scholarly journals A Novel and Robust Hybrid Blockchain and Steganography Scheme

2021 ◽  
Vol 11 (22) ◽  
pp. 10698
Author(s):  
Mustafa Takaoğlu ◽  
Adem Özyavaş ◽  
Naim Ajlouni ◽  
Ali Alsahrani ◽  
Basil Alkasasbeh

Data security and data hiding have been studied throughout history. Studies show that steganography and encryption methods are used together to hide data and avoid detection. Large amounts of data hidden in the cover multimedia distort the image, which can be detected in visual and histogram analysis. The proposed method will solve two major drawbacks of the current methods: the limitation imposed on the size of the data to be hidden in the cover multimedia and low resistance to steganalysis after stego-operation. In the proposed method, plaintext data are divided into fixed-sized bits whose corresponding matching bits’ indices in the cover multimedia are accumulated. Thus, the hidden data are composed of the indices in the cover multimedia, causing no change in it, thus enabling considerable amounts of plaintext to be hidden. The proposed method also has high resistance to known steganalysis methods because it does not cause any distortion to the cover multimedia. The test results show that the performance of the proposed method outperforms similar conventional stenographic techniques. The proposed Ozyavas–Takaoglu–Ajlouni (OTA) method relieves the limitation on the size of the hidden data, and hidden data is undetectable by steganalysis because it is no longer embedded in the cover multimedia.

1981 ◽  
Vol 34 (1) ◽  
pp. 27 ◽  
Author(s):  
AV Schleger ◽  
DT Lincoln ◽  
AS Bourne

Bos taurus cattle with high resistance to the tick Boophilus micro plus, whether free-grazing or in covered pens, had significantly more arteriovenous anastomoses (A VA) in their skin than did animals of low resistance. These differences in number of A VA associated with resistance level were most marked above the level of the sebaceous gland in the neck region, an area favoured for tick feeding. In this skin layer, the number of AVA in low-resistance animals (4�0�0�4 per 2�1 mm) was significantly lower than in animals of high resistance (12�3 � 2�2 per 2�1 mm) while the mean value for the naive animals (8�2 � 1 �9 per 2�1 mm) was intermediate. No differences in morphology of AVA were detectable between the three groups using light microscopy.


2005 ◽  
Vol 100 (3) ◽  
pp. 767-773 ◽  
Author(s):  
Randall F. Gearhart ◽  
M. Daniel Becque ◽  
Chad M. Palm ◽  
Matthew D. Hutchins

This study compared undifferentiated ratings of perceived exertion (RPE) during short duration, very high intensity cycle exercise using high and low resistance. 30 recreationally trained males (24.2 ± 2.4 yr.) were memory-anchored to the Borg 15-category scale. The high and low resistance exercises were defined by 30-sec. maximum tests assigned in counterbalanced order, with resistances set before testing during an orientation session. High resistance was 10% of body mass. Low resistance resulted in the same total work as the high resistance over the 30-sec. sessions (± 5%) but increased pedal rate. RPE was taken at 8, 13, 18, 23, and 28 sec. during the high and the low resistance exercises. Measurements were compared using a 2-way repeated-measures analysis of variance. RPE was significantly greater ( p = .005) for the high than the low resistance exercise at each interval. RPE increased when the subjects were required to pedal against a greater resistance and produce the highest forces. These RPE data are consistent with data from both aerobic cycle and resistance exercise. The data suggest that instantaneous force production, not summed work, is a primary determinant of RPE. All of these observations support Cafarelli's theoretical model of effort sense. In conclusion, as an individual generates more force during high resistance exercise than in light resistance exercise, a potential explanation of our results is that the increased motor outflow and corollary sensory signal lead to a greater sense of effort.


