1
|
Al-Sumaidaee G, Žilić Ž. Sensing Data Concealment in NFTs: A Steganographic Model for Confidential Cross-Border Information Exchange. Sensors (Basel) 2024; 24:1264. [PMID: 38400422 PMCID: PMC10892136 DOI: 10.3390/s24041264] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 12/23/2023] [Revised: 02/09/2024] [Accepted: 02/13/2024] [Indexed: 02/25/2024]
Abstract
In an era dominated by rapid digitalization of sensed data, the secure exchange of sensitive information poses a critical challenge across various sectors. Established techniques, particularly in emerging technologies like the Internet of Things (IoT), grapple with inherent risks in ensuring data confidentiality, integrity, and vulnerabilities to evolving cyber threats. Blockchain technology, known for its decentralized and tamper-resistant characteristics, stands as a reliable solution for secure data exchange. However, the persistent challenge lies in protecting sensitive information amidst evolving digital landscapes. Among the burgeoning applications of blockchain technology, non-fungible tokens (NFTs) have emerged as digital certificates of ownership, securely recording various types of data on a distributed ledger. Unlike traditional data storage methods, NFTs offer several advantages for secure information exchange. Firstly, their tamperproof nature guarantees the authenticity and integrity of the data. Secondly, NFTs can hold both immutable and mutable data within the same token, simplifying management and access control. Moving beyond their conventional association with art and collectibles, this paper presents a novel approach that utilizes NFTs as dynamic carriers for sensitive information. Our solution leverages the immutable NFT data to serve as a secure data pointer, while the mutable NFT data holds sensitive information protected by steganography. Steganography embeds the data within the NFT, making them invisible to unauthorized eyes, while facilitating portability. This dual approach ensures both data integrity and authorized access, even in the face of evolving digital threats. A performance analysis confirms the approach's effectiveness, demonstrating its reliability, robustness, and resilience against attacks on hidden data. This paves the way for secure data transmission across diverse industries.
Collapse
Affiliation(s)
- Ghassan Al-Sumaidaee
- Department of Electrical and Computer Engineering, McGill University, Montréal, QC H3A 0G4, Canada;
| | | |
Collapse
|
2
|
Wang P, Zhong H, Feng Y, Gong L, Tang Y, Lu ZM, Wang L. Covert Communication through Robust Fragment Hiding in a Large Number of Images. Sensors (Basel) 2024; 24:627. [PMID: 38257719 PMCID: PMC10821471 DOI: 10.3390/s24020627] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 10/06/2023] [Revised: 01/05/2024] [Accepted: 01/12/2024] [Indexed: 01/24/2024]
Abstract
For covert communication in lossy channels, it is necessary to consider that the carrier of the hidden watermark will undergo multiple image-processing attacks. In order to ensure that secret information can be extracted without distortion from the watermarked images that have undergone attacks, in this paper, we design a novel fragmented secure communication system. The sender will fragment the secret data to be transmitted and redundantly hide it in a large number of multimodal carriers of messenger accounts on multiple social platforms. The receiver receives enough covert carriers, extracts each fragment, and concatenates the transmitted secret data. This article uses the image carrier as an example to fragment the text file intended for transmission and embeds it into a large number of images, with each fragment being redundant and embedded into multiple images. In this way, at the receiving end, only enough stego images need to be received to extract the information in each image, and then concatenate the final secret file. In order to resist various possible attacks during image transmission, we propose a strong robust image watermarking method. This method adopts a watermark layer based on DFT, which has high embedding and detection efficiency and good invisibility. Secondly, a watermark layer based on DCT is adopted, which can resist translation attacks, JPEG attacks, and other common attacks. Experiments have shown that our watermarking method is very fast; both the embedding time and the extraction time are less than 0.15 s for images not larger than 2000×2000. Our watermarking method has very good invisibility with 41dB PSNR on average. And our watermarking method is more robust than existing schemes and robust to nearly all kinds of attacks. Based on this strong robust image watermarking method, the scheme of fragmenting and hiding redundant transmission content into a large number of images is effective and practical. Our scheme can 100% restore the secret file completely under different RST or hybrid attacks, such as rotation by 1 degree and 5 degrees, scaling by 1.25 and 0.8, and cropping by 10% and 25%. Our scheme can successfully restore the secret file completely even if 30% of received images are lost. When 80% of received images are lost, our scheme can still restore 61.1% of the secret file. If all stego images can be obtained, the original text file can be completely restored.
Collapse
Affiliation(s)
- Pengfei Wang
- School of Communication Engineering, Hangzhou Dianzi University, Hangzhou 310018, China; (P.W.); (L.W.)
| | - Hua Zhong
- School of Cyberspace, Hangzhou Dianzi University, Hangzhou 310018, China; (Y.F.); (L.G.); (Y.T.)
| | - Yapei Feng
- School of Cyberspace, Hangzhou Dianzi University, Hangzhou 310018, China; (Y.F.); (L.G.); (Y.T.)
| | - Liangbiao Gong
- School of Cyberspace, Hangzhou Dianzi University, Hangzhou 310018, China; (Y.F.); (L.G.); (Y.T.)
| | - Yuxiang Tang
- School of Cyberspace, Hangzhou Dianzi University, Hangzhou 310018, China; (Y.F.); (L.G.); (Y.T.)
| | - Zhe-Ming Lu
- School of Aeronautics and Astronautics, Zhejiang University, Hangzhou 310027, China
- Center for Generic Aerospace Technology, Huanjiang Lab, Zhuji 311816, China
| | - Lixin Wang
- School of Communication Engineering, Hangzhou Dianzi University, Hangzhou 310018, China; (P.W.); (L.W.)
| |
Collapse
|
3
|
Yerimbetova A, Daiyrbayeva E, Merzlyakova E, Fionov A, Baisholan N, Turdalyuly M, Mukazhanov N, Turganbayev A. Creating Digital Watermarks in Bitmap Images Using Lagrange Interpolation and Bezier Curves. J Imaging 2023; 9:206. [PMID: 37888313 PMCID: PMC10607713 DOI: 10.3390/jimaging9100206] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 09/05/2023] [Revised: 09/25/2023] [Accepted: 09/25/2023] [Indexed: 10/28/2023] Open
Abstract
The article is devoted to the introduction of digital watermarks, which formthe basis for copyright protection systems. Methods in this area are aimed at embedding hidden markers that are resistant to various container transformations. This paper proposes a method for embedding a digital watermark into bitmap images using Lagrange interpolation and the Bezier curve formula for five points, called Lagrange interpolation along the Bezier curve 5 (LIBC5). As a means of steganalysis, the RS method was used, which uses a sensitive method of double statistics obtained on the basis of spatial correlations in images. The output value of the RS analysis is the estimated length of the message in the image under study. The stability of the developed LIBC5 method to the detection of message transmission by the RS method has been experimentally determined. The developed method proved to be resistant to RS analysis. A study of the LIBC5 method showed an improvement in quilting resistance compared to that of the INMI image embedding method, which also uses Lagrange interpolation. Thus, the LIBC5 stegosystem can be successfully used to protect confidential data and copyrights.
Collapse
Affiliation(s)
- Aigerim Yerimbetova
- Institute of Information and Computational Technologies, Committee of Science of the Ministry of Education and Science of the Republic of Kazakhstan, Almaty 050010, Kazakhstan; (A.Y.); (A.T.)
- Institute of Automation and Information Technologies, Satbayev University, Almaty 050013, Kazakhstan; (M.T.); (N.M.)
| | - Elmira Daiyrbayeva
- Institute of Information and Computational Technologies, Committee of Science of the Ministry of Education and Science of the Republic of Kazakhstan, Almaty 050010, Kazakhstan; (A.Y.); (A.T.)
- Institute of Automation and Information Technologies, Satbayev University, Almaty 050013, Kazakhstan; (M.T.); (N.M.)
- Institute of Automation and Telecommunications, Academy of Logistics and Transport, Almaty 050012, Kazakhstan
| | - Ekaterina Merzlyakova
- Department of Applied Mathematics and Cybernetics, Siberian State University of Telecommunications and Information Sciences, Novosibirsk 630102, Russia; (E.M.); (A.F.)
| | - Andrey Fionov
- Department of Applied Mathematics and Cybernetics, Siberian State University of Telecommunications and Information Sciences, Novosibirsk 630102, Russia; (E.M.); (A.F.)
| | - Nazerke Baisholan
- Department of Information Systems, Al-Farabi Kazakh National University, Almaty 050023, Kazakhstan;
| | - Mussa Turdalyuly
- Institute of Automation and Information Technologies, Satbayev University, Almaty 050013, Kazakhstan; (M.T.); (N.M.)
| | - Nurzhan Mukazhanov
- Institute of Automation and Information Technologies, Satbayev University, Almaty 050013, Kazakhstan; (M.T.); (N.M.)
| | - Almas Turganbayev
- Institute of Information and Computational Technologies, Committee of Science of the Ministry of Education and Science of the Republic of Kazakhstan, Almaty 050010, Kazakhstan; (A.Y.); (A.T.)
| |
Collapse
|
4
|
Boryczka M, Kazana G. Hiding Information in Digital Images Using Ant Algorithms. Entropy (Basel) 2023; 25:963. [PMID: 37509910 PMCID: PMC10378470 DOI: 10.3390/e25070963] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 05/13/2023] [Revised: 06/14/2023] [Accepted: 06/19/2023] [Indexed: 07/30/2023]
Abstract
Stenographic methods are closely related to the security and confidentiality of communications, which have always been essential domains of human life. Steganography itself is a science dedicated to the process of hiding information in public communication channels. Its main idea is to use digital files or even communication protocols as a medium inside which data are hidden. The present research aims to investigate the applicability of ant algorithms in steganography and evaluate the effectiveness of this approach. Ant systems could be employed both in spatial and frequency-based image steganography. The combination of frequency domain and optimization method to increase robustness is used, and an integer wavelet transform is performed on the host image. ACO optimization is used to find the optimal coefficients describing where to hide the data. The other method utilizes ACO to determine the optimal pixel locations for embedding secret data in the cover image. ACO is also used to detect complex regions of the cover image. Afterward, the least-significant-bits (LSB) substitution is used to hide secret information in the detected complex regions' pixels. Our study focuses on optimizing two mutually exclusive features of steganograms-high capacity and low distortion. An attempt was made to use ant systems to select areas of digital images that allow the greatest amount of information to be hidden with the least loss of image quality. The effect of variants of the ant system and its parameters on the quality of the results obtained was also investigated, and the final effectiveness of the proposed method was evaluated. The results of the experiments were compared with those published in related articles. The proposed procedures proved to be effective and allowed the embedding of large amounts of data with relatively little impact on image quality.
