STEGANOGRAPHY IEEE PAPERS AND PROJECTS-2020



Steganography is a method of hiding secret data, by embedding it into an audio, video, image or text file. It is one of the methods employed to protect secret or sensitive data from malicious attacks.



A convolutional neural network-based linguistic steganalysis for synonym substitution steganography
free download

In this paper, a linguistic steganalysis method based on two-level cascaded convolutional neural networks (CNNs) is proposed to improve the systems ability to detect stego texts, which are generated via synonym substitutions. The first-level network, sentence-level CNN The secret sharing scheme is a data security tool that provides reliability and robustness for multi-user authentication systems. This work focus on improving the counting-based secret sharing technique for higher shares security as well as simple and fast computation. The Steganography the art of hiding information within information, has an added advantage over cryptography as the person viewing the object in which the information is hidden has no knowledge of the presence of any hidden information. The Least Significant Bit (LSB)

Detection of Heterogeneous Parallel Steganography for Low Bit-Rate VoIP Speech Streams
free download

This paper considers a new task of detecting heterogeneous parallel steganography (HPS) on streaming media. This task is to detect the existence of the confidential messages hidden in the frames of streaming media with multiple kinds of orthogonal steganographic methods

AN EFFECTIVE AND SECURE DIGITAL IMAGE STEGANOGRAPHY SCHEME USING TWO RANDOM FUNCTION AND CHAOTIC MAP
free download

Among the critical features of actions and strategies in the information and communications technology period is securing information. The reliability of information ought to be the main consideration in the discrete transfer of information between two people. For the security of Steganography has been successfully employed in various applications, eg, copyright control of materials, smart identity cards, video error correction during transmission, etc. Deep learning-based steganography models can hide information adaptively throughAbstract Information security and confidentiality are the prime concern of any type of communication. The techniques that utilizing inconspicuous digital media such as text, audio, video and image for hiding confidential data in it are collectively called

Effective Audio Steganography Based On LSBMR Algorithm
free download

Steganography is used to embed secret data into cover thereby no one can realizes the secret data apart from the sender and intended recipients. Different carrier file formats are employed for steganography here we consider audio files. There are several Cloud computing is widely accepted by both individuals and enterprises alike for the storage of multimedia contents. It is due to the introduction of a new architecture where the cost of computation, storage, and services needed for maintenance for storage of multimedia are In this paper, a new chaotic steganography method based on Fuzzy Inference System (FIS), using Discrete Cosine Transform (DCT) on color and grayscale images is proposed. The proposed algorithm is designed in three different approaches to have important factors of Steganography is the method of hiding secret message information in various cover media like text, image, audio, video and others without raising suspicion to intruders about the existence of any such information. Exploiting Modification Direction (EMD) based image Steganography methods in general terms tend to embed more and more secret bits in the cover images. Most of these methods are designed to embed secret information in such a way that the change in the visual quality of the resulting stego image is not detectable. There

A novel quantum steganographySteganalysis system for audio signals
free download

As a substitute for classical solutions, quantum information hiding techniques have become an essential issue in the field of quantum communications by utilizing the inherent features of quantum mechanics and creating more secured communications for the more reliable Encoding contains fourteen chapters. Out of fourteen chapters, Chap. 1 contains the introductory remarks. This chapter reflects the aspects of introductory literature about cryptography, steganography authentication and related issues in various domains. The

Review on secured data capabilities of cryptography, steganography and watermarking domain
free download

Due to the increment of using Internet to transfer the critical and secret data, many studies interested in secured data and investigated many ways to secure the transferred information. This paper presents a review study on the field that used in a secured data domain. The Abstract The Homogeneous-Representation Based Steganography (HRBS) embeds secret information into High Dynamic Range (HDR) images by encoding different homogeneous representations of pixels. After embedding information, the original cover HDR image can be This paper presents a new Multi-Secret Image Sharing (MSIS) scheme with steganography based on elementary cellular automata (ECA). A particular type of ECA, with behavior of generating some attractors which are called unary attractors, is used to share the secret

QUANTUM AUDIO STEGANOGRAPHY SYSTEM
free download

The increasing reliance on the internet as a means for data transferring among distributed parties in the world makes keeping the security of these data an essential manner. In order to achieving this goal, there are two ways, the first way depending on coding the data in

Improving data hiding capacity in code based steganography using multiple embedding
free download

In this modern era there is rapid increase in use of internet to exchange sensitive information. However, communication via the internet is unsecure and unrealible. Due to these factors, data hiding techniques has been proposed to increase the confidentiality and

Color image steganography scheme using gray invariant in AMBTC compression domain
free download

