Morteza Bashardoost - Academia.edu (original) (raw)

Uploads

Papers by Morteza Bashardoost

Research paper thumbnail of Research Article A Novel Approach to Enhance the Security of the LSB Image Steganography

Abstract: Forming a logical balance between the quality of the file and the scope of data that ca... more Abstract: Forming a logical balance between the quality of the file and the scope of data that can be conveyed is the test of steganographic techniques to form such a balance. On top of that, the facts that cannot be covered up are the robustness of the method and security of the vague data. An insertion method which delivers a high level of visual quality and a huge amount of volume for the obscured data is called the Least Significant Bit (LSB), but the concealed message is poorly secured through this technique. In the recommended approach, the Vigenere encryption techniques initially used to encode the secret data to assure the safety of the concealed message. Later, the data is contracted through the Huffman coding method in order to decrease the occupational volume of the classified data. Then, each bit stream of the data is dispersed out onto the image to enhance the robustness of the technique by using the expanded knight tour algorithm. The outcomes show that apart from enha...

Research paper thumbnail of Least Significant Bit Image Steganography using Particle Swarm Optimization and Optical Pixel Adjustment

Data hiding is a method of concealing secret data into a cover media and preventing a spectator f... more Data hiding is a method of concealing secret data into a cover media and preventing a spectator from being aware of the existence of the hidden message. According to the problems of steganography, the main effort is to provide a better imperceptibility of stego-image that can be done by decreasing distortion of image. One of the popular techniques in data hiding is steganography in which the simple method for image hiding is the Least Significant Bit (LSB) substitution method. Wu et al. proposed two image hiding techniques to improve the quality of the stego-image [1]. The first one is to find the best block matching matrix and the other one is to find the optimal substitution matrices. The proposed method utilizes particle Swarm optimization (PSO) for finding the best pixel locations, and then the secret image is transformed to a new secret image. Optimal Pixel Adjustment (OPA) method is applied to further increase the quality of image. Results are then compared with those obtained...

Research paper thumbnail of Enhanced LSB image steganography method using knight tour algorithm, vigenere encryption and LZW compression

The challenge of steganographic methods is to create a rational balance between the quality of th... more The challenge of steganographic methods is to create a rational balance between the quality of the file and the size of data that can be transferred. In addition, the robustness of the technique and security of the obscure data are the facts that cannot be dissembled. The Least Significant Bit (LSB) insertion approach provides a high degree of visual quality and a large amount of capacity for the concealed data, but the covert message is not well protected in this method. In the proposed method, the secret data is firstly encoded by using the Vigenere encryption method to guarantee the protection of the hidden message. Afterward, the Lempel Ziv Welch (LZW) technique compresses the data to reduce the occupational capacity of the confidential data. Then, by utilizing the extended knight tour algorithm, each bitstream of the data is spread out on the image to increase the robustness of the method. The results show that the proposed method not only improves the security and payload capa...

Research paper thumbnail of Image steganography using least significant bit approach enhanced with compression and encryption

Research paper thumbnail of Enhancing fragility of zero-based text watermarking utilizing effective characters list

Multimedia Tools and Applications

Research paper thumbnail of A Novel Approach to Enhance the Security of the LSB Image Steganography

Research Journal of Applied Sciences, Engineering and Technology, 2014

Research paper thumbnail of Replacement Attack: A New Zero Text Watermarking Attack

Research paper thumbnail of Image steganography using least significant bit approach enhanced with compression and encryption

Research paper thumbnail of Least Significant Bit Image Steganography using Particle Swarm Optimization and Optical Pixel Adjustment

International Journal of Computer Applications, 2012

Data hiding is a method of concealing secret data into a cover media and preventing a spectator f... more Data hiding is a method of concealing secret data into a cover media and preventing a spectator from being aware of the existence of the hidden message. According to the problems of steganography, the main effort is to provide a better imperceptibility of stego-image that can be done by decreasing distortion of image. One of the popular techniques in data hiding is steganography in which the simple method for image hiding is the Least Significant Bit (LSB) substitution method. Wu et al. proposed two image hiding techniques to improve the quality of the stego-image [1]. The first one is to find the best block matching matrix and the other one is to find the optimal substitution matrices. The proposed method utilizes particle Swarm optimization (PSO) for finding the best pixel locations, and then the secret image is transformed to a new secret image. Optimal Pixel Adjustment (OPA) method is applied to further increase the quality of image. Results are then compared with those obtained by Simple LSB, Wang's et al. method, Wu's et al. method. The experimental results confirmed that PSNR of the proposed method is higher than mentioned methods which mean the imperceptibility of the image improves. Also the results illustrate that the proposed approach is robust against chi-square attack.