Collapse
Affiliation(s)
- Mariusz Boryczka
- Institute of Computer Science, University of Silesia in Katowice, Bedzińska 39, 41-200 Sosnowiec, Poland
| | - Grzegorz Kazana
- SkyGate, Chris Parjaszewski, Rynek 6, 44-100 Gliwice, Poland
| |
Collapse
|
5
|
Bai Y, Li L, Lu J, Zhang S, Chu N. A Novel Steganography Method for Infrared Image Based on Smooth Wavelet Transform and Convolutional Neural Network. Sensors (Basel) 2023; 23:5360. [PMID: 37420527 DOI: 10.3390/s23125360] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 05/09/2023] [Revised: 05/31/2023] [Accepted: 06/02/2023] [Indexed: 07/09/2023]
Abstract
Infrared images have been widely used in many research areas, such as target detection and scene monitoring. Therefore, the copyright protection of infrared images is very important. In order to accomplish the goal of image-copyright protection, a large number of image-steganography algorithms have been studied in the last two decades. Most of the existing image-steganography algorithms hide information based on the prediction error of pixels. Consequently, reducing the prediction error of pixels is very important for steganography algorithms. In this paper, we propose a novel framework SSCNNP: a Convolutional Neural-Network Predictor (CNNP) based on Smooth-Wavelet Transform (SWT) and Squeeze-Excitation (SE) attention for infrared image prediction, which combines Convolutional Neural Network (CNN) with SWT. Firstly, the Super-Resolution Convolutional Neural Network (SRCNN) and SWT are used for preprocessing half of the input infrared image. Then, CNNP is applied to predict the other half of the infrared image. To improve the prediction accuracy of CNNP, an attention mechanism is added to the proposed model. The experimental results demonstrate that the proposed algorithm reduces the prediction error of the pixels due to full utilization of the features around the pixel in both the spatial and the frequency domain. Moreover, the proposed model does not require either expensive equipment or a large amount of storage space during the training process. Experimental results show that the proposed algorithm had good performances in terms of imperceptibility and watermarking capacity compared with advanced steganography algorithms. The proposed algorithm improved the PSNR by 0.17 on average with the same watermark capacity.
Collapse
Affiliation(s)
- Yu Bai
- School of Computer Science and Technology, Hangzhou Dianzi University, Hangzhou 310018, China
| | - Li Li
- School of Computer Science and Technology, Hangzhou Dianzi University, Hangzhou 310018, China
| | - Jianfeng Lu
- School of Computer Science and Technology, Hangzhou Dianzi University, Hangzhou 310018, China
| | - Shanqing Zhang
- School of Computer Science and Technology, Hangzhou Dianzi University, Hangzhou 310018, China
| | - Ning Chu
- Zhe-Jiang Shangfeng Special Blower Company Ltd., Shaoxing 312352, China
| |
Collapse
|
6
|
Cao Y, Tang L, Li J, Lee C, Dong ZG. Multiplexing Optical Images for Steganography by Single Metasurfaces. Small 2023; 19:e2206319. [PMID: 36755181 DOI: 10.1002/smll.202206319] [Citation(s) in RCA: 3] [Impact Index Per Article: 3.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 10/14/2022] [Revised: 01/05/2023] [Indexed: 05/11/2023]
Abstract
Image steganography based on intelligent devices is one of the effective routes for safely and quickly transferring secret information. However, optical image steganography has attracted far less attention than digital one due to the state-of-the-art technology limitations of high-resolution optical imaging in integrated devices. Optical metasurfaces, composed of ultrathin subwavelength meta-atoms, are extensively considered for flat optical-imaging nano-components with high-resolutions as competitive candidates for next-generation miniaturized devices. Here, multiplex imaging metasurfaces composed of single nanorods are proposed under a detailed strategy to realize optical image steganography. The simulation and experimental results demonstrate that an optical steganographic metasurface can simultaneously transfer independent secret image information to two receivers with special keys, without raising suspicions for the general public under the cloak of a cover image. The proposed optical steganographic strategy by metasurfaces can arbitrarily distribute a continuous grayscale image together with a black-and-white image in separate channels, implying the distinguishing feature of high-density information capacity for integration and miniaturization in optical meta-devices.
Collapse
Affiliation(s)
- Yue Cao
- School of Physics, Southeast University, Nanjing, 211189, China
- Department of Electrical and Computer Engineering, National University of Singapore, Singapore, 117583, Singapore
- Center for Intelligent Sensors and MEMS(CISM), National University of Singapore, Singapore, 117542, Singapore
| | - Lili Tang
- School of Physics, Southeast University, Nanjing, 211189, China
| | - Jiaqi Li
- School of Physics, Southeast University, Nanjing, 211189, China
| | - Chengkuo Lee
- Department of Electrical and Computer Engineering, National University of Singapore, Singapore, 117583, Singapore
- Center for Intelligent Sensors and MEMS(CISM), National University of Singapore, Singapore, 117542, Singapore
| | - Zheng-Gao Dong
- School of Physics, Southeast University, Nanjing, 211189, China
| |
Collapse
|
7
|
Koptyra K, Ogiela MR. Steganography in IoT: Information Hiding with Joystick and Touch Sensors. Sensors (Basel) 2023; 23:3288. [PMID: 36991998 PMCID: PMC10056127 DOI: 10.3390/s23063288] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 01/27/2023] [Revised: 03/06/2023] [Accepted: 03/13/2023] [Indexed: 06/19/2023]
Abstract
This paper describes a multi-secret steganographic system for the Internet-of-Things. It uses two user-friendly sensors for data input: thumb joystick and touch sensor. These devices are not only easy to use, but also allow hidden data entry. The system conceals multiple messages into the same container, but with different algorithms. The embedding is realized with two methods of video steganography that work on mp4 files, namely, videostego and metastego. These methods were chosen because of their low complexity so that they may operate smoothly in environments with limited resources. It is possible to replace the suggested sensors with others that offer similar functionality.
Collapse
|
8
|
Liu L, Tang L, Zheng W. Lossless Image Steganography Based on Invertible Neural Networks. Entropy (Basel) 2022; 24:1762. [PMID: 36554167 PMCID: PMC9777640 DOI: 10.3390/e24121762] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 09/17/2022] [Revised: 11/30/2022] [Accepted: 11/30/2022] [Indexed: 06/17/2023]
Abstract
Image steganography is a scheme that hides secret information in a cover image without being perceived. Most of the existing steganography methods are more concerned about the visual similarity between the stego image and the cover image, and they ignore the recovery accuracy of secret information. In this paper, the steganography method based on invertible neural networks is proposed, which can generate stego images with high invisibility and security and can achieve lossless recovery for secret information. In addition, this paper introduces a mapping module that can compress information actually embedded to improve the quality of the stego image and its antidetection ability. In order to restore message and prevent loss, the secret information is converted into a binary sequence and then embedded in the cover image through the forward operation of the invertible neural networks. This information will then be recovered from the stego image through the inverse operation of the invertible neural networks. Experimental results show that the proposed method in this paper has achieved competitive results in the visual quality and safety of stego images and achieved 100% accuracy in information extraction.
Collapse
|
9
|
Grzesiak K, Piotrowski Z. NN-Based 8FSK Demodulator for the Covert Channel. Sensors (Basel) 2022; 22:7181. [PMID: 36236279 PMCID: PMC9573507 DOI: 10.3390/s22197181] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 08/31/2022] [Revised: 09/15/2022] [Accepted: 09/16/2022] [Indexed: 06/16/2023]
Abstract
In this article, a superposition-based covert channel and its demodulator were proposed and examined. As a covert waveform, an 8FSK modulation was selected. The impact of the channel estimation error and resulting imperfect SIC operation (successive interference cancelation) on the covert information demodulation process was considered. Especially for this imperfection, an NN-based demodulator was proposed. The superiority of this solution over the traditional 8FSK correlator-based receiver was examined for various cases, including the hard- and soft-decision detectors. It was proven that, although NN does not provide BER values equal to zero, even for the perfect SIC, it generally overcomes the traditional correlator-based 8FSK demodulator. Simulation results showed that the NN-base demodulator, in the case of additional covert channel coding, provides error-free demodulation, even for four-times greater channel gain error.
Collapse
|
10
|
Ding K, Hu T, Niu W, Liu X, He J, Yin M, Zhang X. A Novel Steganography Method for Character-Level Text Image Based on Adversarial Attacks. Sensors (Basel) 2022; 22:6497. [PMID: 36080965 PMCID: PMC9460549 DOI: 10.3390/s22176497] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 07/08/2022] [Revised: 08/03/2022] [Accepted: 08/16/2022] [Indexed: 06/15/2023]
Abstract
The Internet has become the main channel of information communication, which contains a large amount of secret information. Although network communication provides a convenient channel for human communication, there is also a risk of information leakage. Traditional image steganography algorithms use manually crafted steganographic algorithms or custom models for steganography, while our approach uses ordinary OCR models for information embedding and extraction. Even if our OCR models for steganography are intercepted, it is difficult to find their relevance to steganography. We propose a novel steganography method for character-level text images based on adversarial attacks. We exploit the complexity and uniqueness of neural network boundaries and use neural networks as a tool for information embedding and extraction. We use an adversarial attack to embed the steganographic information into the character region of the image. To avoid detection by other OCR models, we optimize the generation of the adversarial samples and use a verification model to filter the generated steganographic images, which, in turn, ensures that the embedded information can only be recognized by our local model. The decoupling experiments show that the strategies we adopt to weaken the transferability can reduce the possibility of other OCR models recognizing the embedded information while ensuring the success rate of information embedding. Meanwhile, the perturbations we add to embed the information are acceptable. Finally, we explored the impact of different parameters on the algorithm with the potential of our steganography algorithm through parameter selection experiments. We also verify the effectiveness of our validation model to select the best steganographic images. The experiments show that our algorithm can achieve a 100% information embedding rate and more than 95% steganography success rate under the set condition of 3 samples per group. In addition, our embedded information can be hardly detected by other OCR models.
