set of known strategies. Could the steganalyst use a pooled steganalysis algorithm that is better than averaging the scores? Could the steganalyst obtain results close to the so-called "clairvoyant" scenario where it is assumed that the steganalyst knows exactly the spreading strategy?In this thesis, we try to answer these questions by proposing a pooled steganalysis architecture based on a quantitative image detector and an optimized score pooling function. The first contribution is a study of quantitative steganalysis algorithms in order to decide which one is best suited for pooled steganalysis. For this purpose, we propose to extend this comparison to binary steganalysis algorithms and we propose a methodology to switch from binary steganalysis results to quantitative steganalysis and vice versa.The core of the thesis lies in the second contribution. We study the scenario where the steganalyst does not know the spreading strategy. We then propose an optimized pooling function of the results based on a set of spreading strategies which improves the accuracy of the pooled steganalysis compared to a simple average. This pooling function is computed using supervised learning techniques. Experimental results obtained with six different spreading strategies and a state-of-the-art quantitative detector confirm our hypothesis. Our pooling function gives results close to a clairvoyant steganalyst who is supposed to know the spreading strategy.Keywords: Multimedia Security, Batch Steganography, Pooled Steganalysis, Machine Learning
Le, Pham [Verfasser]. "Detection of Steganography in Images with Statistical Models / Pham Le." München : Verlag Dr. Hut, 2014. http://d-nb.info/1052375162/34.
Full textOliveira, Fábio Borges de. "Analysis of the cryptography security and steganography in images sequences." Laboratório Nacional de Computação Científica, 2007. http://www.lncc.br/tdmc/tde_busca/arquivo.php?codArquivo=134.
Full textA segurança da informação vem sendo considerada de grande importância para as instituições privadas e governamentais. Por este motivo, optamos em realizar um estudo sobre segurança nesta dissertação. Iniciamos com uma introdução à teoria da informação, partimos para métodos de criptografia onde propomos um novo tipo de Segredo Perfeito e finalmente fazemos um estudo de esteganografia em uma sequência de imagens, onde propomos uma esteganografia mais agressiva nos coeficientes da transformada discreta de cosseno.
ESCOBAR, JAISSE GRELA. "A TOOL FOR TRACKING VIDEOS AND IMAGES USING STEGANOGRAPHY TECHNIQUES." PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2015. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=25814@1.
Full textCOORDENAÇÃO DE APERFEIÇOAMENTO DO PESSOAL DE ENSINO SUPERIOR
PROGRAMA DE EXCELENCIA ACADEMICA
Na indústria de TV frequentemente ocorrem vazamentos de materiais de filmagem quando estes se distribuem entre os colaboradores de produção, prejudicando grandemente as empresas. Neste trabalho propomos uma ferramenta que, utilizando técnicas de esteganografia adaptativa, permite detectar a fonte do vazamento com um elevado grau de confiança. Um requisito importante é que a informação mascarada no vídeo (ou na imagem) resista a operações de processamento tais como redimensionamento e mudança de resolução. A ideia é usar o algoritmo Speeded Up Robust Features (SURF), estratégia consagrada, na detecção e descrição de características em imagens para detectar regiões robustas da imagem e inserir nelas uma pequena identificação mascarada. A ferramenta utiliza a transformada Haar – Discrete Wavelet Transform em duas dimensões, para depois fazer modificações na imagem. Esta dissertação propõe direções iniciais promissoras para a identificação segura de certificados de origem de imagens e vídeos.
In the TV industry, leaks of film materials occur frequently when they are distributed among the members of the production team, causing great harm to the companies. In this paper, we propose a tool that allows detecting the source of the leak with a high degree of confidence, using techniques of adaptive steganography. An important requirement is that the information embedded in the video (or image) should resist to processing operations such as resizing and resolution changes. The idea is to use the Speeded Up Robust Features (SURF) algorithm, a well-known strategy for detection and description of images features, to detect the robust regions of the image and insert a small masked identification in them. The tool uses the Haar - Discrete Wavelet Transform in two dimensions and then modifies the image. This dissertation proposes promising initial directions for secure identification of the certificate of origin of digital images and videos.
Grajeda, Marín Ismael Rufino. "Increase in the information payload for steganography in digital images." Tesis de Licenciatura, Universidad Autónoma del Estado de México, 2019. http://hdl.handle.net/20.500.11799/105009.
Full textCerkez, Paul. "Automated Detection of Semagram-Laden Images." NSUWorks, 2012. http://nsuworks.nova.edu/gscis_etd/115.
Full textChandrababu, Aron. "Using an artificial neural network to detect the presence of image steganography." Akron, OH : University of Akron, 2009. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=akron1237343521.
Full text"May, 2009." Title from electronic thesis title page (viewed 11/18/2009) Advisor, Kathy J. Liszka; Faculty Readers, Timothy W. O'Neil, Tim Margush; Department Chair, Wolfgang Pelz; Dean of the College, Chand Midha; Dean of the Graduate School, George R. Newkome. Includes bibliographical references.
Thorpe, Christopher. "Compression aided feature based steganalysis of perturbed quantization steganography in JPEG images." Access to citation, abstract and download form provided by ProQuest Information and Learning Company; downloadable PDF file, 114 p, 2008. http://proquest.umi.com/pqdweb?did=1459914021&sid=6&Fmt=2&clientId=8331&RQT=309&VName=PQD.
Full textRwabutaza, Allan Anthony. "A Cryptanalysis Methodology for the Reverse Engineering of Encrypted Information in Images." Wright State University / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=wright1261417786.