2021 ◽  
Vol 5 (6) ◽  
pp. 1113-1119
Author(s):  
Muhammad Fadlan ◽  
Haryansyah ◽  
Rosmini

One of the essential instruments in the cyber era is data. Therefore, maintaining data security is an important thing to do. One way that can be done to maintain data security is through cryptography. In cryptography, two basic techniques are commonly used, namely substitution techniques and transposition techniques. One of the weaknesses of the basic cryptographic techniques is the lower level of data security. This study proposed a super encryption model in securing data by combining cryptographic algorithms with substitution techniques, i.e., autokey cipher and transposition, i.e., columnar transposition cipher. This study used the Avalanche Effect method as a measurement tool for the proposed super encryption model. The test results have shown that the proposed super encryption model can provide a better level of security. The avalanche effect test on the five data test shows that the average AE value of the proposed super encryption model is 30.76%. This value is higher than the single autokey cipher algorithm of 1.66% and column transposition with a value of 18.03%. Other results from the five data test have shown that the proposed model has a high level of accuracy of 100% in terms of the decryption process results, which is the same as the initial data before going through the encryption process.  


Author(s):  
Akira Nishimura

Reversible data hiding is a technique whereby hidden data are embedded in host data in such a way that the host data consistency is perfectly preserved and the host data are restored when extracting the hidden data. This chapter introduces basic algorithms for reversible data hiding, histogram shifting, histogram expansion, and compression. This chapter also proposes and evaluates two reversible data hiding methods, i.e., hiding data in the frequency-domain using integer Discrete Cosine Transform (DCT) and modified DCT and hiding in the time domain using linear prediction and error expansion. As no location map is required to prevent amplitude overflow, the proposed method in the time domain achieves a storage capacity of nearly 1 bit per sample of payload data. The proposed methods are evaluated by the payload amount, objective quality degradation of stego signal, and payload concealment.


2020 ◽  
Vol 20 (5) ◽  
pp. 3283-3286 ◽  
Author(s):  
Yuehua An ◽  
Xia Shen ◽  
Yuying Hao ◽  
Pengfei Guo ◽  
Weihua Tang

Conductive filament mechanism can explain major resistance switching behaviors. The forming/deforming of the filaments define the high/low resistance states. The ratio of high/low resistance depends on the characterization of the filaments. In many oxide systems, the oxygen vacancies are important to forming the conductive filaments for the resistance switching behaviors. As ultrawide band gap semiconductor, Ga2O3 has very high resistance for its high resistance state, while its low resistive state has relative high resistance, which normally results in low ratio of high/low resistance. In this letter, we report a high ratio of high/low resistance by ultraviolet radiation. The I–V characteristics of Au/Ti/β-Ga2O3/W sandwich structure device shows that the HRS to LRS ratio of 5 orders is achieved.


Electronics ◽  
2019 ◽  
Vol 8 (5) ◽  
pp. 514 ◽  
Author(s):  
Jin Young Lee ◽  
Cheonshik Kim ◽  
Ching-Nung Yang

With the advent of 3D video compression and Internet technology, 3D videos have been deployed worldwide. Data hiding is a part of watermarking technologies and has many capabilities. In this paper, we use 3D video as a cover medium for secret communication using a reversible data hiding (RDH) technology. RDH is advantageous, because the cover image can be completely recovered after extraction of the hidden data. Recently, Chung et al. introduced RDH for depth map using prediction-error expansion (PEE) and rhombus prediction for marking of 3D videos. The performance of Chung et al.’s method is efficient, but they did not find the way for developing pixel resources to maximize data capacity. In this paper, we will improve the performance of embedding capacity using PEE, inter-component prediction, and allowable pixel ranges. Inter-component prediction utilizes a strong correlation between the texture image and the depth map in MVD. Moreover, our proposed scheme provides an ability to control the quality of depth map by a simple formula. Experimental results demonstrate that the proposed method is more efficient than the existing RDH methods in terms of capacity.


2015 ◽  
Vol 57 (10) ◽  
pp. 2030-2033 ◽  
Author(s):  
H. Sohrabi Anaraki ◽  
N. V. Gaponenko ◽  
V. G. Litvinov ◽  
A. V. Ermachikhin ◽  
V. V. Kolos ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document