Identyfikatory
Warianty tytułu
Comparison of selected methods of digital steganography
Języki publikacji
Abstrakty
W artykule opisano techniki steganografii cyfrowej służące do ukrywania informacji w plikach obrazowych i dźwiękowych. Porównano najważniejsze cechy wpływające na bezpieczeństwo oraz praktyczne wykorzystanie tych metod. Przedstawione algorytmy znajdują zastosowanie przede wszystkim w tajnej komunikacji. Wskazano jednak na potencjał łączenia steganografii z kryptografią i innymi metodami ochrony danych.
Information security plays significant role in personal and business data exchange. Digital steganography is appropriate solution in the case where undetectability of communication is required. This paper presents selected methods of image and audio steganography. First, the general schema of steganographic system and its most important properties are outlined. Next section, which describes image steganography techniques, is split into algorithms hiding data in particular pixels and in image colour palettes. This categorization is determined by file format, e.g. palettes are present only in indexed images. Audio steganography section contains a detailed description of methods dedicated to embedding data in audio samples or file structure. In the summary the main features of selected algorithms are compared to show differences in security level, usefulness and complexity of implementation. Steganography has many practical applications and can be used with cryptography or separately. The paper suggests possible directions of future studies, including combining steganography with biometric techniques in order to provide additional layer of data protection.
Wydawca
Czasopismo
Rocznik
Tom
Strony
1189--1195
Opis fizyczny
Bibliogr. 10 poz., rys., tab., wykr.
Twórcy
autor
- AGH Akademia Górniczo-Hutnicza w Krakowie, 30-059 Kraków, Al. Mickiewicza 30
autor
- AGH Akademia Górniczo-Hutnicza w Krakowie, 30-059 Kraków, Al. Mickiewicza 30
Bibliografia
- [1] Adli A., Nakao Z.: Three steganography algorithms for midi files. Machine Learning and Cybernetics, 2005. Proceedings of 2005 International Conference on, vol. 4, pp. 2401-2404, 2005.
- [2] Cancelli G., Doerr G., Cox I., Barni M.: Detection of ±1 lsb steganography based on the amplitude of histogram local extrema. Image Processing, 2008. ICIP 2008. 15th IEEE International Conference on, pp. 1288-1291, 2008.
- [3] Cox I., Miller M., Bloom J., Fridrich J., Kalker T.: Digital Watermarking and Steganography. Morgan Kaufmann Publishers, 2008.
- [4] Cvejic N., Seppanen T.: Increasing robustness of lsb audio steganography by reduced distortion lsb coding. Journal of Universal Computer Science, vol. 11(1), pp. 56-65, 2005.
- [5] Ogiela M.R. Sułkowski P.: Wykrywanie wielokrotnych nieprawidłowych transakcji w protokołach wymiany elektronicznej gotówki PAK, Vol. 60(4), pp. 257-261, 2014.
- [6] Saha A., Halder S., Kollya S.: Image steganography using 24-bit bitmap images. Computer and Information Technology (ICCIT), 2011 14th International Conference on, pp. 56-60, 2011.
- [7] Samaratunge S.: New steganography technique for palette based images. Industrial and Information Systems, 2007. ICIIS 2007. International Conference on, pp. 335-340, 2007.
- [8] Simmons G.: The prisoners’ problem and the subliminal channel. Advances in Cryptology, pp. 51-67. Springer US, 1984.
- [9] Singh S.: The code book. Anchor Books, New York, 1999.
- [10] Zhang H., Hu J., Wang G., Zhang Y.: A steganography scheme based on fractal images. Networking and Distributed Computing (ICNDC), 2011 Second International Conference on, pp. 28-31, 2011.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-a826f2e4-a0dc-4c38-a65e-cfee2642c9f0