Full textAbdulla, Alan Anwer. "Exploiting similarities between secret and cover images for improved embedding efficiency and security in digital steganography." Thesis, University of Buckingham, 2015. http://bear.buckingham.ac.uk/149/.
Full textAbdulrahman, Hasan. "Oriented filters for feature extraction in digital Images : Application to corners detection, Contours evaluation and color Steganalysis." Thesis, Montpellier, 2017. http://www.theses.fr/2017MONTS077/document.
Full textInterpretation of image contents is very important objective in image processing and computer vision. Wherefore, it has received much attention of researchers. An image contains a lot of information which can be studied such as color, shapes, edges, corners, size, and orientation. Moreover, contours include the most important structures in the image. In order to extract features contour of an object, we must detect the edges of that object. Edge detection results, remains a key point and very important step in wide range of applications such as: image restoration, enhancement, steganography, watermarking, image retrieval, recognition, compression, and etc. An efficient boundary detection method should create a contour image containing edges at their correct locations with a minimum of misclassified pixels. However, the performance evaluationof the edge detection results is still a challenging problem. The digital images are sometimes modify by a legal or illegal data in order to send special or secret data. These changes modify slight coefficient values of the image. In order to be less visible, most of the steganography methods modify the pixel values in the edge/texture image areas. Therefore, it is important to detect the presence of hidden data in digital images. This thesis is divided mainly into two main parts. The first part, deals with filtering edge detection, contours evaluation and corners detection methods. More deeply, there are five contributions are presented in this part: first, proposed a new normalized supervised edge map quality measure. The strategy to normalize the evaluation enables to consider a score close to 0 as a good edge map, whereas a score 1 translates a poor segmentation. Second, proposed a new technique to evaluate filtering edge detection methods involving the minimum score of the considerate measures. Moreover, build a new ground truth edge map labelled in semi-automatic way in real images. Third, proposed a new measure takes into account the distances of false positive points to evaluate an edge detector in an objective way. Finally, proposed a new approach for corner detection based on the combination of directional derivative and homogeneity kernels. The proposed approach remains more stable and robust to noise than ten famous corner detection methods. The second part, deals with color image steganalysis, based on a machine learning classification. More deeply, there are three contributionsare presented in this part: first, proposed a new color image steganalysis method based on extract color features from correlations between the gradients of red, green and blue channels. Since these features give the cosine of angles between gradients. Second, proposed a new color steganalysis method based on geometric measures obtained by the sine and cosine of gradient angles between all the color channels. Finally, proposed a new approach for color image steganalysisbased on steerable Gaussian filters Bank.All the three proposed methods in this part, provide interesting and promising results by outperforming the state-of-art color image steganalysis
Kouider, Sarra. "Insertion adaptative en stéganographie : application aux images numériques dans le domaine spatial." Phd thesis, Université Montpellier II - Sciences et Techniques du Languedoc, 2013. http://tel.archives-ouvertes.fr/tel-01020745.
Full textGuettari, Nadjib. "Évaluation du contenu d'une image couleur par mesure basée pixel et classification par la théorie des fonctions de croyance." Thesis, Poitiers, 2017. http://www.theses.fr/2017POIT2275/document.
Full textNowadays it has become increasingly simpler for anyone to take pictures with digital cameras, to download these images to the computer and to use different image processing software to apply modifications on these images (Compression, denoising, transmission, etc.). However, these treatments lead to degradations which affect the visual quality of the image. In addition, with the widespread use of the Internet and the growth of electronic mail, sophisticated image-editing software has been democratised allowing to falsify images for legitimate or malicious purposes for confidential or secret communications. In this context, steganography is a method of choice for embedding and transmitting information.In this manuscript we discussed two issues : the image quality assessment and the detection of modification or the presence of hidden information in an image. The first objective is to develop a No-Reference measure allowing to automatically evaluate the quality of an image in correlation with the human visual appreciation. Then we propose a steganalysis scheme to detect, with the best possible reliability, the presence of information embedded in natural images. In this thesis, the challenge is to take into account the imperfection of the manipulated data coming from different sources of information with different degrees of precision. In this context, in order to take full advantage of all this information, we propose to use the theory of belief functions. This theory makes it possible to represent knowledge in a relatively natural way in the form of a belief structure.We proposed a No-reference image quality assessment measure, which is able to estimate the quality of the degraded images with multiple types of distortion. This approach, called wms-EVreg2, is based on the fusion of different statistical features, extracted from the image, depending on the reliability of each set of features estimated through the confusion matrix. From the various experiments, we found that wms-EVreg2 has a good correlation with subjective quality scores and provides competitive quality prediction performance compared to Full-reference image quality measures.For the second problem addressed, we proposed a steganalysis scheme based on the theory of belief functions constructed on random subspaces of the features. The performance of the proposed method was evaluated on different steganography algorithms in the JPEG transform domain as well as in the spatial domain. These experimental tests have shown the performance of the proposed method in some application frameworks. However, there are many configurations that reside undetectable
Cheddad, Abbas. "Steganoflage : A new image steganography algorithm." Thesis, University of Ulster, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.506572.
Full textWengerhoff, Daniel. "Using the singular value decomposition for image steganography." [Ames, Iowa : Iowa State University], 2006.
Find full textSoukal, David. "Advanced steganographic and steganalytic methods in the spatial domain." Diss., Online access via UMI:, 2006.
