PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Developing a Secure Image Steganographic System Using TPVD Adaptive LSB Matching Revisited Algorithm for Maximizing the Embedding Rate

Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
Steganography is the approach for hiding any secret message in a variety of multimedia carriers like images, audio or video files. Whenever we are hiding a data, it is very important to make it invisible, so that it could be protected. A number of steganographic algorithms have been proposed based on this property of a steganographic system. This paper concentrates on integrating Tri way pixel value differencing approach and LSB matching revisited. The secret data embedded in images were images, text and audio signals so far. The proposed scheme has also come with the executable file as secret data. Also, the experimentation results show that, the important properties of a steganographic system such as imperceptibility, capacity of the carrier image and also resistance against the various steganalytic tools have also been achieved with this stego-system.
Słowa kluczowe
Rocznik
Tom
Strony
61--66
Opis fizyczny
Bibliogr. 20 poz., rys., tab.
Twórcy
Bibliografia
  • [1] N. Provos and P. Honeyman, “Hide and seek: an introduction to steganography”, IEEE Sec. Priv. Mag., vol. 1, no. 3, pp. 32–44, 2003.
  • [2] J. Fridrich, “Applications of data hiding in digital images”, in Proc. Int. Symp. Sign. Process. Apl., Brisbone, Australia, 1999, pp. 22–25.
  • [3] F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, “Information hiding – a survey”, Proc. IEEE, vol. 87, no. 7, pp. 1062–1078, 1999.
  • [4] W. Bender, D. Gruhl, N. Morimoto, and A. Lu, “Techniques for data hiding”, IBM Syst. J., vol. 35, no. 3–4, pp. 313–336, 1996.
  • [5] M. Swanson, M. Kobayashi, and A. Tewfik, “Multimedia data embedding and watermarking technologies”, IEEE Proc., vol. 86, no. 6, pp. 1064–1087, 1998.
  • [6] I. Cox, J. Kilian, T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for multimedia”, in Proc. First Int. Worksh. Inf. Hiding, R. Anderson, Ed. Cambridge: Springer, 1996, pp. 183–206.
  • [7] I. J. Cox, M. L. Miller, and J.A . Bloom, Digital Watermarking. Morgan Kaufmann, 2002.
  • [8] T. Pevný and J. Fridrich, Multiclass detector of current steganographic methods for JPEG format, IEEE Trans. Inf. Forensics Sec., vol. 3, no. 4, pp. 635–650, 2008.
  • [9] G. Simmons,“ The prisoner’s problem and the subliminal channel, CRYPTO, pp. 51–67, 1983.
  • [10] J. Zollner and H. Federrath, “Modelling the security of steganographic systems”, in Proc. 2nd Inf. Hiding Worksh., Portland, USA, 1998, pp. 345–355.
  • [11] N. J. Hopper, J. Langford, and L. Von Ahn, “Provably secure steganography”, in Advances in Cryptology: CRYPTO 2002. Springer, 2002.
  • [12] L. Zhang, H. Wang, and R. Wu, “A high capacity steganography scheme for JPEG 2000 baseline system”, IEEE Trans. Image Process., vol. 18, no. 8, 2009.
  • [13] T. Morkel, J. H. P. Eloff, and M. S. Olivier, “An overview of image steganography” [Online]. Available: http://mo.co.za/open/stegoverview.pdf
  • [14] N.F. Johnson and S. Jajodia, “Steganalysis of images created using current steganography software”, in Proc. 2nd Inf. Hiding Worksh., Portland, USA, 1998.
  • [15] F. Huang, B. Li, and J. Huang, “Attack LSB matching steganography by counting alteration rate of the number of neighbourhood gray levels”, in Proc. IEEE Int. Conf. Image Process., San Antonio, USA, 2007, vol. 1, pp. 401–404.
  • [16] J. Harmsen and W. Pearlman, “Steganalysis of additive-noise modelable information hiding”, in Proc. SPIE Electronic Imaging, Santa Clara, USA, 2003, vol. 5020, pp. 131–142.
  • [17] A. D. Ker, “Steganalysis of LSB matching in grayscale images”, IEEE Sig. Process. Lett., vol. 12, no. 6, pp. 441–444, 2005.
  • [18] J. Mielikainen, “LSB matching revisited”, IEEE Sig. Process. Lett., vol. 13, no. 5, pp. 285–287, 2006.
  • [19] K. Hempstalk, “Hiding behind corners: using edges in images for better steganography”, in Proc. Comput. Women’s Congress, Hamilton, New Zealand, 2006.
  • [20] D. Wu and W. Tsai, “A steganographic method for images by pixelvalue differencing”, Pattern Recognit. Lett., vol. 24, pp. 1613–1626, 2003.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-article-BATA-0013-0052
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.