Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (66)
  • Open Access


    DWT-SVD Based Image Steganography Using Threshold Value Encryption Method

    Jyoti Khandelwal1, Vijay Kumar Sharma1, Dilbag Singh2,*, Atef Zaguia3

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3299-3312, 2022, DOI:10.32604/cmc.2022.023116

    Abstract Digital image steganography technique based on hiding the secret data behind of cover image in such a way that it is not detected by the human visual system. This paper presents an image scrambling method that is very useful for grayscale secret images. In this method, the secret image decomposes in three parts based on the pixel's threshold value. The division of the color image into three parts is very easy based on the color channel but in the grayscale image, it is difficult to implement. The proposed image scrambling method is implemented in image steganography using discrete wavelet transform… More >

  • Open Access


    Encryption with Image Steganography Based Data Hiding Technique in IIoT Environment

    Mahmoud Ragab1,2,3,*, Samah Alshehri4, Hani A. Alhadrami5,6,7, Faris Kateb1, Ehab Bahaudien Ashary8, S. Abdel-khalek9,10

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 1323-1338, 2022, DOI:10.32604/cmc.2022.024775

    Abstract Rapid advancements of the Industrial Internet of Things (IIoT) and artificial intelligence (AI) pose serious security issues by revealing secret data. Therefore, security data becomes a crucial issue in IIoT communication where secrecy needs to be guaranteed in real time. Practically, AI techniques can be utilized to design image steganographic techniques in IIoT. In addition, encryption techniques act as an important role to save the actual information generated from the IIoT devices to avoid unauthorized access. In order to accomplish secure data transmission in IIoT environment, this study presents novel encryption with image steganography based data hiding technique (EIS-DHT) for… More >

  • Open Access


    An Improved Optimized Model for Invisible Backdoor Attack Creation Using Steganography

    Daniyal M. Alghazzawi1, Osama Bassam J. Rabie1, Surbhi Bhatia2, Syed Hamid Hasan1,*

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 1173-1193, 2022, DOI:10.32604/cmc.2022.022748

    Abstract The Deep Neural Networks (DNN) training process is widely affected by backdoor attacks. The backdoor attack is excellent at concealing its identity in the DNN by performing well on regular samples and displaying malicious behavior with data poisoning triggers. The state-of-art backdoor attacks mainly follow a certain assumption that the trigger is sample-agnostic and different poisoned samples use the same trigger. To overcome this problem, in this work we are creating a backdoor attack to check their strength to withstand complex defense strategies, and in order to achieve this objective, we are developing an improved Convolutional Neural Network (ICNN) model… More >

  • Open Access


    Pixel Based Steganography for Secure Information Hiding

    N. Shyla*, K. Kalimuthu

    Journal of Information Hiding and Privacy Protection, Vol.3, No.3, pp. 143-149, 2021, DOI:10.32604/jihpp.2021.026760

    Abstract The term “steganography” is derived from the Greek words steganos, which means “verified, concealed, or guaranteed”, and graphein, which means “writing”. The primary motivation for considering steganography is to prevent unapproved individuals from obtaining disguised data. With the ultimate goal of comprehending the fundamental inspiration driving the steganography procedures, there should be no significant change in the example report. The Least Significant Bit (LSB) system, which is one of the methodologies for concealing propelled picture data, is examined in this assessment. In this evaluation, another procedure for data stowing indefinitely is proposed with the ultimate goal of limiting the progressions… More >

  • Open Access


    Quantum Steganography Application in the Electrical Network for Quantum Image and Watermark with Self-Adaptive

    Jie Shen1,3,*,#, Wenqi Dong2,#, Jing Wang1,2,3,#, Yang Wang1, Haiyan Li4

    Journal of Information Hiding and Privacy Protection, Vol.3, No.3, pp. 109-120, 2021, DOI:10.32604/jihpp.2021.025602

    Abstract With the development of Globe Energy Internet, quantum steganography has been used for information hiding to improve copyright protection. Based on secure quantum communication protocol, and flexible steganography, secret information is embedded in quantum images in covert communication. Under the premise of guaranteeing the quality of the quantum image, the secret information is transmitted safely with virtue of good imperceptibility. A novel quantum watermark algorithm is proposed in the paper, based on the shared group key value of the communication parties and the transmission of the selected carrier map pixel gray higher than 8 bits. According to the shared group… More >