Collapse
Affiliation(s)
- Kangyi Ding
- Institute for Cyber Security, School of Computer Science and Engineering, University of Electronic Science and Technology of China (UESTC), Chengdu 611731, China
- Institute of Computer Application, China Academy of Engineering Physics, Mianyang 621900, China
| | - Teng Hu
- Institute of Computer Application, China Academy of Engineering Physics, Mianyang 621900, China
| | - Weina Niu
- Institute for Cyber Security, School of Computer Science and Engineering, University of Electronic Science and Technology of China (UESTC), Chengdu 611731, China
| | - Xiaolei Liu
- Institute of Computer Application, China Academy of Engineering Physics, Mianyang 621900, China
| | - Junpeng He
- Institute for Cyber Security, School of Computer Science and Engineering, University of Electronic Science and Technology of China (UESTC), Chengdu 611731, China
| | - Mingyong Yin
- Institute of Computer Application, China Academy of Engineering Physics, Mianyang 621900, China
| | - Xiaosong Zhang
- Institute for Cyber Security, School of Computer Science and Engineering, University of Electronic Science and Technology of China (UESTC), Chengdu 611731, China
| |
Collapse
|
11
|
Zhang Y, Ren Y, Liu Y, Wang F, Zhang H, Liu K. Preservation and Encryption in DNA Digital Data Storage. Chempluschem 2022; 87:e202200183. [PMID: 35856827 DOI: 10.1002/cplu.202200183] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 05/19/2022] [Revised: 07/01/2022] [Indexed: 11/08/2022]
Abstract
The exponential growth of the total amount of global data presents a huge challenge to mainstream storage media. The emergence of molecular digital storage inspires the development of the new-generation higher-density digital data storage. In particular, DNA with high storage density, reproducibility, and long recoverable lifetime behaves the ideal representative of molecular digital storage media. With the development of DNA synthesis and sequencing technologies and the reduction of cost, DNA digital storage has attracted more and more attention and achieved significant breakthroughs. Herein, this Review briefly describes the workflow of DNA storage, and highlights the storage step of DNA digital data storage. Then, according to different information storage forms, the current DNA information encryption methods are emphatically expounded. Finally, the brief perspectives on the current challenges and optimizing proposals in DNA information preservation and encryption are presented.
Collapse
Affiliation(s)
- Yi Zhang
- State Key Laboratory of Rare Earth Resource Utilization, Changchun Institute of Applied Chemistry, Chinese Academy of Sciences, Changchun, 130022, P. R. China
| | - Yubin Ren
- Department of Chemistry, Tsinghua University, Beijing, 100084, P. R. China
| | - Yangyi Liu
- Department of Chemistry, Tsinghua University, Beijing, 100084, P. R. China
| | - Fan Wang
- State Key Laboratory of Rare Earth Resource Utilization, Changchun Institute of Applied Chemistry, Chinese Academy of Sciences, Changchun, 130022, P. R. China
| | - Hongjie Zhang
- State Key Laboratory of Rare Earth Resource Utilization, Changchun Institute of Applied Chemistry, Chinese Academy of Sciences, Changchun, 130022, P. R. China
- Department of Chemistry, Tsinghua University, Beijing, 100084, P. R. China
| | - Kai Liu
- State Key Laboratory of Rare Earth Resource Utilization, Changchun Institute of Applied Chemistry, Chinese Academy of Sciences, Changchun, 130022, P. R. China
- Department of Chemistry, Tsinghua University, Beijing, 100084, P. R. China
| |
Collapse
|
12
|
Zheng H, Zhou C, Li X, Guo Z, Wang T. A Novel Steganography-Based Pattern for Print Matter Anti-Counterfeiting by Smartphone Cameras. Sensors (Basel) 2022; 22:s22093394. [PMID: 35591083 PMCID: PMC9104732 DOI: 10.3390/s22093394] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 03/19/2022] [Revised: 04/24/2022] [Accepted: 04/26/2022] [Indexed: 11/26/2022]
Abstract
Print matter authentication based on anti-counterfeiting techniques has received continuously increasing concern from academia and industry. However, the existing printing anti-counterfeiting solutions often have the defects of poor identification experience, high cost, or weak anti-counterfeiting ability, and cannot achieve pre-sale anti-counterfeiting. Therefore, a novel steganography-based pattern for print matter anti-counterfeiting by smartphone cameras is proposed in this study. Firstly, every pixel in the original binary message image (such as QR code) is replaced by a square pixel block with the same binary gray value of 0 or 255 (the first-level expansion). Secondly, the obtained image is encrypted based on the logistic chaotic sequence, and then scrambled by Arnold transform. Lastly, once again every pixel in the generated image is replaced with a square pixel block (the second-level expansion), the size and gray value of which can be set to control the semi-fragile ability to distinguish an originally printed pattern from its illegitimate copy. If the message extracted from the printed pattern through the inverse procedure is complete enough to decode and read, the pattern is assumed to be an original print. Experimental results verify the advancement and effectiveness of the proposed scheme in distinguishing the copied pattern.
Collapse
Affiliation(s)
- Hong Zheng
- College of Artificial Intelligence, Nanchang Institute of Science and Technology, Nanchang 330108, China;
- School of Electronic Information, Wuhan University, Wuhan 430072, China; (C.Z.); (Z.G.); (T.W.)
- Correspondence:
| | - Chengzhuo Zhou
- School of Electronic Information, Wuhan University, Wuhan 430072, China; (C.Z.); (Z.G.); (T.W.)
| | - Xi Li
- College of Artificial Intelligence, Nanchang Institute of Science and Technology, Nanchang 330108, China;
| | - Zhongyuan Guo
- School of Electronic Information, Wuhan University, Wuhan 430072, China; (C.Z.); (Z.G.); (T.W.)
| | - Tianyu Wang
- School of Electronic Information, Wuhan University, Wuhan 430072, China; (C.Z.); (Z.G.); (T.W.)
| |
Collapse
|
13
|
Kuznetsov A, Onikiychuk A, Peshkova O, Gancarczyk T, Warwas K, Ziubina R. Direct Spread Spectrum Technology for Data Hiding in Audio. Sensors (Basel) 2022; 22:s22093115. [PMID: 35590805 PMCID: PMC9105752 DOI: 10.3390/s22093115] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 03/14/2022] [Revised: 04/11/2022] [Accepted: 04/15/2022] [Indexed: 02/01/2023]
Abstract
Direct spread spectrum technology is traditionally used in radio communication systems with multiple access, for example, in CDMA standards, in global satellite navigation systems, in Wi-Fi network wireless protocols, etc. It ensures high security and reliability of information transfer. In addition, spread spectrum technology provides the transmitted signals with a noise-like appearance, thus hiding the semantic content of the messages. We researched this technology for other implementations. The purpose of our study was to investigate new technologies for hiding data in multimedia files. In particular, we investigated the direct spread spectrum in the context of the development of methods for hiding data in audio containers. We considered various spreading sequences (chip codes) and also explored their use for hiding information in audio files. We conducted experimental studies and estimated the bit error rate (BER) in the recovered data. The article also evaluates the distortion of an audio container by the peak signal-to-noise ratio (PSNR). The results of our research enable us to find out which method of forming chip codes gives a lower BER with equal PSNR. We provide recommendations on the formation of spreading sequences to reliably and safely hide informational messages in audio files.
Collapse
Affiliation(s)
- Alexandr Kuznetsov
- Department of Information Systems and Technologies Security, V.N. Karazin Kharkiv National University, Svobody Sq. 4, 61022 Kharkiv, Ukraine; (A.K.); (A.O.); (O.P.)
- JSC “Institute of Information Technologies”, Bakulin St. 12, 61022 Kharkiv, Ukraine
| | - Alexander Onikiychuk
- Department of Information Systems and Technologies Security, V.N. Karazin Kharkiv National University, Svobody Sq. 4, 61022 Kharkiv, Ukraine; (A.K.); (A.O.); (O.P.)
| | - Olga Peshkova
- Department of Information Systems and Technologies Security, V.N. Karazin Kharkiv National University, Svobody Sq. 4, 61022 Kharkiv, Ukraine; (A.K.); (A.O.); (O.P.)
| | - Tomasz Gancarczyk
- Department of Computer Science and Automatics, University of Bielsko-Biala, Willowa St. 2, 43309 Bielsko-Biala, Poland; (T.G.); (K.W.)
| | - Kornel Warwas
- Department of Computer Science and Automatics, University of Bielsko-Biala, Willowa St. 2, 43309 Bielsko-Biala, Poland; (T.G.); (K.W.)
| | - Ruslana Ziubina
- Department of Computer Science and Automatics, University of Bielsko-Biala, Willowa St. 2, 43309 Bielsko-Biala, Poland; (T.G.); (K.W.)
- Correspondence:
| |
Collapse
|
14
|
Usama M, Yaman U. Embedding Information into or onto Additively Manufactured Parts: A Review of QR Codes, Steganography and Watermarking Methods. Materials (Basel) 2022; 15:2596. [PMID: 35407928 DOI: 10.3390/ma15072596] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 02/11/2022] [Revised: 03/25/2022] [Accepted: 03/29/2022] [Indexed: 02/01/2023]
Abstract
The paper gives a detailed review of the approaches adopted for embedding information into/onto additively manufactured parts. The primary purpose of this paper is to review all the techniques adopted for embedding information, highlight notable trends and improvements in these works, and provide design and manufacturing pipelines to realize most of these works. It classifies these approaches into four different categories and summarizes the works carried out in each field. It also compares all the results in textual and tabular forms and then gives a detailed conclusion of the best works in terms of application and effectiveness. The four categories discussed are 3D QR codes, 3D watermarking, steganography and nonclassified methods. Lastly, it discusses the future extensions and potential improvements in the field of embedding information, while exploring manufacturing technologies.
Collapse
|
15
|
Adee R, Mouratidis H. A Dynamic Four-Step Data Security Model for Data in Cloud Computing Based on Cryptography and Steganography. Sensors (Basel) 2022; 22:1109. [PMID: 35161853 PMCID: PMC8839104 DOI: 10.3390/s22031109] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 12/15/2021] [Revised: 01/27/2022] [Accepted: 01/28/2022] [Indexed: 06/14/2023]
Abstract
Cloud computing is a rapidly expanding field. It allows users to access computer system resources as needed, particularly data storage and computational power, without managing them directly. This paper aims to create a data security model based on cryptography and steganography for data in cloud computing that seeks to reduce existing security and privacy concerns, such as data loss, data manipulation, and data theft. To identify the problem and determine its core cause, we studied various literature on existing cloud computing security models. This study utilizes design science research methodology. The design science research approach includes problem identification, requirements elicitation, artifact design and development, demonstration, and assessment. Design thinking and the Python programming language are used to build the artifact, and discussion about its working is represented using histograms, tables, and algorithms. This paper's output is a four-step data security model based on Rivest-Shamir-Adleman, Advanced Encryption Standard, and identity-based encryption algorithms alongside Least Significant Bit steganography. The four steps are data protection and security through encryption algorithms, steganography, data backup and recovery, and data sharing. This proposed approach ensures more cloud data redundancy, flexibility, efficiency, and security by protecting data confidentiality, privacy, and integrity from attackers.