In this paper, a novel color image steganography scheme using gray invariant in AMBTC compression domain is proposed. Unlike the conventional schemes, the proposed scheme embeds the secret data into a compressed color image while keeping gray pixel values In current adaptive steganography study, the distortion function is used to describe pixel modification distortion cost. Distortion cost can describe the influence of pixel modification to the cover. And it plays an important actor in adaptive stegaography. Based on previousSteganalysis steganography have witnessed immense progress over the past few years by the advancement of deep convolutional neural networks (DCNN). In this paper, we analyzed current research states from the latest image steganography and steganalysis The basic requirement of a steganography approach is security against steganalysis attacks. In other words, a steganography method is reliable as long as it withstands all of the known steganalysis approaches. In order to preserve the security of a steganography method, theIn this study, we present how digital steganography can be analyzed in computer forensic. Computer forensics is a scientific study of computers in a manner consistent with the principles of the rules of evidence and court rules of procedure. Steganography is a state of

StegoNote: Steganography in Guitar Music Using Note Modulation.
free download

Due to its diversity, sensual and physical redundancies, music is considered as a type of ideal carrier for steganography and has attracted increasing attention from the research community of information hiding. In this paper, we present a novel note-modulatingSteganography is the practice of concealing the truth that communication is taking place. Intruders can easily attack information within a system if it is readily available. It can be read, modified, misused, and revealed to others. Therefore, the goal is to hide the existence of theModern research in Steganography focuses on increasing the capacity without keeping any perceptible signature into the stego-media. In this work, we present a pixel value difference (PVD) based high capacity methodology. Embedding is not restricted only to high contrast

Enhancing Medical Data Security via Combining Elliptic Curve Cryptography and Image Steganography
free download

This paper explores methods through which secret information is encrypted then and hided so as to increase the level of security in medical health data from being hacked [19]. This is done through combining two method Elliptic curve cryptography and image steganography

A Novel Quantum Audio Steganography Steganalysis Approach Using LSFQ-Based Embedding and QKNN-Based Classifier
free download

In this paper, a steganography steganalysis model for quantum audio signals is presented. This model consists of two separate parts of steganography and steganalysis. In the steganography part, to increase the imperceptibility and enhance the undetectability of the

Encrypted Steganography based on Bit Encoding
free download

Steganography is the art and science of hidden writing in such a way that no one knows about the existence of the secret message. Thus, it refers to the practice of hiding secret messages in communications over a public channel using digital carrier. The purpose of thisIn recent times, a high level of information security is attained by combining the concepts of cryptography and steganography along with nature-inspired optimization algorithms. One of the important media used for steganography is the Joint Photographic Expert Group (JPEG) Steganography is the art of concealing the existence of a secret data in a non-secret digital carrier called cover media. While the image of steganography methods is extensively researched, studies on other cover files remain limited. Videos are promising research items

An Efficient and Secure Text Transmission through Video Steganography
free download

In Recent years there is a rapid growth in wireless technologies, Gega bytes of information has been exchanging over many communication channels. However, few applications like military, medical, multimedia, web and civil etc. need to provide the security to the

Evaluation of the Effect of Steganography on Medical Image Classification Accuracy
free download

Predictors and features that are used in teleradiology and machinebased auto diagnosis in medicine are often not put into consideration while evaluating medical image Steganography algorithms. In this paper, the effect of embedded security data in automated

Image Steganography based Cryptography
free download

The privacy and security of data is of utmost importance to individuals whose critical data can be leaked out and used for illegal purposes. The data needs to be secure and precautions needs to be taken whenever it gets transmitted from one place to another. In theThe Internet is used for exchanging information. Sometimes it is required to transmit confidential data over the internet. Here the authors use image steganography to embed confidential data within a cover image. To construct the technique, this article combines the

Steganography for Public Security
free download

As technology is stepping up the ladder with each day, we need to find ways to transfer crucial data from one point to another in a secure manner. With the evolution of internet, it has become inevitable to store information in an electronic format. Our daily work is highly

Data Hiding Techniques Using Steganography Algorithms
free download

Steganography is the method of hiding information or data in a very peculiar manner using cover objects and various techniques. In the last two decades the adaptability of the digital communication and information sharing arouses the need for data susceptibility and thus

Securing LSB2 Message Steganography
free download

Securing the confidential secret and personal messages is a vital and important task. In this paper we will show how to increase the security of LSB2 method of data steganography to protect the message imbedded in digital color image. An encryption phase will be added to

Pseudorandom Sequences for Spread Spectrum Image Steganography
free download

Digital steganography is a promising direction in the development of information protection methods. Information messages are hidden in redundant data (cover data), which are processed and transmitted in information and telecommunication systems. At the same time

AUDIO STEGANOGRAPHY USING MULTI LAYER LSB
free download

Recently information technology field have become advanced and changing rapidly, methods applied to ensure privacy of digital data became very important in many real life applications. Efficient secrecy can be achieved by implementing Steganography techniquesImportances of reversible data hiding practices are always higher in contrast to any conventional data hiding schemes owing to its capability to generate distortion free cover media. Review of existing approaches on reversible data hiding approaches shows variable