Find full textPoremba, Tomáš. "Digitální steganografie a stegoanalýza." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2018. http://www.nusl.cz/ntk/nusl-385979.
Full textRontauroli, Matteo. "Soluzioni di Deep Learning in ambito di Image Steganography." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2020. http://amslaurea.unibo.it/20485/.
Full textJOHANSSON, SIMON, and EMIL LENNGREN. "Steganographic embedding and steganalysisevaluation : An evaluation of common methods for steganographic embedding and analysis indigital images." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-157499.
Full textKoppola, Rajanikanth Reddy. "A High Capacity Data-Hiding Scheme in LSB-Based Image Steganography." University of Akron / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=akron1236708072.
Full textChandrababu, Aron. "Using an Ariticial Neural Network to Detect the Presence of Image Steganography." University of Akron / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=akron1237343521.
Full textHassanein, Mohamed Sameh. "Secure digital documents using Steganography and QR Code." Thesis, Brunel University, 2014. http://bura.brunel.ac.uk/handle/2438/10619.
Full textGuruswamy, Aarumugam Bhupathi Rajan. "Independent Domain of Symmetric Encryption using Least SignificantBit : Computer Vision, Steganography and Cryptography Techniques." Thesis, Högskolan Dalarna, Datateknik, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:du-10063.
Full textGiarimpampa, Despoina. "Blind Image Steganalytic Optimization by using Machine Learning." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-38150.
Full textКучма, Олександр Русланович, and Oleksandr Kuchma. "Розроблення модуля забезпечення приховування даних на основі стеганографічного методу найменш значущого біту." Master's thesis, ТНТУ, 2021. http://elartu.tntu.edu.ua/handle/lib/36794.
Full textПояснювальна записка містить результати розроблення модуля «Вбудовування інформації в зображенні методом найменш значущого біту». Проведено аналіз предметної області, розроблені моделі бізнес-процесів об’єкта проектування, розроблені специфікації бізнес-вимог, функціональних та не функціональних вимог, спроектовані логічна та фізична моделі бази даних. Виконаний математичний опис задачі для вирішення на ПК та розроблений додаток за допомогою середовища програмування Microsoft Visual Studio 2010. Наведені результати тестування програмного продукту та вимоги щодо його розгортання. Результати роботи можуть бути використані для підтвердження авторського права, для приховування інформації в цифрових зображеннях.
Explanatory note contains the results of the development module "Embedding information in an image using the least significant bit. The analysis domain, the model business processes of the project, developed the specification of business requirements, functional and non functional requirements, designed logical and physical database models. The mathematical description of the problem for solution on the PC application developed using the programming environment Microsoft Visual Studio 2010. The results of software testing and requirements for its deployment. The results may be used to confirm the copyright for hiding information in digital images.
ПЕРЕЛІК УМОВНИХ СКОРОЧЕНЬ ... 7 ВСТУП ... 8 РОЗДІЛ 1... 10 1.1 Коротка характеристика підприємства... 10 Базою підприємства виступає Інтернет-магазин «TradeBox»... 10 1.2 Аналіз предметної області ... 11 Заголовки ... 13 Потоковий контейнер ... 13 Фіксований контейнер ... 13 1.3. Аналіз існуючого програмного продукту, що реалізують функцію предметної області ... 16 РОЗДІЛ 2... 21 2.1. Глосарій проекту ... 21 2.2. Розроблення варіанту використання ... 23 2.2.1. Розроблення діаграми варіантів використання. ... 24 2.2.2. Специфікація варіантів використання ... 25 2.2.3. Розкадровка варіантів використання ... 34 2.3. Специфікація функціональних і не функціональних вимог ... 42 РОЗДІЛ 3... 46 3.1 Математична постановка задачі ... 46 3.2. Проектування структури бази даних ... 50 3.3. Опис архітектури додатку. ... 52 3.3.1 Розроблення діаграми класів, що реалізують бізнес-логіку програмної системи. ... 52 3.3.2. Розроблення діаграми використання елементів графічного інтерфейсу користувача. ... 53 3.4. Тестування додатку. ... 53 3.5. Розгортання програмного продукту. ... 55 3.5.1. Системні мінімальні характеристики ... 55 3.5.2. Вимоги до програмного забезпечення клієнтської частини. ... 55 3.5.3. Спосіб виклику програми, запуск програми. ... 56 РОЗДІЛ 4 ОХОРОНА ПРАЦІ ТА БЕЗПЕКА В НАДЗВИЧАЙНИХ СИТУАЦІЯХ ... 57 4.1 Охорона праці ... 57 4.2 Підвищення стійкості роботи об'єктів господарської діяльності в воєнний час... 59 СПИСОК ВИКОРИСТАНИХ ДЖЕРЕЛ ... 65 ДОДАТКИ ... 66 ДОДАТОК А ... 67 ДОДАТОК Б ... 69 ДОДАТОК В ... 91 ДОДАТОК Д ... 92 ДОДАТОК Е ... 93
Stensmar, Isak. "Steganografi i bilder : En studie om bildformat och visuella bildrepresentationens påverkan vid lagring av data med hjälp av en steganografisk metod." Thesis, Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-12887.
