PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Software and methods for steganography

Wybrane pełne teksty z tego czasopisma
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
The object of steganography is to send a message through some innocuous carrier to a receiver while preventing anyone else from knowing that a message is being sent. The carrier can be one of several forms of digital media however the most common type of carrier used is an image. The image should not attract any attention as a carrier of a message and should look as close as possible to an ordinary image. This paper summarises recent research in the area of steganography with the aim of evaluating the trends in this area and developing a perspective on it. It looks at the application of steganography to digital images. Different ways of hiding the message sender arc discussed. An extensive study of existing steganography software is provided. Watermarking and cryptography are briefly described. Watermarking is the process of hiding information in a carrier in order to protect the ownership of text, music, films and art. Steganography techniques can be used for the purposes of watermarking. It is important also to briefly mention cryptography as it is commonly used along with steganography to generate an encrypted message to be hidden in a carrier.
Rocznik
Strony
103--130
Opis fizyczny
Bibliogr. 42 poz., rys., wykr.
Twórcy
autor
  • Letterkenny Institute of Technology Port Road, Letterkenny, Co. Donegal
autor
  • School of Computing and Intelligent Systems Faculty of Engineering University of Ulster at Magee College Northland Road, Londonderry
autor
  • School of Computing and Intelligent Systems Faculty of Engineering University of Ulster at Magee College Northland Road, Londonderry
Bibliografia
  • [1] Anderson R.J., Petitcolas F.A.P., On the Limits of Steganography, IEEE Journal of Selected Areas in Communications, 16, 4, pp. 474-481, 1998.
  • [2] Anonymous: Black Wolf, Stego-Dos v0.90B - Black Wolfs Picture Encoder. 1993. Public Domain ftp ://'ftp.csua.berkeley.edu/'pub/cypherpunks/Steganography/StegoDos.zip.
  • [3] Beck A., Fractal Tutorials, 2000. hitp ://library.thinkquest.org/l2740/netscape/discover .
  • [4] Bailey K., Condell J. and Curran K., Steganography in Images: An Overview, In Proceedings of the Irish Machine Vision and Image Processing Conference (IMVIP2003), University of Ulster, Coleraine, pp. 167-175, 2003.
  • [5] Bender J., Gruhl D. and Morimoto N., Techniques for Data Hiding , Massachusetts Institute of Technology, Media Laboratory Cambridge, Massachusetts 02139 USA, Proceedings of the SPIE 2420 40, 1995.
  • [6] Brown A., S-Tools for Windows, 1994. ftp ://idea. sec. dsi.unirni.it /pub/security/crypt/code/s — tools3.zip(version'3), ftp ://idea,, sec.dsi.unimi.it /pub/'security/crypt / code / s — tool s4.zip(version4)
  • [7] Cole E., Steganography Information System Security, George Mason University, 1997
  • [8] Cox I., Kilian J., Shamoon T. and Leighton A., A Secure Robust Watermark for Multimedia, In Proceedings of Information Hiding: First International Workshop. Cambridge, UK. Lecture Notes in Computer Science 1174, 1996.
  • [9] Currie D.L., Surmounting the Effects of Lossy Compression on Steganography, Proceedings of the 19th National Information System Security Conference, Baltimore Md 194-201, 1996.
  • [10] Day B., Knudsen J., Image Processing with Java 2D, 1998. www.javaworld.com/javaworld/jw - 09 - 1998/jw - 09 -mediap.html.
  • [11] Efford N,. Digital Image Processing Addison-Wesley, 2000.
  • [12] Fridrich D., A New Steganographic Method for Palette-Based Images. In Proceedings of IS and T's PICS Conference, pp. 285-289, 1999.
  • [13] Fridrich D., Du R., Secure Steganographic Methods for Palette Images, In Proceedings of Information Hiding: Third International Workshop, Dresden, Germany, Lecture Notes in Computer Science 1768, pp. 47-60, 2000.
  • [14] Goldreich 0., Foundations of Cryptography, Basic Tools, Cambridge University Press, 2001.
  • [15] Hansmann F., Steganos Deus Ex Machina Communications, 1996. http://www.steganography.com
  • [16] Heckbert P., Colour Image Quantization for Frame Buffer Display, In Proceedings of SIG GRAPH 82, 1982.
  • [17] Hellman M.E., The Mathematics of Public Key Cryptography, In Scientific American, 241, pp. 146-157, 1979.