LSB Image Steganography with Data Compression Technique Using Goldbach G0 Code Algorithm
free download

In this paper, a new method of image steganography under the spatial domain is introduced and added to the body of learning. This study used a compression technique in securing text data using the Goldbach code algorithm. Image steganography is also performed with the

Enhancement of LSB Audio Steganography Based on Carrier and Message Characteristics
free download

Data steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography where the secret message is hidden in audio carrier. This paper

AN INNOVATIVE INVESTIGATION OF STEGANOGRAPHY TO CONTROL CYBER ATTACKS
free download

Steganography a part of information hiding techniques, is another route for secure communication. The primary thought of steganography is to implant the secret information into an irrelevant plain computerized media, for example, a picture, a bit of video or sound This article analyses the ways malicious executable files hides with Steganography on the most used files of our daily basis such as , Word, Text, and Image. It demonstrates how data is hidden and gathers innovative ways of identifying potential attacks to prevent them

Introducing a High-Capacity Steganography Technique for Simultaneous Hide of Multiple Images
free download

The growth of information and communications technology and consequently need to secure data transfer has made steganography as an attractive and essential issue in recent years. Steganography techniques try to hide the original message in other forms of data, the

Image Steganography Using K-Means and DES Algorithm
free download

Steganography is that the process which involves hiding of image, text or any sensitive information inside another image, video or audio in such some way that an attacker wont be ready to detect its presence. Steganography hides the info so nothing appears out of

Chaotic Function Secured Message Steganography in Edge Detected Pixels of 3D Images
free download

In the present time, security application is important to hide data. Steganography and cryptography provide more data security between sender and receiver. Steganography hides the data by embedding data into images, videos, 3D objects and audios, while

Steganography algorithm based on modified EMD coded PU partition modes for HEVC videos
free download

Abstract As High Efficiency Video Coding (HEVC) is a worldwide popular video coding standard, the steganography of HEVC videos has gained more and more attention. Prediction Unit (PU) is one of the most important innovative modules of HEVC, thus PU

A SECURED IMAGE STEGANOGRAPHY USING GENETIC ALGORITHM
free download

According to the optimization techniques examined in the past, the performance of Genetic Algorithm (GA) based approaches are seen as a substandard technique compared to PSO based approaches with a target to improve the performance of GA approach. The

DWT-SMM-based audio steganography with RSA encryption and compressive sampling
free download

Problems related to confidentiality in information exchange are very important in the digital computer era. Audio steganography is a form of a solution that infuses information into digital audio, and utilizes the limitations of the human hearing system in understanding and

Advanced Encryption Standard Secured Message Steganography in Edge Detected Pixels of 3D Images
free download

As information security plays an important role in each side of data technology, this thesis proposes a multiple layer message security scheme in 3D cover images. Cryptography takes place in the first layer, where Advanced Encryption Standard (AES) is applied on the

PROPOSING DOUBLE ENCRYPTION DOUBLE COVER [DEDC] INNOVATIVE MODEL FOR SECURE COMMUNICATION USING STEGANOGRAPHY
free download

Steganography provides the facility to hide the secret message inside a cover object and that cover be an image, or audio file. Encryption algorithm plays an important role for the security of the message. So, we have used AES-128 encryption algorithm in our

Audio Wavelet Compression and Audio Steganography using LSB Technique
free download

Audio Compression is a type of data compression designed to minimize the need for the transmission bandwidth of digital audio streams and the size of the audio. An effective Discrete Wavelet Transform (DWT) is used at various scales for the decomposition of the

Audio Steganography
free download

B Shrestha, B Manandhar, S Dhakal, DB Kumal NCE JOURNAL OF nce.edu.np Hiding information is an art and science of communication technology. Using Steganography information can be hidden within other information that it cannot be detected, but only by its intended recipient. Nowadays for hiding information there are

Matlab Code for Video Steganography
free download

The project proposes the enhancement of security system for secret data communication through video file using adaptive data hiding with cryptographic technique. A given input video file is converted into frame sequences and then Encrypted the video using AES

VAE-Stega: Linguistic Steganography Based on Variational Auto-Encoder
free download

In recent years, linguistic steganography based on text auto-generation technology has been greatly developed, which is considered to be a very promising but also a very challenging research topic. Previous works mainly focus on optimizing the language model

Comparative Analysis of Steganography Technique for Information Security
free download

Organisations need information security to reduce the risk of unauthorized information disclosure, use, modification and destruction. To avoid this risk and ensure security diverse solutions are available such as Cryptography, Steganography and Watermarking Temporal complexity of data security algorithms for information exchange on internet is becoming a daunting challenge. Performance enhancement of these algorithms using multi core CPUs has now become the standard approach. An OpenMP implementation of chaos