Application of steganography and empirical mode decomposition in communications security

Kuang Ya Lu, Wei Tai Hsu, Pi Cheng Tung, Chien Jung Tseng, Norden E. Huang, Shih Lin Lin

Research output: Contribution to journalArticlepeer-review

1 Scopus citations

Abstract

Information security has become a major issue in recent years, as new ways of information exchange arise due to the rapid development of computing, communication and internet technologies. The steganography concealed the information between the sender and receiver without causing any attention by third party. The encrypted algorithm transformed and substituted the hidden information. The encrypted message with secret key is transmitted via the communication channel. At the receiver side the weak encrypted message can be retrieved back effectively. Thus, we propose the image communication systems to secure the information by using a steganographic system and empirical mode decomposition method. Simulation results have confirmed that this combination model is highly robust against various signal processing operations and geometric attacks. By giving a variety of constraints and conditions, the proposed system increases the security in communication system. Our methods have been proven effective for applications in various fields which require secure communication, such as mobile telephone, internet and others.

Original languageEnglish
Pages (from-to)7071-7078
Number of pages8
JournalInformation (Japan)
Volume16
Issue number9 B
StatePublished - Sep 2013

Keywords

  • Empirical mode decomposition
  • Secure communication
  • Steganography

Fingerprint

Dive into the research topics of 'Application of steganography and empirical mode decomposition in communications security'. Together they form a unique fingerprint.

Cite this