Collapse
Affiliation(s)
- Rose Adee
- Department of Computer and Systems Sciences, Stockholm University, Borgarfjordsgatan 12, Kista, 164 40 Stockholm, Sweden;
| | - Haralambos Mouratidis
- Department of Computer and Systems Sciences, Stockholm University, Borgarfjordsgatan 12, Kista, 164 40 Stockholm, Sweden;
- Institute for Analytics and Data Science, University of Essex, Colchester CO4 3SQ, UK
| |
Collapse
|
16
|
Deng ZL, Tu QA, Wang Y, Wang ZQ, Shi T, Feng Z, Qiao XC, Wang GP, Xiao S, Li X. Vectorial Compound Metapixels for Arbitrary Nonorthogonal Polarization Steganography. Adv Mater 2021; 33:e2103472. [PMID: 34463380 DOI: 10.1002/adma.202103472] [Citation(s) in RCA: 22] [Impact Index Per Article: 7.3] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 05/07/2021] [Revised: 06/20/2021] [Indexed: 06/13/2023]
Abstract
Malus' law regulating the intensity of light when passed through a polarizer, forms the solid basis for image steganography based on orthogonal polarizations of light to convey hidden information without adverse perceptions, which underpins important practices in information encryptions, anti-counterfeitings, and security labels. Unfortunately, the restriction to orthogonal states being taken for granted in the common perceptions fails to advance cryptoinformation to upgraded levels of security. By introducing a vectorial compound metapixel design, arbitrary nonorthogonal polarization multiplexing of independent grayscale images with high fidelity and strong concealment is demonstrated. The Jones matrix treatment of compound metapixels consisting of double atoms with tailored in-plane orientation sum and difference allows point-by-point configuring of both the amplitude and polarization rotations of the output beam in an analytical and linear form. With this, both multiplexing two continuous grayscale images in arbitrary nonorthogonal polarization angles and concealing grayscale image on another in an arbitrary disclosure angle window are experimentally demonstrated in the visible TiO2 metasurface platform. The methods shed new light on multifarious metaoptics by harnessing the new degree of freedom and unlock the full potential of metasurface polarization optics.
Collapse
Affiliation(s)
- Zi-Lan Deng
- Guangdong Provincial Key Laboratory of Optical Fiber Sensing and Communications, Institute of Photonics Technology, Jinan University, Guangzhou, 510632, China
| | - Qing-An Tu
- Guangdong Provincial Key Laboratory of Optical Fiber Sensing and Communications, Institute of Photonics Technology, Jinan University, Guangzhou, 510632, China
| | - Yujie Wang
- Ministry of Industry and Information Technology Key Laboratory of Micro-Nano Optoelectronic Information System, Harbin Institute of Technology (Shenzhen), Shenzhen, 518055, China
| | - Zhi-Qiang Wang
- Guangdong Provincial Key Laboratory of Optical Fiber Sensing and Communications, Institute of Photonics Technology, Jinan University, Guangzhou, 510632, China
| | - Tan Shi
- Guangdong Provincial Key Laboratory of Optical Fiber Sensing and Communications, Institute of Photonics Technology, Jinan University, Guangzhou, 510632, China
| | - Ziwei Feng
- Guangdong Provincial Key Laboratory of Optical Fiber Sensing and Communications, Institute of Photonics Technology, Jinan University, Guangzhou, 510632, China
| | - Xiao-Chen Qiao
- Guangdong Provincial Key Laboratory of Optical Fiber Sensing and Communications, Institute of Photonics Technology, Jinan University, Guangzhou, 510632, China
| | - Guo Ping Wang
- Institute of Microscale Optoelectronics, Shenzhen University, Shenzhen, 518060, China
| | - Shumin Xiao
- Ministry of Industry and Information Technology Key Laboratory of Micro-Nano Optoelectronic Information System, Harbin Institute of Technology (Shenzhen), Shenzhen, 518055, China
| | - Xiangping Li
- Guangdong Provincial Key Laboratory of Optical Fiber Sensing and Communications, Institute of Photonics Technology, Jinan University, Guangzhou, 510632, China
| |
Collapse
|
17
|
Sawicki K, Bieszczad G, Sosnowski T. ThermoSteg-Covert Channel for Microbolometer Thermographic Cameras. Sensors (Basel) 2021; 21:s21196395. [PMID: 34640716 PMCID: PMC8513060 DOI: 10.3390/s21196395] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 08/10/2021] [Revised: 09/18/2021] [Accepted: 09/21/2021] [Indexed: 11/16/2022]
Abstract
The article presents a new concept—steganography in thermography. Steganography is a technique of hiding information in a non-obvious way and belongs to sciences related to information security. The proposed method, called ThermoSteg, uses a modification of one of the parameters of the thermal imaging camera—integration time—to embed the signal containing hidden information. Integration time changing makes the microbolometer array heat up while reading the sensors. The covert information can be extracted from the stream of thermograms recorded by another thermal camera that observes the first one. The covert channel created with the ThermoSteg method allows the transmission of covert data using a thermal sensor as a wireless data transmitter. This article describes a physical phenomenon that is exploited by the ThermoSteg method and two proposed methods of covert data extraction, and presents the results of experiments.
Collapse
|
18
|
Sawicki K, Bieszczad G, Piotrowski Z. StegoFrameOrder-MAC Layer Covert Network Channel for Wireless IEEE 802.11 Networks. Sensors (Basel) 2021; 21:6268. [PMID: 34577475 DOI: 10.3390/s21186268] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 08/04/2021] [Revised: 09/03/2021] [Accepted: 09/16/2021] [Indexed: 11/18/2022]
Abstract
The proposed StegoFrameOrder (SFO) method enables the transmission of covert data in wireless computer networks exploiting non-deterministic algorithms of medium access (such as the distributed coordination function), especially in IEEE 802.11 networks. Such a covert channel enables the possibility of leaking crucial information outside secured network in a manner that is difficult to detect. The SFO method embeds hidden bits of information in the relative order of frames transmitted by wireless terminals operating on the same radio channel. The paper presents an idea of this covert channel, its implementation, and possible variants. The paper also discusses implementing the SFO method in a real environment and the experiments performed in the real-world scenario.
Collapse
|
19
|
Giron AA, Martina JE, Custódio R. Steganographic Analysis of Blockchains. Sensors (Basel) 2021; 21:4078. [PMID: 34199274 DOI: 10.3390/s21124078] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 04/13/2021] [Revised: 06/02/2021] [Accepted: 06/02/2021] [Indexed: 12/01/2022]
Abstract
Steganography is one of the ways to hide data between parties. Its use can be worrisome, e.g., to hide illegal communications. Researchers found that public blockchains can be an attractive place to hide communications; however, there is not much evidence of actual use in blockchains. Besides, previous work showed a lack of steganalysis methods for blockchains. In this context, we present a steganalysis approach for blockchains, evaluating it in Bitcoin and Ethereum, both popular cryptocurrencies. The main objective is to answer if one can find steganography in real case scenarios, focusing on LSB of addresses and nonces. Our sequential analysis included 253 GiB and 107 GiB of bitcoin and ethereum, respectively. We also analyzed up to 98 million bitcoin clusters. We found that bitcoin clusters could carry up to 360 KiB of hidden data if used for such a purpose. We have not found any concrete evidence of hidden data in the blockchains. The sequential analysis may not capture the perspective of the users of the blockchain network. In this case, we recommend clustering analysis, but it depends on the clustering method’s accuracy. Steganalysis is an essential aspect of blockchain security.
Collapse
|
20
|
Grzesiak K, Piotrowski Z. From Constellation Dithering to NOMA Multiple Access: Security in Wireless Systems. Sensors (Basel) 2021; 21:2752. [PMID: 33924708 DOI: 10.3390/s21082752] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 03/10/2021] [Revised: 03/26/2021] [Accepted: 04/12/2021] [Indexed: 12/02/2022]
Abstract
In recent years, there has been a noticeable increase in interest in the possibilities of embedding additional data in the constellation of an already existing information signal in radio technology. This solution more precisely is based on adding a low power signal (or signals) to a stronger signal (cover). As will be described in the article, this technique is used in numerous radio communication areas, such as watermarking, covert channel creation, and multiple access techniques. Typically, those areas are considered as independent research topics. Our comparison suggests that these areas are closely related. In this article, a comprehensive survey of the implementation of signal superposition is conducted with an emphasis on the similarities and differences between individual solutions. Since the nature of the signal model entails certain problems in the security area, we provide the reader with a review of the state-of-the-art research on this topic, including the PLS (physical layer security) and LPD (low probability of detection) issues.
Collapse
|
21
|
Hachaj T, Koptyra K, Ogiela MR. Eigenfaces-Based Steganography. Entropy (Basel) 2021; 23:e23030273. [PMID: 33668760 PMCID: PMC7996190 DOI: 10.3390/e23030273] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 01/30/2021] [Revised: 02/17/2021] [Accepted: 02/22/2021] [Indexed: 11/25/2022]
Abstract
In this paper we propose a novel transform domain steganography technique—hiding a message in components of linear combination of high order eigenfaces vectors. By high order we mean eigenvectors responsible for dimensions with low amount of overall image variance, which are usually related to high-frequency parameters of image (details). The study found that when the method was trained on large enough data sets, image quality was nearly unaffected by modification of some linear combination coefficients used as PCA-based features. The proposed method is only limited to facial images, but in the era of overwhelming influence of social media, hundreds of thousands of selfies uploaded every day to social networks do not arouse any suspicion as a potential steganography communication channel. From our best knowledge there is no description of any popular steganography method that utilizes eigenfaces image domain. Due to this fact we have performed extensive evaluation of our method using at least 200,000 facial images for training and robustness evaluation of proposed approach. The obtained results are very promising. What is more, our numerical comparison with other state-of-the-art algorithms proved that eigenfaces-based steganography is among most robust methods against compression attack. The proposed research can be reproduced because we use publicly accessible data set and our implementation can be downloaded.
