“…Since steganography can also be utilized to conceal the private information, such as to provide privacy protection of medical images, as pointed out by one of the anonymous reviewers, besides Image Encryption and Decryption, Image Steganography is another worthy of noticing area in the field of Image Security. Interested readers are referred to the following informative writeups, although it is not within the scope of this work [ 24 , 25 ].…”
In theory, high key and high plaintext sensitivities are a must for a cryptosystem to resist the chosen/known plaintext and the differential attacks. High plaintext sensitivity can be achieved by ensuring that each encrypted result is plaintext-dependent. In this work, we make detailed cryptanalysis on a published chaotic map-based image encryption system, where the encryption process is plaintext Image dependent. We show that some designing flaws make the published cryptosystem vulnerable to chosen-plaintext attack, and we then proposed an enhanced algorithm to overcome those flaws.
“…Since steganography can also be utilized to conceal the private information, such as to provide privacy protection of medical images, as pointed out by one of the anonymous reviewers, besides Image Encryption and Decryption, Image Steganography is another worthy of noticing area in the field of Image Security. Interested readers are referred to the following informative writeups, although it is not within the scope of this work [ 24 , 25 ].…”
In theory, high key and high plaintext sensitivities are a must for a cryptosystem to resist the chosen/known plaintext and the differential attacks. High plaintext sensitivity can be achieved by ensuring that each encrypted result is plaintext-dependent. In this work, we make detailed cryptanalysis on a published chaotic map-based image encryption system, where the encryption process is plaintext Image dependent. We show that some designing flaws make the published cryptosystem vulnerable to chosen-plaintext attack, and we then proposed an enhanced algorithm to overcome those flaws.
“…The continuous growth of web services and e-commerce has encouraged many criminals and phishers to develop innovative methods to exploit and deceive novice users into sending out their financial information [1][2][3][4]. Although trojans, black hat search engine optimisation, forums, Internet relay chat, instant messaging, key-loggers, and screen captures are other methods used by phishers to steal the users' information, sending emails to target users by the phisher is still the most popular way of initiating the web phishing attacks [4,16,[25][26][27][28][29][30][31][32][33].…”
“…(3) Extract log 2 σ bits from S, convert the extracted bits to a digit s σ in σ − ary notational system, and perform the APPM embedding technique to embed s σ into the quantization pair (â i ,b i ) by solving Equation (9). In case the solution cannot be found, return the previously extracted log 2 σ + m × m to S, modify (a i , b i ) to (a i , b i ) according to the Equation (10), and go to Step 4 for embedding one additional bit.…”
Section: Embedding Proceduresmentioning
confidence: 99%
“…According to the recoverability of the cover image, data-hiding methods can be classified into lossy [6][7][8][9][10][11][12][13][14] and lossless [15][16][17]. The least significant bit (LSB) matching [18] is one of the well-known lossy methods.…”
Section: Introductionmentioning
confidence: 99%
“…Data hiding methods can be applied to images in spatial domain [6][7][8][9][10][11][12][13][14][15] or compress domain [19][20][21][22][23][24][25][26][27][28]. The spatial domain data hiding methods embed data by slightly altering the pixel values.…”
Abstract:In this paper, an efficient data hiding method that embeds data into absolute moment block truncation coding (AMBTC) codes is proposed. The AMBTC method represents image blocks by trios, and each trio consists of two quantization levels and an asymmetrically distributed bitmap. However, the asymmetric phenomena of bitmaps cause large degradation in image quality during data embedment. With the help of reference tables filled with symmetrical patterns, the proposed method exploits a symmetry adjustment model to modify the quantization levels in those smooth blocks to achieve the smallest distortion. If the block is complex, a lossless embedding method is performed to carry one additional bit. A sophisticated division switching mechanism is also proposed to modify a block from smooth to complex if the solution to the minimal distortion cannot be found. The payload can be adjusted by varying the threshold, or by embedding more bits into the quantization levels. The experiments indicate that the proposed work provides the best stego image quality under various payloads when comparing to the related prior works.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.