Full textContext. By using image steganography it is possible to hide a large amount of data without making big differences to the initial picture. One commonly used method is Least Significant Bit (LSB), which often is considered one of the first method implemented and used in Image Steganography. Apart from the method, the user also have a choice when deciding what picture he or she should use as the carrier of information. What people often try to accomplish is to have a very complex method that hides the data in an efficient way, but forgets about the picture used as a carrier. In the end, all measurements will be done on the picture. Objectives. This study will investigate if different image formats, BMP, PNG, JPEG and TIFF, have an impact on the differences when comparing the original picture with the modified, given that data is stored with a steganographic method and is gradually increased. The study will also investigate if what the picture visually represent will have an effect on the measurements. Methods. An extended method of the Least Significant Bit method will be implemented and used to create different pictures with different kinds of image formats. An experiment will investigate these formats by taking measurements with MSE (Mean Squared Error), PSNR (Peek Signal-to-Noise Ratio) and SSIM (Structural Similarity). Results. When comparing different formats one could say that JPEG showed better performance by having a lower differential value between each test, by looking at the graphs and tables. BMP, PNG and TIFF had minimal changes between each other for each test. As for the visual representation of the pictures, two pictures showed a higher differential value after each test than the remaining three. Conclusions. The results from the experiment showed that which compression method a format uses will have an impact on the measurement. The results also showed that the pictures’ visual representation could have some impact on the measurement of a picture but more data is needed to conclude this theory.
Currie, Daniel L. Campbell Hannelore. "Implementation and efficiency of steganographic techniques in bitmapped images and embedded data survivability against lossy compression schemes." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1996. http://handle.dtic.mil/100.2/ADA311535.
Full textThesis advisor(s): Cynthia E. Irvine, Harold Fredricksen. "March 1996." Includes bibliography references (p. 37). Also available online.
Currie, Daniel L., and Hannelore Campbell. "Implementation and efficiency of steganographic techniques in bitmapped images and embedded data survivability against lossy compression schemes." Thesis, Monterey, California. Naval Postgraduate School, 1996. http://hdl.handle.net/10945/8501.
Full textThe term steganography is descriptive of techniques used to covertly communicate by embedding a secret message within an overt message. Such techniques can be used to hide data within digital images with little or no visible change in the perceived appearance of the image and can be exploited to covertly export sensitive information. This thesis explores the data capacity of bitmapped image files and the feasibility of devising a coding technique which can protect embedded data from the deleterious effects of lossy compression. In its simplest form, steganography in images is accomplished by replacing the least significant bits of the pixel bytes with the data to be embedded. Since images are frequently compressed for storage or transmission, it is desirable that a steganographic technique include some form of redundancy coding to counter the errors caused by lossy compression algorithms. Specifically, the Joint Photographic Expert Group (JPEGi) compression algorithm, while producing only a small amount of visual distortion, introduces a relatively large number of errors in the bitmap data. These errors will effectively garble any noncoded steganographically embedded data
Morkus, Filip. "Program pro skrývání dat v obrazových souborech." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2011. http://www.nusl.cz/ntk/nusl-218835.
Full textOliveira, Fábio Borges de. "Análise de segurança em criptografia e esteganografia em sequências de imagens." Laboratório Nacional de Computação Científica, 2007. https://tede.lncc.br/handle/tede/63.
Full textCoordenacao de Aperfeicoamento de Pessoal de Nivel Superior
Information security is being considered of great importance to the private and governamental institutions. For this reason, we opted to conduct a study of security in this dissertation. We started with an introduction to the information theory, and then we proposed a new kind of Perfect Secrecy cryptographic and finally made a study of steganography in an image sequence, in which we suggest a more aggressive steganography in coefficients of the discrete cosine transform.
A segurança da informação vem sendo considerada de grande importância para as instituições privadas e governamentais. Por este motivo, optamos em realizar um estudo sobre segurança nesta dissertação. Iniciamos com uma introdução à teoria da informação, partimos para métodos de criptografia onde propomos um novo tipo de Segredo Perfeito e finalmente fazemos um estudo de esteganografia em uma sequência de imagens, onde propomos uma esteganografia mais agressiva nos coeficientes da transformada discreta de cosseno.
Azevedo, Samuel Oliveira de. "Sistema de agentes polig?nicos para estegan?lise de imagens digitais." Universidade Federal do Rio Grande do Norte, 2007. http://repositorio.ufrn.br:8080/jspui/handle/123456789/17965.
Full textConselho Nacional de Desenvolvimento Cient?fico e Tecnol?gico
In this work, we propose a multi agent system for digital image steganalysis, based on the poliginic bees model. Such approach aims to solve the problem of automatic steganalysis for digital media, with a case study on digital images. The system architecture was designed not only to detect if a file is suspicious of covering a hidden message, as well to extract the hidden message or information regarding it. Several experiments were performed whose results confirm a substantial enhancement (from 67% to 82% success rate) by using the multi-agent approach, fact not observed in traditional systems. An ongoing application using the technique is the detection of anomalies in digital data produced by sensors that capture brain emissions in little animals. The detection of such anomalies can be used to prove theories and evidences of imagery completion during sleep provided by the brain in visual cortex areas
Neste trabalho, propomos um sistema multi-agentes para estegan?lise em imagens digitais, baseado na met?fora das abelhas polig?nicas. Tal abordagem visa resolver o problema da estegan?lise autom?tica de m?dias digitais, com estudo de caso para imagens digitais. A arquitetura do sistema foi projetada n?o s? para detectar se um arquivo ? ou n?o suspeito de possuir uma mensagem oculta em si, como tamb?m para extrair essa mensagem ou informa??es acerca dela. Foram realizados v?rios experimentos cujos resultados confirmam uma melhoria substancial (de 67% para 82% de acertos) com o uso da abordagem multi-agente, fato n?o observado em outros sistemas tradicionais. Uma aplica??o atualmente em andamento com o uso da t?cnica ? a detec??o de anomalias em dados digitais produzidos por sensores que captam emiss?es cerebrais em pequenos animais. A detec??o de tais anomalias pode ser usada para comprovar teorias e evidencias de complementa??o do imageamento durante o sono, provida pelo c?rebro nas ?reas visuais do c?rtex cerebral
Pacura, Dávid. "Neviditelné značení digitálních signálů." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2016. http://www.nusl.cz/ntk/nusl-240846.