Collapse
Affiliation(s)
- Tomasz Hachaj
- Institute of Computer Science, Pedagogical University of Krakow, 30-084 Krakow, Poland
- Correspondence:
| | - Katarzyna Koptyra
- Cryptography and Cognitive Informatics Laboratory, AGH University of Science and Technology, 30-059 Krakow, Poland; (K.K.); (M.R.O.)
| | - Marek R. Ogiela
- Cryptography and Cognitive Informatics Laboratory, AGH University of Science and Technology, 30-059 Krakow, Poland; (K.K.); (M.R.O.)
| |
Collapse
|
22
|
Wu Z, Guo J, Zhang C, Li C. Steganography and Steganalysis in Voice over IP: A Review. Sensors (Basel) 2021; 21:s21041032. [PMID: 33546240 PMCID: PMC7913304 DOI: 10.3390/s21041032] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 12/16/2020] [Revised: 01/21/2021] [Accepted: 01/28/2021] [Indexed: 11/16/2022]
Abstract
The rapid advance and popularization of VoIP (Voice over IP) has also brought security issues. VoIP-based secure voice communication has two sides: first, for legitimate users, the secret voice can be embedded in the carrier and transmitted safely in the channel to prevent privacy leakage and ensure data security; second, for illegal users, the use of VoIP Voice communication hides and transmits illegal information, leading to security incidents. Therefore, in recent years, steganography and steganography analysis based on VoIP have gradually become research hotspots in the field of information security. Steganography and steganalysis based on VoIP can be divided into two categories, depending on where the secret information is embedded: steganography and steganalysis based on voice payload or protocol. The former mainly regards voice payload as the carrier, and steganography or steganalysis is performed with respect to the payload. It can be subdivided into steganography and steganalysis based on FBC (fixed codebook), LPC (linear prediction coefficient), and ACB (adaptive codebook). The latter uses various protocols as the carrier and performs steganography or steganalysis with respect to some fields of the protocol header and the timing of the voice packet. It can be divided into steganography and steganalysis based on the network layer, the transport layer, and the application layer. Recent research results of steganography and steganalysis based on protocol and voice payload are classified in this paper, and the paper also summarizes their characteristics, advantages, and disadvantages. The development direction of future research is analyzed. Therefore, this research can provide good help and guidance for researchers in related fields.
Collapse
|
23
|
Sharma N, Anand A, Singh AK. Bio-signal data sharing security through watermarking: a technical survey. Computing 2021; 103:1883-1917. [PMCID: PMC7786322 DOI: 10.1007/s00607-020-00881-y] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 08/14/2020] [Accepted: 11/23/2020] [Indexed: 06/13/2023]
Abstract
Due to smart healthcare systems highly connected information and communications technologies, sensitive medical information and records are easily transmitted over the networks. However, stealing of healthcare data is increasing crime every day to greatly impact on financial loss. In order to this, researchers are developing various cost-effective bio-signal based data hiding techniques for smart healthcare applications. In this paper, we first introduce various aspects of data hiding along with major properties, generic embedding and extraction process, and recent applications. This survey provides a comprehensive survey on data hiding techniques, and their new trends for solving new challenges in real-world applications. Then, we survey the various notable bio-signal based data hiding techniques. The summary of some notable techniques in terms of their objective, type of data hiding, methodology and database used, performance metrics, important features, and limitations are also presented in tabular form. At the end, we discuss the major issues and research directions to explore the promising areas for future research.
Collapse
Affiliation(s)
- N. Sharma
- Department of CSE, NIT Patna, Patna, Bihar India
| | - A. Anand
- Department of CSE, NIT Patna, Patna, Bihar India
| | - A. K. Singh
- Department of CSE, NIT Patna, Patna, Bihar India
| |
Collapse
|
24
|
Bordel Sánchez B, Alcarria R, Robles T, Jara A. Protecting Physical Communications in 5G C-RAN Architectures through Resonant Mechanisms in Optical Media. Sensors (Basel) 2020; 20:s20154104. [PMID: 32717943 PMCID: PMC7435796 DOI: 10.3390/s20154104] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 06/23/2020] [Revised: 07/16/2020] [Accepted: 07/21/2020] [Indexed: 11/23/2022]
Abstract
Future 5G networks are characterized by three basic ideas: enhanced mobile broadband communications, massive machine-type communications, and ultra-low-latency communications. Any of these requirements needs, to be fulfilled, the implementation of high-efficiency technologies at all levels. This includes some of the costliest mechanisms in terms of computational time and bitrate: information protection solutions. Typical techniques in this area employ complex algorithms and large protocol headers, which strongly reduces the effective baud rate and latency of future 5G networks and communications. This is especially relevant in the access network, which in 5G networks will follow a cloud-based architecture, where thousands of different devices must communicate, before aggregating all those streams to be sent to the backbone. Then, new and more efficient mechanisms are needed in the cloud radio access networks (C-RAN) for future 5G systems. Therefore, in this paper it is proposed a novel information protection scheme for C-RAN architectures based on resonant phenomena in optical fibers communicating the fronthaul and backhaul in 5G networks. Resonant structures and physical nonlinearities generate a chaotic signal which may encrypt and hide at physical level every communication stream in a very efficient manner. To evaluate the proposed mechanism, an experimental validation based on simulation techniques is also described and results discussed.
Collapse
Affiliation(s)
- Borja Bordel Sánchez
- Escuela Politécnica Superior, Universidad Alfonso X el Sabio, UAX, Avenida Universidad, 1, Villanueva de la Cañada, 28691 Madrid, Spain
- Correspondence: ; Tel.: +34-91-067-3922
| | - Ramón Alcarria
- Department of Geospatial Engineering, Universidad Politécnica de Madrid, UPM Campus Sur, Km 7.5 de la Autovía de Valencia, 28031 Madrid, Spain;
| | - Tomás Robles
- Department of Information Systems, Universidad Politécnica de Madrid, UPM Campus Sur, Km 7.5 de la Autovía de Valencia, 28031 Madrid, Spain;
| | - Antonio Jara
- Institute of Information Systems, University of Applied Sciences Western Switzerland (HES-SO), Techno-Pôle 3, 3960 Sierre, Valais, Switzerland;
| |
Collapse
|
25
|
Abd-El-Atty B, Iliyasu AM, Alaskar H, Abd El-Latif AA. A Robust Quasi-Quantum Walks-Based Steganography Protocol for Secure Transmission of Images on Cloud-Based E-healthcare Platforms. Sensors (Basel) 2020; 20:s20113108. [PMID: 32486383 PMCID: PMC7309012 DOI: 10.3390/s20113108] [Citation(s) in RCA: 50] [Impact Index Per Article: 12.5] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 04/27/2020] [Revised: 05/28/2020] [Accepted: 05/29/2020] [Indexed: 11/16/2022]
Abstract
Traditionally, tamper-proof steganography involves using efficient protocols to encrypt the stego cover image and/or hidden message prior to embedding it into the carrier object. However, as the inevitable transition to the quantum computing paradigm beckons, its immense computing power will be exploited to violate even the best non-quantum, i.e., classical, stego protocol. On its part, quantum walks can be tailored to utilise their astounding 'quantumness' to propagate nonlinear chaotic behaviours as well as its sufficient sensitivity to alterations in primary key parameters both important properties for efficient information security. Our study explores using a classical (i.e., quantum-inspired) rendition of the controlled alternate quantum walks (i.e., CAQWs) model to fabricate a robust image steganography protocol for cloud-based E-healthcare platforms by locating content that overlays the secret (or hidden) bits. The design employed in our technique precludes the need for pre and/or post encryption of the carrier and secret images. Furthermore, our design simplifies the process to extract the confidential (hidden) information since only the stego image and primary states to run the CAQWs are required. We validate our proposed protocol on a dataset of medical images, which exhibited remarkable outcomes in terms of their security, good visual quality, high resistance to data loss attacks, high embedding capacity, etc., making the proposed scheme a veritable strategy for efficient medical image steganography.
Collapse
Affiliation(s)
- Bassem Abd-El-Atty
- Centre of Excellence in Cybersecurity, Quantum Information Processing, and Artificial Intelligence, Menoufia University, Shebin El-Koom 32511, Egypt;
| | - Abdullah M. Iliyasu
- Electrical Engineering Department, College of Engineering, Prince Sattam Bin Abdulaziz University, Al-Kharj 11942, Saudi Arabia
- School of Computing, Tokyo Institute of Technology, Yokohama 226-8502, Japan
- School of Computer Science and Technology, Changchun University of Science and Technology, Changchun 130022, China
- Correspondence: (A.M.I.); (A.A.A.E.-L.)
| | - Haya Alaskar
- Computer Science Department, Prince Sattam Bin Abdulaziz University, Al-Kharj 11942, Saudi Arabia;
| | - Ahmed A. Abd El-Latif
- Centre of Excellence in Cybersecurity, Quantum Information Processing, and Artificial Intelligence, Menoufia University, Shebin El-Koom 32511, Egypt;
- Mathematics and Computer Science Department, Faculty of Science, Menoufia University, P.O. Box 32511, Shebin El-Koom 32511, Egypt
- School of Information Technology and Computer Science, Nile University, 26th July Corridor, Sheikh Zayed City, Giza 12588, Egypt
- Correspondence: (A.M.I.); (A.A.A.E.-L.)
| |
Collapse
|
26
|
Koptyra K, Ogiela MR. Distributed Steganography in PDF Files-Secrets Hidden in Modified Pages. Entropy (Basel) 2020; 22:e22060600. [PMID: 33286372 PMCID: PMC7517136 DOI: 10.3390/e22060600] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.8] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 05/07/2020] [Revised: 05/15/2020] [Accepted: 05/26/2020] [Indexed: 11/16/2022]
Abstract
This paper shows how to diffuse a message and hide it in multiple PDF files. Presented method uses dereferenced objects and secret splitting or sharing algorithms. It is applicable to various types of PDF files, including text documents, presentations, scanned images etc. Because hiding process is based on structure manipulation, the solution may be easily combined with content-dependent steganographic techniques. The hidden pages are not visible in typical application usage, which was tested with seven different programs.
