Steganography, BioPatterns and Independent Components
نویسنده
چکیده
In this paper we discuss the development of steganography in the context of the electronic Patient Health Record. We exploit the signal processing aspects of a frame-based approach of expanding signals using a nonorthogonal basis of independent components derived from the data, and investigate the consequences of applying the framework to different dimensionality biopatterns. The integrity of the hidden message under different benign ’attacks’ is investigated along with the capacity of the embedded message. We will particularly concentrate on hiding information in biopatterns such as single channel EEG time series, since this is especially challenging in low dimensional problems such as single channel time series because information capacity and hence exploitable information redundancy is lower. We will conclude by investigating the additional security of the embedded message by the sensitivity of recovered messages to slight variations in the structure of the independent components, or knowledge of which components have been modified a topic not previously considered, and which augments any cryptographic approach for security.
منابع مشابه
The Idea Of Using The Steganography As Encryption Tool
the increasing use of computers and the widespread use of networks, Social networking and use applications through the use of the Internet to make the spread images, which make it easy to be penetrated from the attacker and from everyone who try to change the information. So, the need arises to transmit the information securely through a secure manner . Steganography is the best solution to sol...
متن کاملSteganography Scheme Based on Reed-Muller Code with Improving Payload and Ability to Retrieval of Destroyed Data for Digital Images
In this paper, a new steganography scheme with high embedding payload and good visual quality is presented. Before embedding process, secret information is encoded as block using Reed-Muller error correction code. After data encoding and embedding into the low-order bits of host image, modulus function is used to increase visual quality of stego image. Since the proposed method is able to embed...
متن کاملTransform domain steganography with blind source separation
This paper applies blind source separation or independent component analysis for images that may contain mixtures of text, audio, or other images for steganography purposes. The paper focuses on separating mixtures in the transform domain such as Fourier domain or the Wavelet domain. The study addresses the effectiveness of steganography when using linear mixtures of multimedia components and t...
متن کاملIndependent component analysis applied to digital image watermarking
The authors propose a new solution to the watermarking of images. This approach uses Independent Component Analysis (ICA) to project the image into a basis with its components as statistically independent as possible. The watermark is then introduced in this representation of the space. Thus, the change of basis is the key of the steganography problem. The algorithm applied to the fragile water...
متن کاملA New Hybrid Method for Colored Image Steganography Based On DWT
Data transmission security has become an extremely important field of research. Steganography is an art of hiding information in image, audio and video files in a way that would meet the security requirements in the form of overt or covert. In this study, we propose a new hybrid steganography technique for color images that hide secret messages in the frequency domain of a cover image's blu...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006