Full textChin-Te, Chien, and 簡進德. "Lossless image sharing with Steganography and Authentication for multiple secret images." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/98966098053717735892.
Full text明新科技大學
資訊管理研究所
97
Secret image sharing can effectively avoid the problem that an original image cannot be reconstructed due to the modification of a single ciphertext. However, shadow images are noise-like so might draw attackers’ attention; meanwhile, they may still be modified incidentally or intentionally by participants. To resolve these problems, it was proposed to embed shadow images in preselected meaningful images (cover images) with LSB substitution, and authenticate stego images with one-bit authentication code. Nevertheless, it is inconvenient for managers of multiple secret images because they need to have multiple copies of shadow images. A universal share concept was proposed to improve the convenience of management; however, when embedding a universal image, this mechanism induces distortion to the original images. Therefore, it is not appropriated for those applications which cannot tolerate image distortion (e.g., medical sciences, military, etc.). Hence, we integrate those previous mechanisms and resolve the following three problems: (1). Distortion problem: we expand the original secret image to become times of itself in order to keep the original image intact while embedding a universal image. Moreover, this study employs the Galois Field GF(28) to perform modular arithmetic operations in sharing polynomials. (2). Authentication strength: authentication code is upgraded from one-bit to four-bit so that the authentication strength of shadow images can be effectively improved. (3). Image quality problem: a four-bit authentication code may reduce the image quality. We use a new date hiding mechanism to embed both the shares and the authentication code to improve the quality. The experimental results show that: (1). the proposed mechanism can effectively reconstruct the original image without distortion; (2). the probability that a fake block of a stego image is successfully authenticated can be largely improved to 15/16; (3). the authentication ability is strengthened with good visual quality of stego images.
kanagi, Karamo, and 卡拉莫. "Steganography by Color Images Using Advanced Encryption Standard (AES)." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/72471940294150032343.
Full text國立清華大學
資訊系統與應用研究所
103
資訊安全近期在資料通訊中佔有很大的重要議題。其中,影像藏密及密碼學都是確保祕密訊息的方法。影像藏密是把一張訊息藏在數位媒體並且遮掩一些資訊。但是如果分開使用這些技術,並沒有辦法完整的保護資訊安全。為了要保護資訊安全及機密資訊,我們必須結合影像藏密及密碼學去提供更強大的資訊通訊來防止入侵者。 在這篇論文中,我們提供一個影像藏密的方法去專注在24位元的彩色影像。這項方法使用了標籤圖像文件格式,並且在使用最低有效位(LSB)方法的圖像嵌入裡面,使用AES 128位元的加密算法的秘密信息進行加密,透過減少到封面圖像所做的更改量來提高LSB的方法。在這項實驗中,比較分析了通過計算均方誤差(MSE)和峰值信噪比(PSNR)證明了該方法的有效性。最後的結果顯示此方法能保持圖像質量和安全的更高的水平。
Chen, Chin Kuang, and 陳勤廣. "A Novel Steganography Using Hill Cipher and Microarray Images." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/44579276195478075474.
Full text國立清華大學
資訊系統與應用研究所
104
With the rapid development of technology, Internet has become possible to communicate and transmit any type of data across networks. Security of data or information has become a critical issue in data storage and transmission to prevent attacks from accessing personal information and other types of data such as credit card numbers. Steganography refers to the technique of hiding information in digital media in order to conceal the existence of the information. In this thesis, we use microarray image, Hill cipher algorithm and least significant bits substitution to implement steganography. Because of the advantage of the microarray images, we can perform the four bits LSB replacement method easily to embed the secret message. Moreover, our proposed system is not limited to files format of secret message.
Huang, Ching-Huan, and 黃景煥. "A Steganography Method by Block Analysis in Gray Level Images." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/76888683254500885591.
Full text國立清華大學
資訊工程學系
93
We have proposed a novel and secure steganographic method for embedding secret data into a gray scale image in this thesis. In the embedding process, the image is partitioned into non-overlapping blocks. The pixels in a block are classified into unchangeable pixels and changeable pixels. The average of the gray values of unchangeable pixels in each block is calculated as . The embedded amount of data for each changeable pixel is determined by the difference between and the gray value of the changeable pixel. A larger difference embeds a higher amount of secret data. We modify the gray value of a changeable pixel and reset a new gray value with secret data embedded. But, not all the changeable pixels are appropriated for embedding secret data. The gray values of some changeable pixels may cause wrong extraction if they were used in embedding. We have two fault potential checking processes which execute both embedding procedure and extracting procedure to automatically detect and discard fault potential changeable pixels. Therefore, no extra space is needed for recording the positions of the fault potential changeable pixels. The experimental results show that we can embed secret data into an image without noticeable distortion.
Huang, Pei Lin, and 黃佩琳. "Steganography Using Biometric Images and Linear Feedback Shift Register (LFSR)." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/38818826188942863931.