Collapse
|
27
|
Goyal LM, Mittal M, Kaushik R, Verma A, Kaur I, Roy S, Kim TH. Improved ECG Watermarking Technique Using Curvelet Transform. Sensors (Basel) 2020; 20:E2941. [PMID: 32455935 DOI: 10.3390/s20102941] [Citation(s) in RCA: 9] [Impact Index Per Article: 2.3] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 04/08/2020] [Revised: 05/16/2020] [Accepted: 05/20/2020] [Indexed: 11/16/2022]
Abstract
Hiding data in electrocardiogram signals are a big challenge due to the embedded information that can hamper the accuracy of disease detection. On the other hand, hiding data into ECG signals provides more security for, and authenticity of, the patient’s data. Some recent studies used non-blind watermarking techniques to embed patient information and data of a patient into ECG signals. However, these techniques are not robust against attacks with noise and show a low performance in terms of parameters such as peak signal to noise ratio (PSNR), normalized correlation (NC), mean square error (MSE), percentage residual difference (PRD), bit error rate (BER), structure similarity index measure (SSIM). In this study, an improved blind ECG-watermarking technique is proposed to embed the information of the patient’s data into the ECG signals using curvelet transform. The Euclidean distance between every two curvelet coefficients was computed to cluster the curvelet coefficients and after this, data were embedded into the selected clusters. This was an improvement not only in terms of extracting a hidden message from the watermarked ECG signals, but also robust against image-processing attacks. Performance metrics of SSIM, NC, PSNR and BER were used to measure the superiority of presented work. KL divergence and PRD were also used to reveal data hiding in curvelet coefficients of ECG without disturbing the original signal. The simulation results also demonstrated that the clustering method in the curvelet domain provided the best performance—even when the hidden messages were large size.
Collapse
|
28
|
Fan S, Wang D, Cheng J, Liu Y, Luo T, Cui D, Ke Y, Song J. Information Coding in a Reconfigurable DNA Origami Domino Array. Angew Chem Int Ed Engl 2020; 59:12991-12997. [PMID: 32304157 DOI: 10.1002/anie.202003823] [Citation(s) in RCA: 37] [Impact Index Per Article: 9.3] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 03/14/2020] [Indexed: 01/26/2023]
Abstract
DNA nanostructures with programmable nanoscale patterns has been achieved in the past decades, and molecular information coding (MIC) on those designed nanostructures has gained increasing attention for information security. However, achieving steganography and cryptography synchronously on DNA nanostructures remains a challenge. Herein, we demonstrated MIC in a reconfigurable DNA origami domino array (DODA), which can reconfigure intrinsic patterns but keep the DODA outline the same for steganography. When a set of keys (DNA strands) are added, the cryptographic data can be translated into visible patterns within DODA. More complex cryptography with the ASCII code within a programmable 6×6 lattice is demonstrated to demosntrate the versatility of MIC in the DODA. Furthermore, an anti-counterfeiting approach based on conformational transformation-mediated toehold strand displacement reaction is designed to protect MIC from decoding and falsification.
Collapse
Affiliation(s)
- Sisi Fan
- Institute of Nano Biomedicine and Engineering, Department of Instrument Science and Engineering, School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai, 200240, China
| | - Dongfang Wang
- Institute of Nano Biomedicine and Engineering, Department of Instrument Science and Engineering, School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai, 200240, China
| | - Jin Cheng
- Institute of Nano Biomedicine and Engineering, Department of Instrument Science and Engineering, School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai, 200240, China
| | - Yan Liu
- Institute of Nano Biomedicine and Engineering, Department of Instrument Science and Engineering, School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai, 200240, China
| | - Tao Luo
- Institute of Nano Biomedicine and Engineering, Department of Instrument Science and Engineering, School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai, 200240, China
| | - Daxiang Cui
- Institute of Nano Biomedicine and Engineering, Department of Instrument Science and Engineering, School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai, 200240, China
| | - Yonggang Ke
- Wallace H. Coulter Department of Biomedical Engineering, Georgia Institute of Technology and Emory University, Atlanta, GA, 30322, USA
| | - Jie Song
- Institute of Nano Biomedicine and Engineering, Department of Instrument Science and Engineering, School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai, 200240, China.,Institute of Cancer and Basic Medicine (IBMC), Chinese Academy of Sciences, The Cancer Hospital of the University of Chinese Academy of Sciences, Hangzhou, Zhejiang, 310022, China
| |
Collapse
|
29
|
Stoyanov B, Stoyanov B. BOOST: Medical Image Steganography Using Nuclear Spin Generator. Entropy (Basel) 2020; 22:e22050501. [PMID: 33286274 PMCID: PMC7516987 DOI: 10.3390/e22050501] [Citation(s) in RCA: 7] [Impact Index Per Article: 1.8] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 03/12/2020] [Revised: 04/15/2020] [Accepted: 04/21/2020] [Indexed: 11/16/2022]
Abstract
In this study, we present a medical image stego hiding scheme using a nuclear spin generator system. Detailed theoretical and experimental analysis is provided on the proposed algorithm using histogram analysis, peak signal-to-noise ratio, key space calculation, and statistical package analysis. The provided results show good performance of the brand new medical image steganographic scheme.
Collapse
|
30
|
Wang Q, Yang Q, Wu W. Graphene-Based Steganographic Aptasensor for Information Computing and Monitoring Toxins of Biofilm in Food. Front Microbiol 2020; 10:3139. [PMID: 32117086 PMCID: PMC7010922 DOI: 10.3389/fmicb.2019.03139] [Citation(s) in RCA: 32] [Impact Index Per Article: 8.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 12/02/2019] [Accepted: 12/27/2019] [Indexed: 12/18/2022] Open
Abstract
Fungi-forming biofilm would produce various toxins in food. The toxin contamination will cause great harm to food and human health. Herein, a novel graphene-based steganographic aptasensor was assembled for multifunctional applications, which depended on the specific recognition and information encoding ability of DNA aptamers [mycotoxins, including zearalenone (ZEN) and ochratoxin A (OTA) aptamers, as models] and the selective absorption and fluorescence quenching capacities of graphene oxide (GO). The graphene-based steganographic aptasensor can be regarded as an information encryption and steganographic system using GO as a cover, aptamers for specific target recognition as information carriers and dual targets (ZEN and OTA) as special keys. In our work, the fluorescence of capture probes (Cy3 aptamer and Alexa Fluor 488 aptamer) was quenched by GO to realize information encryption. In the presence of dual targets in the GO-APT solution, Cy3 aptamer (APT1), and Alexa Fluor 488 aptamer (APT2) were released from the surface of GO, decrypting the hidden information. In addition, our work offers a sensor for rapid and sensitive simultaneous fluorescence determination of ZEN and OTA. The detection limit of the aptasensor was 1.797 ng/ml for ZEN and 1.484 ng/ml for OTA. In addition, the graphene-based steganographic aptasensor can be used to construct a molecular logic gate system in which GO, aptamers, and mycotoxins are employed as the input and compounds and fluorescence signals were used as the output. This would be helpful to control the biofilm toxin in the future.
Collapse
Affiliation(s)
| | - Qingli Yang
- College of Food Science and Engineering, Qingdao Agricultural University, Qingdao, China
| | - Wei Wu
- College of Food Science and Engineering, Qingdao Agricultural University, Qingdao, China
| |
Collapse
|
31
|
Yeh JY, Chen CC, Liu PL, Huang YH. High-Payload Data-Hiding Method for AMBTC Decompressed Images. Entropy (Basel) 2020; 22:E145. [PMID: 33285920 DOI: 10.3390/e22020145] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 12/19/2019] [Revised: 01/17/2020] [Accepted: 01/23/2020] [Indexed: 11/23/2022]
Abstract
Data hiding is the art of embedding data into a cover image without any perceptual distortion of the cover image. Moreover, data hiding is a very crucial research topic in information security because it can be used for various applications. In this study, we proposed a high-capacity data-hiding scheme for absolute moment block truncation coding (AMBTC) decompressed images. We statistically analyzed the composition of the secret data string and developed a unique encoding and decoding dictionary search for adjusting pixel values. The dictionary was used in the embedding and extraction stages. The dictionary provides high data-hiding capacity because the secret data was compressed using dictionary-based coding. The experimental results of this study reveal that the proposed scheme is better than the existing schemes, with respect to the data-hiding capacity and visual quality.
Collapse
|
32
|
Battikh D, El Assad S, Hoang TM, Bakhache B, Deforges O, Khalil M. Comparative Study of Three Steganographic Methods Using a Chaotic System and Their Universal Steganalysis Based on Three Feature Vectors. Entropy (Basel) 2019; 21:e21080748. [PMID: 33267462 PMCID: PMC7515277 DOI: 10.3390/e21080748] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 06/27/2019] [Revised: 07/21/2019] [Accepted: 07/24/2019] [Indexed: 11/16/2022]
Abstract
In this paper, we firstly study the security enhancement of three steganographic methods by using a proposed chaotic system. The first method, namely the Enhanced Edge Adaptive Image Steganography Based on LSB Matching Revisited (EEALSBMR), is present in the spatial domain. The two other methods, the Enhanced Discrete Cosine Transform (EDCT) and Enhanced Discrete Wavelet transform (EDWT), are present in the frequency domain. The chaotic system is extremely robust and consists of a strong chaotic generator and a 2-D Cat map. Its main role is to secure the content of a message in case a message is detected. Secondly, three blind steganalysis methods, based on multi-resolution wavelet decomposition, are used to detect whether an embedded message is hidden in the tested image (stego image) or not (cover image). The steganalysis approach is based on the hypothesis that message-embedding schemes leave statistical evidence or structure in images that can be exploited for detection. The simulation results show that the Support Vector Machine (SVM) classifier and the Fisher Linear Discriminant (FLD) cannot distinguish between cover and stego images if the message size is smaller than 20% in the EEALSBMR steganographic method and if the message size is smaller than 15% in the EDCT steganographic method. However, SVM and FLD can distinguish between cover and stego images with reasonable accuracy in the EDWT steganographic method, irrespective of the message size.
