238 research outputs found

    Suitability of lacunarity measure for blind steganalysis

    Get PDF
    Blind steganalysis performance is influenced by several factors including the features used for classification. This paper investigates the suitability of using lacunarity measure as a potential feature vectorfor blind steganalysis. Differential Box Counting (DBC) based lacunarity measure has been employed using the traditional sequential grid (SG) and a new radial strip (RS) approach. The performance of the multi-class SVM based classifier was unfortunately not what was expected. However, the findings show that both the SG and RS lacunarity produce enough discriminating features that warrant further research

    Hiding in Plain Sight: Scrubbing Unwanted Information

    Get PDF
    Steganography is a technique used to hide encrypted messages within multimedia files. This technique was recently reported to have been used by Osama Bin Laden to communicate with terrorist cells within the United States, and, thus, prevention of the transmission of steganographic content is of great interest to those interested in information security. Methods of steganalysis have been developed that attempt to detect files that contain steganographic content. However, authors of these methods admit that they are not viable for production or have been shown to be defeated by newer advances in steganography. This design science research illustrates an innovation in which algorithms neutralize any hidden messages without significantly detracting from the underlying integrity of the multimedia files and without the need for prior detection of steganographic content

    A Method of Steganography – P Message With Q Coefficient (SPMQC)

    Get PDF
    In this paper, we are going to propose a method for Steganography- which is based on deceiving χ2 algorithm. Since the cover image coefficients and stego image coefficients histograms have significant differences for purposes of statistical properties, statistical analysis of χ2-test reveals the existence of hidden messages inside stego image. We are introducing an idea for hiding messages in the cover image. It causes that DCT (Discrete Cosine Transforms) coefficient histogram not to have remarkable modification before and after embedding message. As a result, identifying the hidden message inside an image is impossible for an eavesdropper through χ2 -test. In this paper, we are proposing a better method with developing this algorithm. In fact, the capacity and the security of embedding messages increase extremely.DOI:http://dx.doi.org/10.11591/ijece.v3i2.201

    Comparative Analysis Among Steganographic LSB Variants

    Get PDF
    Combining the best features of steganography and cryptography is the trending concept which is being followed for the purpose of information security. Steganography provides the provision for hiding secret data in some cover file in order to make it undiscovered by the perpetrators. On the complementary, cryptography secures that secret data by manipulating its original form and converting it into an unintelligent form. Hence, making the data more powerful and secure against the prevailing security attacks and breaches. This paper represents the implementation of this combination on the two LSB variants namely sequential LSB and randomized LSB. A comparison among the two approaches is carried out by adding a secret text into a video cover file. The concept of chaotic sequence has been used as the security approach that converts the secret data into random bits pattern. The proposed work uses the traditional LSB approach as basic steganographic model. The inference on the basis of parameters concludes that the randomized LSB shows better results than the sequential LSB scheme

    Image steganography based on DNA sequence translation properties

    Get PDF
    Digital communication has become a vital part of daily life nowadays, many applications are using internet-based communication and here the importance of security rose to have a secure communication between two parties to prevent authorized access to sensitive data. These requirements led to a number of research in information security that has been done in the past two decades. Cryptography and steganography are the two main methods that are being used for information security. Cryptography refers to techniques that encrypt a message to be sent to a destination using different methods to be done. On the other hand, steganography is the science of hiding information from others using another cover message or media such as image, audio, video, and DNA sequence. This paper proposed a new method to hide information in an image using the least significant bit (LSB) based on Deoxyribonucleic Acid (DNA) sequence. To accomplish this, the proposed scheme used properties of DNA sequence when codons that consist of three nucleotides are translated to proteins. The LSB of two pixels from the image are taken to represent a codon and then translate them to protein. The secret message bits are injected into codons before the translation process which slightly distorts the image and makes the image less suspicious and hard to detect the hidden message. The experimental results indicate the effeteness of the proposed method
    • …
    corecore