  • Open Access


    Medical Image Transmission Using Novel Crypto-Compression Scheme

    Arwa Mashat1, Surbhi Bhatia2,*, Ankit Kumar3, Pankaj Dadheech3, Aliaa Alabdali4

    Intelligent Automation & Soft Computing, Vol.32, No.2, pp. 841-857, 2022, DOI:10.32604/iasc.2022.021636

    Abstract The transmission of medical records over indiscrete and open networks has caused an increase in fraud involving stealing patients’ information, owing to a lack of security over these links. An individual’s medical documents represent confidential information that demands strict protocols and security, chiefly to protect the individual’s identity. Medical image protection is a technology intended to transmit digital data and medical images securely over public networks. This paper presents some background on the different methods used to provide authentication and protection in medical information security. This work develops a secure cryptography-based medical image reclamation algorithm based on a combination of… More >

  • Open Access


    Novel Ransomware Hiding Model Using HEVC Steganography Approach

    Iman Almomani1,2,*, Aala AlKhayer1, Walid El-Shafai1,3

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 1209-1228, 2022, DOI:10.32604/cmc.2022.018631

    Abstract Ransomware is considered one of the most threatening cyberattacks. Existing solutions have focused mainly on discriminating ransomware by analyzing the apps themselves, but they have overlooked possible ways of hiding ransomware apps and making them difficult to be detected and then analyzed. Therefore, this paper proposes a novel ransomware hiding model by utilizing a block-based High-Efficiency Video Coding (HEVC) steganography approach. The main idea of the proposed steganography approach is the division of the secret ransomware data and cover HEVC frames into different blocks. After that, the Least Significant Bit (LSB) based Hamming Distance (HD) calculation is performed amongst the… More >

  • Open Access


    Steganalysis of Low Embedding Rate CNV-QIM in Speech

    Wanxia Yang*, Miaoqi Li, Beibei Zhou, Yan Liu, Kenan Liu, Zhiyu Hu

    CMES-Computer Modeling in Engineering & Sciences, Vol.128, No.2, pp. 623-637, 2021, DOI:10.32604/cmes.2021.015629

    Abstract To address the difficulty of detecting low embedding rate and high-concealment CNV-QIM (complementary neighbor vertices-quantization index modulation) steganography in low bit-rate speech codec, the code-word correlation model based on a BiLSTM (bi-directional long short-term memory) neural network is built to obtain the correlation features of the LPC codewords in speech codec in this paper. Then, softmax is used to classify and effectively detect low embedding rate CNV-QIM steganography in VoIP streams. The experimental results show that for speech steganography of short samples with low embedding rate, the BiLSTM method in this paper has a superior detection accuracy than state-of-the-art methods… More >

  • Open Access


    GAN-GLS: Generative Lyric Steganography Based on Generative Adversarial Networks

    Cuilin Wang1, Yuling Liu1,*, Yongju Tong1, Jingwen Wang2

    CMC-Computers, Materials & Continua, Vol.69, No.1, pp. 1375-1390, 2021, DOI:10.32604/cmc.2021.017950

    Abstract Steganography based on generative adversarial networks (GANs) has become a hot topic among researchers. Due to GANs being unsuitable for text fields with discrete characteristics, researchers have proposed GAN-based steganography methods that are less dependent on text. In this paper, we propose a new method of generative lyrics steganography based on GANs, called GAN-GLS. The proposed method uses the GAN model and the large-scale lyrics corpus to construct and train a lyrics generator. In this method, the GAN uses a previously generated line of a lyric as the input sentence in order to generate the next line of the lyric.… More >

  • Open Access


    Steganography-Based Transmission of Medical Images Over Unsecure Network for Telemedicine Applications

    Romany F. Mansour1,*, Moheb R. Girgis2

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 4069-4085, 2021, DOI:10.32604/cmc.2021.017064

    Abstract Steganography is one of the best techniques to hide secret data. Several steganography methods are available that use an image as a cover object, which is called image steganography. In image steganography, the major features are the cover object quality and hiding data capacity. Due to poor image quality, attackers could easily hack the secret data. Therefore, the hidden data quantity should be improved, while keeping stego-image quality high. The main aim of this study is combining several steganography techniques, for secure transmission of data without leakage and unauthorized access. In this paper, a technique, which combines various steganography-based techniques,… More >

Displaying 21-30 on page 3 of 66. Per Page