Collapse
Affiliation(s)
- Dalia Battikh
- LASTRE Laboratory, Lebanese University, 210 Tripoli, Lebanon
| | - Safwan El Assad
- Institut d’Electronique et des Télécommunications de Rennes (IETR), UMR CNRS 6164, Université de Nantes—Polytech Nantes, Rue Christian Pauc CS 50609, CEDEX 3, 44306 Nantes, France
- Correspondence:
| | - Thang Manh Hoang
- School of Electronics and Telecommunications, Hanoi University of Science and Technology, 1 Dai Co Viet, Hai Ba Trung, Hanoi, Vietnam
| | - Bassem Bakhache
- LASTRE Laboratory, Lebanese University, 210 Tripoli, Lebanon
| | | | - Mohamad Khalil
- LASTRE Laboratory, Lebanese University, 210 Tripoli, Lebanon
| |
Collapse
|
33
|
Yang W, Wang S, Hu J, Ibrahim A, Zheng G, Macedo MJ, Johnstone MN, Valli C. A Cancelable Iris- and Steganography-Based User Authentication System for the Internet of Things. Sensors (Basel) 2019; 19:E2985. [PMID: 31284592 PMCID: PMC6651016 DOI: 10.3390/s19132985] [Citation(s) in RCA: 12] [Impact Index Per Article: 2.4] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 05/24/2019] [Revised: 07/02/2019] [Accepted: 07/04/2019] [Indexed: 11/16/2022]
Abstract
Remote user authentication for Internet of Things (IoT) devices is critical to IoT security, as it helps prevent unauthorized access to IoT networks. Biometrics is an appealing authentication technique due to its advantages over traditional password-based authentication. However, the protection of biometric data itself is also important, as original biometric data cannot be replaced or reissued if compromised. In this paper, we propose a cancelable iris- and steganography-based user authentication system to provide user authentication and secure the original iris data. Most of the existing cancelable iris biometric systems need a user-specific key to guide feature transformation, e.g., permutation or random projection, which is also known as key-dependent transformation. One issue associated with key-dependent transformations is that if the user-specific key is compromised, some useful information can be leaked and exploited by adversaries to restore the original iris feature data. To mitigate this risk, the proposed scheme enhances system security by integrating an effective information-hiding technique-steganography. By concealing the user-specific key, the threat of key exposure-related attacks, e.g., attacks via record multiplicity, can be defused, thus heightening the overall system security and complementing the protection offered by cancelable biometric techniques.
Collapse
Affiliation(s)
- Wencheng Yang
- Security Research Institute, Edith Cowan University, Perth, WA 6207, Australia.
| | - Song Wang
- Department of Engineering, La Trobe University, Melbourne, VIC 3083, Australia
| | - Jiankun Hu
- School of Engineering and Information Technology, University of New South Wales, Canberra, ACT 2600, Australia
| | - Ahmed Ibrahim
- Security Research Institute, Edith Cowan University, Perth, WA 6207, Australia
| | - Guanglou Zheng
- Security Research Institute, Edith Cowan University, Perth, WA 6207, Australia
| | - Marcelo Jose Macedo
- Security Research Institute, Edith Cowan University, Perth, WA 6207, Australia
| | - Michael N Johnstone
- Security Research Institute, Edith Cowan University, Perth, WA 6207, Australia
| | - Craig Valli
- Security Research Institute, Edith Cowan University, Perth, WA 6207, Australia
| |
Collapse
|
34
|
Yang CF, Liu FL, Ge SK, Lu JC, Huang JW. Locating secret messages based on quantitative steganalysis. Math Biosci Eng 2019; 16:4908-4922. [PMID: 31499696 DOI: 10.3934/mbe.2019247] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/10/2023]
Abstract
Steganography poses a serious challenge to forensics because investigators cannot identify even traces of secret messages embedded using a steganographer. Contrarily, the objective of locating steganalysis is to locate the embedded message, which should help extract the secret message. In this paper, a methodology of locating steganalysis using quantitative steganalysis is presented for multiple stego images with embedded messages along the same embedding path. Three typical quantitative steganalysis methods are applied to the methodology to locate the messages embedded using LSB re-placement. Experimental results show that the presented methods can reliably estimate the embedding positions, which verifies the validity of the presented methodology. The presented methodology points out a new use of quantitative steganalysis, and further demonstrates that it is necessary to design more precise quantitative steganalysis methods.
Collapse
Affiliation(s)
- Chun Fang Yang
- State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, Henan, 450001, China
| | - Fen Lin Liu
- State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, Henan, 450001, China
| | - Shuang Kui Ge
- Beijing Institute of Electronic Technology Application, Beijing, 100000, China
| | - Ji Cang Lu
- State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, Henan, 450001, China
| | - Jun Wei Huang
- HERE North American LLC, Burlington, Massachusetts, 01803, USA
| |
Collapse
|
35
|
Abstract
Information hiding aims to achieve secret communication via certain carrier. However, these carrier-based methods often have different kinds of deficiencies. In order to solve the problems addressed by the traditional information hiding methods such as the difficult balance between secret embedding rate and detection rate, this paper proposes a novel approach which utilizes Augmented Reality (AR) to achieve secret communication. In this paper, we present an AR based information hiding architecture which combines information hiding, augmented reality, and deep learning methods altogether. The proposed architecture basically follows the idea of secret-key matching policy. The secret sender first maps the secret message to objects, images or coordinates, etc. The mapped objects, images or coordinates then serve as the secret key for further secret revealing. The secret key and concealing model are shared between two communication parties instead of direct transmitting the secret messages. Different secret keys can be combined in order to generate more mapping sequences. Also, deep learning based models are integrated in the architecture to extend the mapping varieties. By taking advantage of the augmented reality technique, the secret messages can be transmitted in various formats which results in higher secret embedding rate in potential. Furthermore, the proposed architecture can be seen as a useful application of coverless information hiding scheme. The experimental system realizes the proposed architecture by implementing convolutional neural network (CNN) based real-time object detection, image recognition, augmented reality and secret-key matching altogether which shows great promise in practice.
Collapse
Affiliation(s)
- Chuan Long Li
- School of Computer and Software, Nanjing University of Information Science and Technology, Ning Liu Road, No. 219, Nanjing, 210044, China
- Jiangsu Engineering Centre of Network Monitoring, Ning Liu Road, No. 219, Nanjing, 210044, China
| | - Xing Ming Sun
- School of Computer and Software, Nanjing University of Information Science and Technology, Ning Liu Road, No. 219, Nanjing, 210044, China
- Jiangsu Engineering Centre of Network Monitoring, Ning Liu Road, No. 219, Nanjing, 210044, China
| | - Yu Qian Li
- School of Earth and Environmental Sciences, University of Manchester, Oxford Road, Manchester, M13 9PY, United Kingdom
| |
Collapse
|
36
|
Zhu QY, Zhang FR, Du Y, Zhang XX, Lu JY, Yao QF, Huang WT, Ding XZ, Xia LQ. Graphene-Based Steganographically Aptasensing System for Information Computing, Encryption and Hiding, Fluorescence Sensing and in Vivo Imaging of Fish Pathogens. ACS Appl Mater Interfaces 2019; 11:8904-8914. [PMID: 30730133 DOI: 10.1021/acsami.8b22592] [Citation(s) in RCA: 10] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/09/2023]
Abstract
Inspired by information processing and communication of life based on complex molecular interactions, some artificial (bio)chemical systems have been developed for applications in molecular information processing or chemo/biosensing and imaging. However, little attention has been paid to simultaneously and comprehensively utilize the information computing, encoding, and molecular recognition capabilities of molecular-level systems (such as DNA-based systems) for multifunctional applications. Herein, a graphene-based steganographically aptasensing system was constructed for multifunctional application, which relies on specific molecular recognition and information encoding abilities of DNA aptamers ( Aeromonas hydrophila and Edwardsiella tarda-binding aptamers as models) and the selective adsorption and fluorescence quenching capacities of graphene oxide (GO). Although graphene-DNA systems have been widely used in biosensors and diagnostics, our proposed graphene-based aptasensing system can not only be utilized for fluorescence sensing and in vivo imaging of fish pathogens ( A. hydrophila and E. tarda), but can also function as a molecular-level logic computing system where the combination of matters (specific molecules or materials) as inputs produces the resulting product (matter level) or fluorescence (energy level) changes as two outputs. More importantly and interestingly, our graphene-based steganographically aptasensing system can also serve as a generally doubly cryptographic and steganographic system for sending different secret messages by using pathogen-binding DNA aptamers as information carriers, GO as a cover, and a pair of keys, that is, target pathogen as a public key, the encryption key used to encode or decode a message in DNA as a private key. Our study not only provides a novel nanobiosensing assay for rapid and effective sensing and in vivo imaging of fish pathogens, but also demonstrates a prototype of (bio)molecular steganography as an important and interesting extension direction of molecular information technology, which is helpful in probably promoting the development of multifunctional molecular-level devices or machines.
Collapse
Affiliation(s)
- Qiu Yan Zhu
- State Key Laboratory of Developmental Biology of Freshwater Fish, Hunan Provincial Key Laboratory of Microbial Molecular Biology, College of Life Science , Hunan Normal University , Changsha 410081 , P. R. China
| | - Fu Rui Zhang
- State Key Laboratory of Developmental Biology of Freshwater Fish, Hunan Provincial Key Laboratory of Microbial Molecular Biology, College of Life Science , Hunan Normal University , Changsha 410081 , P. R. China
| | - Yan Du
- State Key Laboratory of Developmental Biology of Freshwater Fish, Hunan Provincial Key Laboratory of Microbial Molecular Biology, College of Life Science , Hunan Normal University , Changsha 410081 , P. R. China
| | - Xin Xing Zhang
- State Key Laboratory of Developmental Biology of Freshwater Fish, Hunan Provincial Key Laboratory of Microbial Molecular Biology, College of Life Science , Hunan Normal University , Changsha 410081 , P. R. China
| | - Jiao Yang Lu
- State Key Laboratory of Developmental Biology of Freshwater Fish, Hunan Provincial Key Laboratory of Microbial Molecular Biology, College of Life Science , Hunan Normal University , Changsha 410081 , P. R. China
| | - Qing Feng Yao
- State Key Laboratory of Developmental Biology of Freshwater Fish, Hunan Provincial Key Laboratory of Microbial Molecular Biology, College of Life Science , Hunan Normal University , Changsha 410081 , P. R. China
| | - Wei Tao Huang
- State Key Laboratory of Developmental Biology of Freshwater Fish, Hunan Provincial Key Laboratory of Microbial Molecular Biology, College of Life Science , Hunan Normal University , Changsha 410081 , P. R. China
| | - Xue Zhi Ding
- State Key Laboratory of Developmental Biology of Freshwater Fish, Hunan Provincial Key Laboratory of Microbial Molecular Biology, College of Life Science , Hunan Normal University , Changsha 410081 , P. R. China
| | - Li Qiu Xia
- State Key Laboratory of Developmental Biology of Freshwater Fish, Hunan Provincial Key Laboratory of Microbial Molecular Biology, College of Life Science , Hunan Normal University , Changsha 410081 , P. R. China
| |
Collapse
|
37
|
Hu D, Lu Y, Cao Y, Zhang Y, Xu Y, Li W, Gao F, Cai B, Guan BO, Qiu CW, Li X. Laser-Splashed Three-Dimensional Plasmonic Nanovolcanoes for Steganography in Angular Anisotropy. ACS Nano 2018; 12:9233-9239. [PMID: 30169016 DOI: 10.1021/acsnano.8b03964] [Citation(s) in RCA: 7] [Impact Index Per Article: 1.2] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/09/2023]
Abstract
Planar optics constructed from subwavelength artificial atoms have been suggested as a route to the physical realization of steganography with controlled intrinsic redundancy at single-pixel levels. Unfortunately, two-dimensional geometries with uniform flat profiles offer limited structural redundancy and make it difficult to create advanced crypto-information in multiplexed physical divisions. Here, we reveal that splashing three-dimensional (3D) plasmonic nanovolcanoes could allow for a steganographic strategy in angular anisotropy, with high resolution, full coloration, and transient control of structural profiles. Highly reproducible 3D morphologies of volcanic nanosplashes are demonstrated by creating a standardized recipe of laser parameters. Such single nanovolcanoes can be well controlled individually at different splashing stages and thus provide a lithography-free fashion to access various spectral responses of angularly coordinated transverse and vertical modes, leading to the full-range coloration. This chip-scale demonstration of steganographic color images in angular anisotropy unfolds a long-ignored scheme for structured metasurfaces and thereby provides a paradigm for information security and anticounterfeiting.