  • [18] Johnson N.F., An Introduction to Watermark Recovery from Images, In Proceedings of SANS Intrusion, Detection and Response. Conference, San Diego, 1999.
  • [19] Johnson N.F., Duric Z. and Jajodia S., Informaiion Hiding, Steganography and Watermarking - Attacks and Countermeasures, Kluwer Academic Publishers, 2001.
  • [20] Johnson N.F, Jajodia S., Steganalysis of Images Created Using Current Steganography Software. In Proceedings of Information Hiding: Second International Workshop, Portland, Oregon, Lecture Notes in Computer Science 1525, pp. 273-289, 1998.
  • [21] Kwan M., How GilShuffle Works, 1998. http : //www. dark side, com.au/gifshu/ fle/description.html
  • [22] Lai X., On the Design and Security of Block Ciphers ETH Series in Information Processing, v. 1 Konstanz:Hartung-Gorre, Verlag, 1992.
  • [23] Lenti J., Steganographic Methods, Periodica Polytechnica Ser. El. Eng. 44: 3-4. pp. 249-258, 2000.
  • [24 ] Machado R., EzStego, 1996. http://www.stego.com
  • [25] Maroney C., HideSeek v5.0 www.rugeley.demon.co.uk/security/hdsk5Q.zip
  • [26] Merkle R.C., Hell man M., Hiding Information and Signatures in Trap Door Knapsacks, IEEE Transactions on Information Theory, 24-5, pp. 525-530, 1978.
  • [27] Mel H.X., Baker D., Cryptography Decrypted, Addison-Wesley, 2001.
  • [28] Murray J.D., Van Ryper W., Encyclopedia of Graphics File Formats, Second Edition, O'Reilly and Associates Inc., 1996.
  • [29] Nelson M., The Data Compression Book, M and T Books, 1992.
  • [30] NIST, National Institute of Standards and Technology NIST, FIPS PUB 186 Digital Signature Standard, U.S. Department of Commerce, 1994.
  • [31] Pfitzmann B., Information Hiding Terminology Collected by Birgit Pfitzmann. In Proceedings of Information Hiding: First International Workshop, Cambridge, UK. Lecture Notes in Computer Science 1174, pp. 347-350, 1996
  • [32] Provos N., Defending Against Statistical Steganalysis, Proceedings of the 10th USENIX Security Symposium,, pp. 323-335, 2001.
  • [33] Rivest R.L., Shamir A. and Adleman L.M., A Method for Obtaining Digital Signatures and Public key Cryptosystems, Communication of the ACM, 21-2, pp. 120-126, 1978.
  • [34] Rosenfeld A., Models: The Graphics Vision Interface, Editor: Kunii T.L., Visual Computing, Springer, pp. 21-23, 1992.
  • [35] Schneier B., Applied Cryptography, Second Edition, John Wiley and Sons, 1996.
  • [36] Smith R.E., Internet Cryptography, Addison-Wesley, 1997.
  • [37] Stevens R.T., Graphics Programming with Java, Second Edition, Charles River Media Inc. Rockland Massachusetts, 1999.
  • [38] Upham D. JPEG-JSTEG: Modification of the Independent JPEG Group's JPEG Software (Release 4) for 1-Bit Steganography in JFIF Output Files. ftp://ftp.funet.fi/pub/crypt/steganography.
  • [39] Wayner P., Disappearing Cryptography, Information Hiding: Steganography and Watermarking, Second Edition, Morgan Kaufman Publishers, 2002.
  • [40] Westfield A., Pfitzmann A., Attacks on Steganographic Systems Breaking the Steganography Utilities E/Stego, Jsteg, Steganos and S-Tools and Some Lessons Learned, In Proceedings of Information Hiding: Third International Workshop, Dresden, Germany, Lecture Notes in Computer Science 1768, pp. 61-76, 1999.
  • [41] Wohlgerrmth S., IT-Security: Theory and Practice, Steganography and Watermarking, IIG Telematics WS, 2002.
  • [42] Zollner J., Federrath H., Klimant H., Pfitzmann A., Piotraschke R., Westfeld A.,Wicke G. and Wolf G., Modelling the Security of Steganographic Systems. In Proceedings of Information Hiding: Second International Workshop, Portland, Oregon, Lecture Notes in Computer Science 1525, pp. 344-354, 1998.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-article-BAT5-0008-0090
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.