Research paper thumbnail of A Novel Approach to Enhance Robustness in Digital Image Watermarking Using Multiple Bit-Planes of Intermediate Significant Bits

2013 International Conference on Informatics and Creative Multimedia, 2013

— the main aim of this paper is to introduce a novel approach to preserve digital images'... more — the main aim of this paper is to introduce a novel approach to preserve digital images' copyrights. Hence as ISB scheme was selected in relation to the approach in an attempt conquer the issues of robustness and imperceptibility in watermarked imagery. According to the literature review, embedding the aimed secret bits (Watermark) is a problematic issue inside a host image (normal 8-bit, grey-scale) in a sense to make it undetectable by the HVS (Human Visual System) in addition to the matter that it is predicted to receive any attacks. The suggested method here represents an improved scheme for the embedding of ISB which maintains the robustness and cultivates the rate of security by employing repeated bits in various bit planes over an irregular order and it develops the LSB technique specifically in circumstances where robustness and imperceptibility are main points of assessment.

Research paper thumbnail of A Novel Zero-Watermarking Scheme for Text Document Authentication

Jurnal Teknologi, 2015

The demand for copyright protection of text documents is extremely vital especially when the text... more The demand for copyright protection of text documents is extremely vital especially when the text is transmitted over the Internet. One of the best practical resolutions to maintain the security of document media is digital watermarking. Several approaches have been proposed to guarantee the safety and protection of the documents against dishonest copying and distribution. This paper suggests an innovative zero-watermarking scheme for the purpose of authentication and tamper detection in simple text documents. The algorithm generates a watermark based on the effective characters of the text contents which can be extracted later using extraction algorithm to identify the status of tampering in the text document. Experimental results demonstrate the effectiveness of the algorithm against random tampering attacks. Watermark pattern matching and watermark distortion rate are used as evaluation parameters on multiple text samples of varying length.

Research paper thumbnail of Research Article A Novel Approach to Enhance the Security of the LSB Image Steganography

Abstract: Forming a logical balance between the quality of the file and the scope of data that ca... more Abstract: Forming a logical balance between the quality of the file and the scope of data that can be conveyed is the test of steganographic techniques to form such a balance. On top of that, the facts that cannot be covered up are the robustness of the method and security of the vague data. An insertion method which delivers a high level of visual quality and a huge amount of volume for the obscured data is called the Least Significant Bit (LSB), but the concealed message is poorly secured through this technique. In the recommended approach, the Vigenere encryption techniques initially used to encode the secret data to assure the safety of the concealed message. Later, the data is contracted through the Huffman coding method in order to decrease the occupational volume of the classified data. Then, each bit stream of the data is dispersed out onto the image to enhance the robustness of the technique by using the expanded knight tour algorithm. The outcomes show that apart from enha...

Research paper thumbnail of Least Significant Bit Image Steganography using Particle Swarm Optimization and Optical Pixel Adjustment

Data hiding is a method of concealing secret data into a cover media and preventing a spectator f... more Data hiding is a method of concealing secret data into a cover media and preventing a spectator from being aware of the existence of the hidden message. According to the problems of steganography, the main effort is to provide a better imperceptibility of stego-image that can be done by decreasing distortion of image. One of the popular techniques in data hiding is steganography in which the simple method for image hiding is the Least Significant Bit (LSB) substitution method. Wu et al. proposed two image hiding techniques to improve the quality of the stego-image [1]. The first one is to find the best block matching matrix and the other one is to find the optimal substitution matrices. The proposed method utilizes particle Swarm optimization (PSO) for finding the best pixel locations, and then the secret image is transformed to a new secret image. Optimal Pixel Adjustment (OPA) method is applied to further increase the quality of image. Results are then compared with those obtained...