Collapse
Affiliation(s)
| | | | | | | | | | - Wenxue Li
- College of Physical Science and Technology , Sichuan University , Chengdu , Sichuan 610064 , China
| | - Fuhua Gao
- College of Physical Science and Technology , Sichuan University , Chengdu , Sichuan 610064 , China
| | | | | | - Cheng-Wei Qiu
- Department of Electrical and Computer Engineering , National University of Singapore , 4 Engineering Drive 3 , Singapore 117583
| | | |
Collapse
|
38
|
Venčkauskas A, Morkevicius N, Bagdonas K, Damaševičius R, Maskeliūnas R. A Lightweight Protocol for Secure Video Streaming. Sensors (Basel) 2018; 18:s18051554. [PMID: 29757988 PMCID: PMC5982168 DOI: 10.3390/s18051554] [Citation(s) in RCA: 19] [Impact Index Per Article: 3.2] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 04/16/2018] [Revised: 05/10/2018] [Accepted: 05/11/2018] [Indexed: 11/16/2022]
Abstract
The Internet of Things (IoT) introduces many new challenges which cannot be solved using traditional cloud and host computing models. A new architecture known as fog computing is emerging to address these technological and security gaps. Traditional security paradigms focused on providing perimeter-based protections and client/server point to point protocols (e.g., Transport Layer Security (TLS)) are no longer the best choices for addressing new security challenges in fog computing end devices, where energy and computational resources are limited. In this paper, we present a lightweight secure streaming protocol for the fog computing "Fog Node-End Device" layer. This protocol is lightweight, connectionless, supports broadcast and multicast operations, and is able to provide data source authentication, data integrity, and confidentiality. The protocol is based on simple and energy efficient cryptographic methods, such as Hash Message Authentication Codes (HMAC) and symmetrical ciphers, and uses modified User Datagram Protocol (UDP) packets to embed authentication data into streaming data. Data redundancy could be added to improve reliability in lossy networks. The experimental results summarized in this paper confirm that the proposed method efficiently uses energy and computational resources and at the same time provides security properties on par with the Datagram TLS (DTLS) standard.
Collapse
Affiliation(s)
- Algimantas Venčkauskas
- Department of Computers Science, Kaunas University of Technology, Studentu 50-212, LT-51368 Kaunas, Lithuania.
| | - Nerijus Morkevicius
- Department of Computers Science, Kaunas University of Technology, Studentu 50-212, LT-51368 Kaunas, Lithuania.
| | - Kazimieras Bagdonas
- Department of Computers Science, Kaunas University of Technology, Studentu 50-212, LT-51368 Kaunas, Lithuania.
| | - Robertas Damaševičius
- Department of Software Engineering, Kaunas University of Technology, Studentu 50-212, LT-51368 Kaunas, Lithuania.
| | - Rytis Maskeliūnas
- Department of Multimedia Engineering, Kaunas University of Technology, Studentu 50-212, LT-51368 Kaunas, Lithuania.
| |
Collapse
|
39
|
Sadat ES, Faez K, Saffari Pour M. Entropy-Based Video Steganalysis of Motion Vectors. Entropy (Basel) 2018; 20:e20040244. [PMID: 33265335 PMCID: PMC7512759 DOI: 10.3390/e20040244] [Citation(s) in RCA: 14] [Impact Index Per Article: 2.3] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 02/07/2018] [Revised: 03/29/2018] [Accepted: 03/30/2018] [Indexed: 12/02/2022]
Abstract
In this paper, a new method is proposed for motion vector steganalysis using the entropy value and its combination with the features of the optimized motion vector. In this method, the entropy of blocks is calculated to determine their texture and the precision of their motion vectors. Then, by using a fuzzy cluster, the blocks are clustered into the blocks with high and low texture, while the membership function of each block to a high texture class indicates the texture of that block. These membership functions are used to weight the effective features that are extracted by reconstructing the motion estimation equations. Characteristics of the results indicate that the use of entropy and the irregularity of each block increases the precision of the final video classification into cover and stego classes.
Collapse
Affiliation(s)
- Elaheh Sadat Sadat
- Electrical Engineering Department, Amirkabir University of Technology, Tehran 15875-4413, Iran
| | - Karim Faez
- Electrical Engineering Department, Amirkabir University of Technology, Tehran 15875-4413, Iran
- Correspondence: ; Tel.: +98-21-6454-3328
| | - Mohsen Saffari Pour
- Department of Mechanical Engineering, Sharif University of Technology, Tehran 1458889694, Iran; or
- KTH Royal Institute of Technology, 11428 Stockholm, Sweden
| |
Collapse
|
40
|
Prasad S, Pal AK. An RGB colour image steganography scheme using overlapping block-based pixel-value differencing. R Soc Open Sci 2017; 4:161066. [PMID: 28484623 PMCID: PMC5414260 DOI: 10.1098/rsos.161066] [Citation(s) in RCA: 5] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 12/24/2016] [Accepted: 03/22/2017] [Indexed: 06/07/2023]
Abstract
This paper presents a steganographic scheme based on the RGB colour cover image. The secret message bits are embedded into each colour pixel sequentially by the pixel-value differencing (PVD) technique. PVD basically works on two consecutive non-overlapping components; as a result, the straightforward conventional PVD technique is not applicable to embed the secret message bits into a colour pixel, since a colour pixel consists of three colour components, i.e. red, green and blue. Hence, in the proposed scheme, initially the three colour components are represented into two overlapping blocks like the combination of red and green colour components, while another one is the combination of green and blue colour components, respectively. Later, the PVD technique is employed on each block independently to embed the secret data. The two overlapping blocks are readjusted to attain the modified three colour components. The notion of overlapping blocks has improved the embedding capacity of the cover image. The scheme has been tested on a set of colour images and satisfactory results have been achieved in terms of embedding capacity and upholding the acceptable visual quality of the stego-image.
Collapse
|
41
|
Kamal AHM, Islam MM. Facilitating and securing offline e-medicine service through image steganography. Healthc Technol Lett 2014; 1:74-9. [PMID: 26609382 DOI: 10.1049/htl.2013.0026] [Citation(s) in RCA: 16] [Impact Index Per Article: 1.6] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 11/04/2013] [Revised: 05/03/2014] [Accepted: 05/06/2014] [Indexed: 11/20/2022] Open
Abstract
E-medicine is a process to provide health care services to people using the Internet or any networking technology. In this Letter, a new idea is proposed to model the physical structure of the e-medicine system to better provide offline health care services. Smart cards are used to authenticate the user singly. A very unique technique is also suggested to verify the card owner's identity and to embed secret data to the card while providing patients' reports either at booths or at the e-medicine server system. The simulation results of card authentication and embedding procedure justify the proposed implementation.
Collapse
Affiliation(s)
- A H M Kamal
- Department of Computer Science and Engineering , Jatiya Kabi Kazi Nazrul Islam University , Mymensingh , Bangladesh ; Department of Computer Science and Engineering , Bangladesh University of Engineering and Technology , Bangladesh
| | - M Mahfuzul Islam
- Department of Computer Science and Engineering , Bangladesh University of Engineering and Technology , Bangladesh
| |
Collapse
|
42
|
Kawano T. Run-length encoding graphic rules, biochemically editable designs and steganographical numeric data embedment for DNA-based cryptographical coding system. Commun Integr Biol 2013; 6:e23478. [PMID: 23750303 PMCID: PMC3609851 DOI: 10.4161/cib.23478] [Citation(s) in RCA: 5] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/19/2022] Open
Abstract
There have been a wide variety of approaches for handling the pieces of DNA as the "unplugged" tools for digital information storage and processing, including a series of studies applied to the security-related area, such as DNA-based digital barcodes, water marks and cryptography. In the present article, novel designs of artificial genes as the media for storing the digitally compressed data for images are proposed for bio-computing purpose while natural genes principally encode for proteins. Furthermore, the proposed system allows cryptographical application of DNA through biochemically editable designs with capacity for steganographical numeric data embedment. As a model case of image-coding DNA technique application, numerically and biochemically combined protocols are employed for ciphering the given "passwords" and/or secret numbers using DNA sequences. The "passwords" of interest were decomposed into single letters and translated into the font image coded on the separate DNA chains with both the coding regions in which the images are encoded based on the novel run-length encoding rule, and the non-coding regions designed for biochemical editing and the remodeling processes revealing the hidden orientation of letters composing the original "passwords." The latter processes require the molecular biological tools for digestion and ligation of the fragmented DNA molecules targeting at the polymerase chain reaction-engineered termini of the chains. Lastly, additional protocols for steganographical overwriting of the numeric data of interests over the image-coding DNA are also discussed.
Collapse
Affiliation(s)
- Tomonori Kawano
- Faculty and Graduate School of Environmental Engineering; The University of Kitakyushu; Kitakyushu, Japan ; University of Florence LINV Kitakyushu Research Center (LINV at Kitakyushu); Kitakyushu, Japan ; International Plant Neurobiology Laboratory; University of Florence; Sesto Fiorentino, Italy ; LEM; Université Paris Diderot-Paris 7; Institut de Biologie des Plantes; Orsay cedex, France
| |
Collapse
|