9. http://isrc.ulster.ac.uk
9
Integrity—How do we
know if the supporting
documents have been
altered?
Client logs into ABC Insurance portal and fills
in a claim application and submits along with
supporting documents.
Approved or rejected
application sent back to Client
Scenario 2:
If we don’t secure information…
13. http://isrc.ulster.ac.uk
HidInImage
HidInImage enables the encryption and hiding
of secret information (text or images) inside
images using Steganography techniques.
Secret information is hidden imperceptibly in
that it cannot be detected by the human eye.
Our innovative Steganograpy-based
hiding solution plays a vital role in securing
digital media content.
14. http://isrc.ulster.ac.uk
Why HidInImage is Unique?
Revolutionary software algorithm for
encryption
Novel technique for embedding of data in
images using Steganography technique
Patented Encryption Software
Patented Embedding Software
17. http://isrc.ulster.ac.uk 17
Embedding EPRs data in innocuous looking image: (a) shows a CT scan image of a patient with her
information details, (b) encrypted secret data (payload) of (a), a clean image showing nature in which
the encrypted data will be embedded to and finally (d) shows the stego-image carrying the encrypted
patient data
Secret Communication
22. http://isrc.ulster.ac.uk
Solutions for Digital Images
images used by creative individuals, enterprises,
governments and law enforcement
• Copyright Communication
– Identifies content owner and rights
• Copy Protection
– Controls copying of content
• Classification
– Classifies content so it is used appropriately;
• Authentication
– Verifies that content is genuine, from an authorized
source and has not been altered