Full text國立清華大學
資訊系統與應用研究所
104
Steganography and cryptography are techniques that try to protect message from being captured during data transmission. Algorithms which combined steganography and cryptography can provide a higher security. In this thesis, we propose a least significant bit (LSB) based steganography. In order to enhance the security, we use linear feedback shift register (LFSR) to generate random sequences to do exclusive-or (XOR) operations with the secret message and then embed the ciphered message into biometric images. In the capacity aspect, our algorithm can support up to four least significant bits (4LSB) replacement according to the size of message. The effectiveness of the proposed method is estimated by peak signal-to-noise ratio (PSNR), embedding rate and execution time. The results show that high PSNR values with short execution time is feasible.
(7036661), Min Huang. "Statistical Steganalysis of Images." Thesis, 2019.
Find full textTsai, Ya-Chun, and 蔡雅純. "The Study of Digital Watermarking and Steganography Techniques for Fractal Compression Images." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/39579758464947719191.
Full text育達商業技術學院
資訊管理所
96
Information hiding is a technique of hiding secret using redundant cover data such as images, audios, movies, documents, etc. The techniques are used today include watermarking and steganography. The major concern of watermarking is to protect the ownership of a digital content, while steganography is to embed secret messages into digital content so that the secret messages is not detectable. Recently, plenty of researches focus on information hiding in digital images. The fractal compression is one of image compression techniques with high compression rate. This technique compresses original image into codes of iterated function systems based on the properties of self-similarities and iterations. In the decoding stage, an arbitrary image is given as the initial image and the decoded image is repeatedly reconstructed by applying the contractive affine transformation to the original image. In the previous researches, the rule of embedding messages in the fractal compression images usually uses a fixed threshold. Instead, we use an adaptive threshold to contuse both the stego image quality and hiding capacity. In the experimental results, the digital watermarking can be extracted properly under several image destroying operations. In addition, the hiding capacity of the data hiding scheme can be doubled without sacrificing the image quality.
Tseng, Chiung-Chen, and 曾瓊蓁. "A High Payload Steganography Scheme for Color Images Based on BTC and Hybrid Strategy." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/03826317414928902865.
Full text亞洲大學
資訊工程學系
103
With advances in computer networks and applications, the Internet has become indispensable to delivering confidential data. Information security is a prime concern as people’s use of the Internet increases. Various research studies have been done to better protect data in transit and ensure information security. Cryptographic methods and steganography are the most commonly used strategies to secure communications on the Internet. To compliment cryptographic methods, which do not hide secret data in transmitted packets, steganography is used to embed secret data so that unintended recipients are unaware of the secret data been transmitted in a steganographic image. Therefore, the quality of the stego image must be high for the embedded secret message. In general, information hiding (also called data hiding or data embedding) technique includes digital watermarking and steganography. These information hiding methods are currently used by many researchers for various applications. Embedding capacity is one of the key issues in data hiding research. In theory, a higher embedding capacity in the original medium usually means poorer visual quality. Block Truncation Coding (BTC) is one of the popular compression techniques used in image data hiding because of its low computation cost and ease of implementation. For a color image, there are three pairs of high mean and low mean values with three bitmaps. A common bitmap can be used to reduce the size of the BTC compression code. Chang et al. presented a data hiding method to conceal secret data in the color image BTC compression code by rearranging the encoding sequences of the high mean and low mean values. The proposed method attempts to embed more secret data into the color BTC compression code. In this thesis, a novel method is proposed to encrypt data based on the number of the element ‘1’. If the number is even, the data for the secret bit is ‘0’; otherwise, the secret bit is ‘1’. Furthermore, the Less Significant Bit (LSB) of all high mean and low mean pairs can also be used to embed the secret data. Experimental results show that with the proposed method, each block conceals at least 10 secret bits while good visual quality is maintained.
施宣光. "Reversible Steganography for BTC-compressed Images Based on Information Encoding and Joint Neighboring Coding." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/69854057230916163759.
Full text國立彰化師範大學
資訊工程學系
102
Recently, reversible steganography becomes a popular research issue. More and more attention have been paid to reversible data hiding techniques for compressed images based on Vector Quantization(VQ),JPEG, and Block Truncation Coding(BTC),because it can recover both the host media and hidden data without distortion. Compared with other compressed method, BTC has a significantly low complexity and less memory requirement, it therefore becomes an ideal data hiding domain. Reversible information hiding is a technique that can restore the stego-media after extracting all the classified messages. Due to the high correlativity with adjacent pixels, a natural image usually contains several smooth regions. In this paper, we proposed a data hiding scheme to embed secret data in the compressed bit streams. Use the bitmap substituting and reconstructed levels replacing and information encoding to hide data in the compressed gray images. And finally we combine the joint neighboring coding technique to hide more information The experimental results show that the proposed method outperforms the previous methods in embedding capacity.
Suresh, V. "Image Structures For Steganalysis And Encryption." Thesis, 2010. https://etd.iisc.ac.in/handle/2005/2273.
Full textSuresh, V. "Image Structures For Steganalysis And Encryption." Thesis, 2010. http://etd.iisc.ernet.in/handle/2005/2273.
Full textTu, Shu-Fen, and 杜淑芬. "On the design of protection scheme for digital images and documents based on visual secret sharing and steganography." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/20149312408849680560.