Research paper thumbnail of Enhanced LSB image steganography method using knight tour algorithm, vigenere encryption and LZW compression

The challenge of steganographic methods is to create a rational balance between the quality of th... more The challenge of steganographic methods is to create a rational balance between the quality of the file and the size of data that can be transferred. In addition, the robustness of the technique and security of the obscure data are the facts that cannot be dissembled. The Least Significant Bit (LSB) insertion approach provides a high degree of visual quality and a large amount of capacity for the concealed data, but the covert message is not well protected in this method. In the proposed method, the secret data is firstly encoded by using the Vigenere encryption method to guarantee the protection of the hidden message. Afterward, the Lempel Ziv Welch (LZW) technique compresses the data to reduce the occupational capacity of the confidential data. Then, by utilizing the extended knight tour algorithm, each bitstream of the data is spread out on the image to increase the robustness of the method. The results show that the proposed method not only improves the security and payload capa...

Research paper thumbnail of Image steganography using least significant bit approach enhanced with compression and encryption

Research paper thumbnail of Enhancing fragility of zero-based text watermarking utilizing effective characters list

Multimedia Tools and Applications

Research paper thumbnail of A Novel Approach to Enhance the Security of the LSB Image Steganography

Research Journal of Applied Sciences, Engineering and Technology, 2014

Research paper thumbnail of Replacement Attack: A New Zero Text Watermarking Attack

Research paper thumbnail of Image steganography using least significant bit approach enhanced with compression and encryption

Research paper thumbnail of Least Significant Bit Image Steganography using Particle Swarm Optimization and Optical Pixel Adjustment

International Journal of Computer Applications, 2012

Data hiding is a method of concealing secret data into a cover media and preventing a spectator f... more Data hiding is a method of concealing secret data into a cover media and preventing a spectator from being aware of the existence of the hidden message. According to the problems of steganography, the main effort is to provide a better imperceptibility of stego-image that can be done by decreasing distortion of image. One of the popular techniques in data hiding is steganography in which the simple method for image hiding is the Least Significant Bit (LSB) substitution method. Wu et al. proposed two image hiding techniques to improve the quality of the stego-image [1]. The first one is to find the best block matching matrix and the other one is to find the optimal substitution matrices. The proposed method utilizes particle Swarm optimization (PSO) for finding the best pixel locations, and then the secret image is transformed to a new secret image. Optimal Pixel Adjustment (OPA) method is applied to further increase the quality of image. Results are then compared with those obtained by Simple LSB, Wang's et al. method, Wu's et al. method. The experimental results confirmed that PSNR of the proposed method is higher than mentioned methods which mean the imperceptibility of the image improves. Also the results illustrate that the proposed approach is robust against chi-square attack.

Research paper thumbnail of A Novel Approach to Enhance Robustness in Digital Image Watermarking Using Multiple Bit-Planes of Intermediate Significant Bits

2013 International Conference on Informatics and Creative Multimedia, 2013

— the main aim of this paper is to introduce a novel approach to preserve digital images'... more — the main aim of this paper is to introduce a novel approach to preserve digital images' copyrights. Hence as ISB scheme was selected in relation to the approach in an attempt conquer the issues of robustness and imperceptibility in watermarked imagery. According to the literature review, embedding the aimed secret bits (Watermark) is a problematic issue inside a host image (normal 8-bit, grey-scale) in a sense to make it undetectable by the HVS (Human Visual System) in addition to the matter that it is predicted to receive any attacks. The suggested method here represents an improved scheme for the embedding of ISB which maintains the robustness and cultivates the rate of security by employing repeated bits in various bit planes over an irregular order and it develops the LSB technique specifically in circumstances where robustness and imperceptibility are main points of assessment.

Research paper thumbnail of A Novel Zero-Watermarking Scheme for Text Document Authentication

Jurnal Teknologi, 2015

The demand for copyright protection of text documents is extremely vital especially when the text... more The demand for copyright protection of text documents is extremely vital especially when the text is transmitted over the Internet. One of the best practical resolutions to maintain the security of document media is digital watermarking. Several approaches have been proposed to guarantee the safety and protection of the documents against dishonest copying and distribution. This paper suggests an innovative zero-watermarking scheme for the purpose of authentication and tamper detection in simple text documents. The algorithm generates a watermark based on the effective characters of the text contents which can be extracted later using extraction algorithm to identify the status of tampering in the text document. Experimental results demonstrate the effectiveness of the algorithm against random tampering attacks. Watermark pattern matching and watermark distortion rate are used as evaluation parameters on multiple text samples of varying length.