IJSPTM - MOST CITED - Top 10 PAPERS

  • 1. Hash Based Least Significant Bit Technique for Video Steganography (HLSB)

    Kousik Dasgupta, J.K. Mandal, Paramartha Dutta
    April 2012 | Cited by 37

    Video Steganography deals with hiding secret data or information within a video. In this paper, a hash based least significant bit (LSB) technique has been proposed. A spatial domain technique where the secret information is embedded in the LSB of the cover frames. Eight bits of the secret information is divided into 3,3,2 and embedded into the RGB pixel values of the cover frames respectively. A hash function is used to select the position of insertion in LSB bits. The proposed method is analyzed in terms of both Peak Signal to Noise Ratio (PSNR) compared to the original cover video as well as the Mean Square Error (MSE) measured between the original and steganographic files averaged over all video frames. Image Fidelity (IF) is also measured and the results show minimal degradation of the steganographic video file. The proposed technique is compared with existing LSB based steganography and the results are found to be encouraging. An estimate of the embedding capacity of the technique in the test video file along with an application of the proposed method has also been presented.
  • 2. Trust-Based Approach in Wireless Sensor Networks Using an Agent to Each Cluster

    Yenumula B. Reddy
    February 2012 | Cited by 12

    Detection of malicious node in the neighborhood with minimal infrastructure and computations is a requirement. The existing models require more computation, storage, and complex security calculations.These models are inefficient in wireless sensor networks due to their resource limitations. Therefore, an agent-based approach that maintains the node's current status is proposed in this research. In agent-based approach detection is possible through maintaining the ratings of each node. The ratings of a node will be done through the ratio of packet forwarded by packets received. Further, the ratings can be done using the E-commerce models. In E-commerce models, each node votes the successive node depending upon the ratio of packet forwarded by packets received. The update ratings will be done through Sporas formula or Molina's formula or with a combination of both models. Further, the proposed agent-based framework uses reputation of a node through neighbouring nodes as part of trust calculation. The simulations were presented to calculate the trust of a node.
  • 3. A Novel Secure Image Steganography Method Based on Chaos Theory in Spatial Domain

    Debiprasad Bandyopadhyay, ousik Dasgupta, J.K.Mandal and Paramartha Dutta
    February 2014 | Cited by 9

    This paper presents a novel approach of building a secure data hiding technique in digital images. The image steganography technique takes the advantage of limited power of human visual system (HVS). It uses image as cover media for embedding secret message. The most important requirement for a steganographic algorithm is to be imperceptible while maximizing the size of the payload. In this paper a method is proposed to encrypt the secret bits of the message based on chaos theory before embedding into the cover image. A 3-3-2 LSB insertion method has been used for image steganography. Experimental results show a substantial improvement in the Peak Signal to Noise Ratio (PSNR) and Image Fidelity (IF) value of the proposed technique over the base technique of 3-3-2 LSB insertion.
  • 4. Personal Information Privacy Settings of Online Social Networks and Their Suitability for Mobile Internet Devices

    Nahier Aldhafferi, Charles Watson and A.S.M Sajeev
    April 2013 | Cited by 8

    Protecting personal information privacy has become a controversial issue among online social network providers and users. Most social network providers have developed several techniques to decrease threats and risks to the users' privacy. These risks include the misuse of personal information which may lead to illegal acts such as identity theft. This study aims to measure the awareness of users on protecting their personal information privacy, as well as the suitability of the privacy systems which they use to modify privacy settings. Survey results show high percentage of the use of smart phones for web services but the current privacy settings for online social networks need to be improved to support different type of mobile phones screens. Because most users use their mobile phones for Internet services, privacy settings that are compatible with mobile phones need to be developed. The method of selecting privacy settings should also be simplified to provide users with a clear picture of the data that will be shared with others. Results of this study can be used to develop a new privacy system which will help users control their personal information easily from different devices, including mobile Internet devices and computers.