Full text國立中央大學
資訊管理研究所
93
To prevent the confidential information from being disclosed, one needs to apply some techniques to protect it. Visual cryptography scheme is a secret sharing technique, which splits a binary image into n shares, and gathering more than k shares can recover the secret. The remarkable feature of a visual cryptography scheme is that the decoding process is done by human eyes. A conventional visual cryptography scheme encodes a pixel on the secret image into m subpixels on the share hence makes the size of the decoded image larger than that of the secret image. A few of studies pay attention on solving the problem of pixel expansion. Some studies, incorporated with halftoning or probability, can construct a visual cryptography scheme for gray-level images without pixel expansion. However, such integrated schemes seem not suitable because the visual effect of the decoded image is poor. Except for the problem of pixel expansion, the loss of contrast is also a problem for the visual cryptography. Since the secret is decoded visually, making a good visual effect and offsetting the loss of contrast are as important as keeping the image size invariant. In this study, we propose two Multi-pixel Encoding Methods based on the visual cryptography scheme. The main purpose of the proposed method is to solve the problem of pixel expansion and generate smooth-looking decoded images. For each time, we simultaneously encode m pixels, called an encryption sequence, on the secret image into m pixels on the share. Hence the size of the decoded image is the same as that of the secret image. There are two different ways to take an encryption sequence: one is to take m pixels with the same color; the other is to take m adjacent pixels. For the former one, there are two kinds of encryption sequences on a secret image: one is black encryption sequence; the other is white encryption sequence. These two encryption sequences are encoded by black and white basis matrices respectively. For the later one, there are (m + 1) types of encryption sequences on a secret image. We propose two different ways to handle different kinds of encryption sequences. When incorporating with halftoning, we can construct a gray-level visual cryptography scheme with a smooth-looking decoded image. Moreover, we exploit the CMY color model to decompose a chromatic image into three image layers in tones of cyan, magenta, and yellow, respectively. Then, we can use the proposed Multi-pixel Encoding Methods to construct a chromatic visual cryptography scheme without pixel expansion. The experimental results show that the size of shares is the same as that of the secret image, and visual effect of the decoded image look smooth as well. Moreover, our scheme can offset the loss of contrast caused by visual cryptography. Since visual cryptography is not suitable for transferring large amount of texts, we can use Lin and Lee’s document protection scheme to protect the secret message. They randomly choose a meaningful document as a cheating message and then encode a secret message into an index file. The index file is encrypted by IDEA (International Data Encryption Algorithm) before they are sent out. However, the content of the cheating document is restricted to the secret message, i.e. the selection of the cheating message is not truly random; therefore, they can not use any text as cheating message. Besides, the length of the cheating document cannot be shorter than that of the secret document. In addition, the size of the encoded result – index file – is too large so it must be compressed. Although some researchers proposed slight improvements on Lin and Lee’s scheme, the above major drawbacks of Lin and Lee’s scheme are unsolved. We proposed a new document protection scheme to remedy these drawbacks mentioned above. The first method of our scheme utilizes a subtraction operator to encode the secret message. For each code of the secret message, we randomly pick a code from the cheating message and subtract it from the secret code. The difference is the cipher code of the secret code. The second method of our scheme utilizes a comparison and a logic XOR operator to encode the secret message. For each secret code, we randomly generate a equal-length code from the cheating message via comparison operator. Then we perform logic XOR on the generated code and the secret code. The result is the cipher code of the secret code. The security of the first method mainly depends on the seed of the pseudo random number generator; hence the cipher message may need to be encrypted by another cryptosystem for advancing the security more. The second method possesses the positive features of the first method and conforms to the property of perfect secrecy; hence the cipher message is not necessary to be encrypted again by another cryptosystems. In addition, the experimental results show that the cheating message is not restricted by the secret message. Therefore, the selection of the cheating message is truly random.
Μπαλκούρας, Σωτήριος. "Στεγανογραφία ψηφιακών εικόνων." Thesis, 2013. http://hdl.handle.net/10889/6438.
Full textThe development of the internet in recent years has brought changes in the size and quality of the available content. Users literally flooded with information which may have various forms like text, audio, image, and video. The wide spread of the internet, the ease of search in a large amount of information and the presentation of the available content in a friendly way resulted in the need for more images, videos and music. With the digitization of the available content new steganography techniques were necessary so that users can exchange secret information. In the current thesis two of the most popular steganography algorithms are implemented: the LSB (Least Significant Bit) and the LBP (Local Binary Pattern). The system is publicly available and can be used by any user who wishes to hide information (text or image) within an image. The system provides functionalities so that user can hide information within an image and recover the hidden information. The sender (the person who wishes to hide a message) has to provide the following information in the system: upload the image, provide the secret key needed to retrieve the message, and upload the message. The receiver has to upload the image containing the message and the secret key needed to recover the message. Anumber of usage scenarios are implemented to measure the performance of the algorithms and make comparisons. The implemented system can easily include more steganografy methods and also the extension of the LBP algorithm so that the three color components are used to hide the information. It would be interested to provide the current process as an e-service (web service) that it is feasible to be used independently and can be introduced as a standalone piece of software in any platform that supports web services.
Huang, Yu-Lin, and 黃郁霖. "Reversible Steganography on Image." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/08377836807386366733.
Full text朝陽科技大學
資訊管理系碩士班
98
Due to the rapid development of information technology and internet, people usually convert a lot of data into digitally. The digital data are also transmitted over the internet. However, internet is a public transmitting channel that the transmitting data may be stolen and distorted by illegal user. Therefore, how to protect data during transmission became an important issue. Data hiding is a technique that allows the secret data embed into a cover image and generate a stego-image. Illegal user does not aware of the secret data which is transmitted with stego-image. The image quality of stego-image has distortion after data embedding. However, in a number of domains such as military, legal and medical…etc., the image distortion is undesirable. Therefore, the reversible data hiding technique is proposed. Reversible data hiding technique not only can embed the secret data but also recover the distortion into original image. However, there are two drawbacks in the reversible data hiding technique. First, the image quality of reversible data hiding technique with high payload is also huge less than the irreversible data hiding technique. Second, reversible data hiding technique requires much additional data for recovering image and extracting secret data. In order to improve the drawbacks of reversible data hiding technique, our research proposed the reversible data hiding schemes base on dual steganography images. Our proposed schemes use a private key to embed the secret data into two stego-images. The receiver must have two stego-images and the private key for restoring original image and extracting secret data currently. For the features above, our research provides further security.
Wang, Chun-Chieh, and 王俊傑. "High Capacity Binary Image Steganography." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/65410751032931102761.
Full text國立清華大學
資訊工程學系
92
The popularity and availability of multimedia data promote digital communication with steganography. High data capacity and cover image quality maintenance after data embedding are the major requirements in digital image steganography. On the other hand, hiding data in binary images is challenging for the property that each pixel is made up by only one bit. As a result, we present a simple and high capacity binary image steganography. In our method, uniform blocks are utilized to embed data in addition to non-uniform blocks. Two data bits are hidden by at most modifying two pixels in an embeddable image block according to the proposed embedding criteria. The most suitable pixel to be modified is found quickly by simple weighting method when necessary. The experimental results show the excellent performance over other’s mechanism in data capacity and image quality.
Lee, Yeuan-Kuen, and 李遠坤. "A Study on Image Steganography." Thesis, 2002. http://ndltd.ncl.edu.tw/handle/67186023602190623457.
Full text國立交通大學
資訊科學系
90
Steganography is an ancient art of conveying messages in a secret way that only the receiver knows the existence of the message. A classic steganographic model presented by Simmons is the prisoners' problem. In this problem, two persons in the jail plan to make an escape together. All communications between them are monitored by the warden. Therefore, they must hide the messages concerning escape plan in another innocuous-looking media. In this manner, steganography provides another layer of protection on the covert communication. The message is hidden in another media such that the transmitted data will be meaningful and innocuous-looking to everyone. Compared with cryptography attempting to conceal the content of the secret message, steganography conceals the very existence of message. On the other hand, for detecting the covert communication, the warden should analysis all messages sent between prisoners. Steganalysis is the art of detecting secret communication. If the existence of message is reveal, the purpose of steganography will be defeated. In this dissertation, the secret message is embedded in images for protecting the privacy of communication on the Internet. Since the created stego-images can be stored in various formats, we will propose three embedding techniques for covert communication under three different conditions. First, the created stego-images are stored in uncompressed formats. Second, the stego-images are compressed using JPEG standard. Finally, the format of the stego-images can be converted from JPEG to GIF, and vice versa. For analyzing the performance of the proposed steganographic models, three types of steganalysis will be considered: image fidelity, visual attack and statistical attack. Images with hidden message, called the stego-images, should be indistinguishable from their original ones, called the cover-images. Visual attack uses the ability of human eyes to clearly recognize the unusual visual patterns. Some statistical characteristics of natural images can also be used to reliably identify which images contain the hidden message. Using the least significant bit (LSB) embedding method, the hidden message can be reliably detected by using some statistical attacks. In this dissertation, a variable-sized LSB embedding method for uncompressed format will be proposed first. For investigating the maximum payload of each pixel, the number of LSBs used for message embedding depends on the local characteristics, such as luminance and contrast. Since the original bit-plane characteristics can be maintained, the hidden message is undetectable by using the visual attack. Chi-square attack is also used to show that the hidden message is statistically undetectable. Next, we will propose a variation of an information embedding method, called Quantization Index Modulation (QIM), for JPEG images. The proposed method embeds the messages to be conveyed by modifying the mean intensity value of image blocks, and the resulted stego-image can be stored in the JPEG format with a low quality setting. A theorem is also proposed to show that the error of mean intensity value of an image block caused by JPEG compression is bounded. Besides, a specific pattern caused by using QIM embedding method is also identified, and this pattern will be removed using the proposed embedding method. Experimental results and the proposed theorem show that the hidden message is error-free against the JPEG distortion under the quality setting as low as 25. Furthermore, the existence of hidden message is not only visually imperceptible but also statistically undetectable. Finally, we will present a novel idea for exactly extracting the hidden message while the stego-images are stored in various compression formats, such as GIF, JPEG and JPEG 2000 (J2K). The main idea is to embed secret data through distorting a given object and the distorted object still looks natural. Experimental results show that the hidden message can be extracted correctly even the stego-images are stored in various compression formats and rates. Furthermore, the embedded message is robust enough when the stego-image format is converted from one compression format to another one. All of the experimental results show that the proposed embedding techniques meet the fundamental requirement of steganographic system, i.e., undetectability. Therefore, selecting the most suitable technique under various transmission conditions will make the proposed steganographic model more powerful.
Morkel, Tayana. "Image steganography applications for secure communication." Diss., 2012. http://hdl.handle.net/2263/29906.
Full textDissertation (MSc)--University of Pretoria, 2013.
Computer Science
unrestricted
Wu, Yi-Ta. "Image watermarking, steganography, and morphological processing." Thesis, 2005. http://library1.njit.edu/etd/fromwebvoyage.cfm?id=njit-etd2005-087.
Full text