268 research outputs found
Recent Advances in Steganography
Steganography is the art and science of communicating which hides the existence of the communication. Steganographic technologies are an important part of the future of Internet security and privacy on open systems such as the Internet. This book's focus is on a relatively new field of study in Steganography and it takes a look at this technology by introducing the readers various concepts of Steganography and Steganalysis. The book has a brief history of steganography and it surveys steganalysis methods considering their modeling techniques. Some new steganography techniques for hiding secret data in images are presented. Furthermore, steganography in speeches is reviewed, and a new approach for hiding data in speeches is introduced
Difference-expansion based reversible data hiding and its steganalysis
A novel reversible data embedding method was reported in a recent IEEE journal article. The method was based on difference expansion (DE) technique. It used redundancy in digital images to achieve a high embedding capacity, while keeping visual distortion of the stego-image low. In this thesis, this technique was studied and experimentally evaluated. An effective steganalysis scheme for this DE-based reversible data embedding method was proposed, which used 12-dimensional feature vectors and a Bayes Classifier. The proposed steganalysis scheme steadily achieved a correct classification rate of 99%
Survey of the Use of Steganography over the Internet
This paper addressesthe use of Steganography over the Internet by terrorists. There were ru-mors in the newspapers that Steganography is being used to covert communication between terrorists, without presenting any scientific proof. Niels Provos and Peter Honeyman conducted an extensive Internet search where they analyzed over 2 million images and didn’t find a single hidden image. After this study the scientific community was divided: some believed that Niels Provos and Peter Honeyman was conclusive enough other did not. This paper describes what Steganography is and what can be used for, various Steganography techniques and also presents the studies made regarding the use of Steganography on the Internet.Steganography, Secret Communication, Information Hiding, Cryptography
An Efficient Light-weight LSB steganography with Deep learning Steganalysis
Active research is going on to securely transmit a secret message or
so-called steganography by using data-hiding techniques in digital images.
After assessing the state-of-the-art research work, we found, most of the
existing solutions are not promising and are ineffective against machine
learning-based steganalysis. In this paper, a lightweight steganography scheme
is presented through graphical key embedding and obfuscation of data through
encryption. By keeping a mindset of industrial applicability, to show the
effectiveness of the proposed scheme, we emphasized mainly deep learning-based
steganalysis. The proposed steganography algorithm containing two schemes
withstands not only statistical pattern recognizers but also machine learning
steganalysis through feature extraction using a well-known pre-trained deep
learning network Xception. We provided a detailed protocol of the algorithm for
different scenarios and implementation details. Furthermore, different
performance metrics are also evaluated with statistical and machine learning
performance analysis. The results were quite impressive with respect to the
state of the arts. We received 2.55% accuracy through statistical steganalysis
and machine learning steganalysis gave maximum of 49.93~50% correctly
classified instances in good condition.Comment: Accepted pape
A High Secured Steganalysis using QVDHC Model
Data compression plays a vital role in data security as it saves memory, transfer speed is high, easy to handle and secure. Mainly the compression techniques are categorized into two types. They are lossless, lossy data compression. The data format will be an audio, image, text or video. The main objective is to save memory of using these techniques is to save memory and to preserve data confidentiality, integrity. In this paper, a hybrid approach was proposed which combines Quotient Value Difference (QVD) with Huffman coding. These two methods are more efficient, simple to implement and provides better security to the data. The secret message is encoded using Huffman coding, while the cover image is compressed using QVD. Then the encoded data is embedded into cover image and transferred over the network to receiver. At the receiver end, the data is decompressed to obtain original message. The proposed method shows high level performance when compared to other existing methods with better quality and minimum error
Data hiding techniques in steganography using fibonacci sequence and knight tour algorithm
The foremost priority in the information and communication technology era, is achieving an efficient and accurate steganography system for hiding information. The developed system of hiding the secret message must capable of not giving any clue to the adversaries about the hidden data. In this regard, enhancing the security and capacity by maintaining the Peak Signal-to-Noise Ratio (PSNR) of the steganography system is the main issue to be addressed. This study proposed an improved for embedding secret message into an image. This newly developed method is demonstrated to increase the security and capacity to resolve the existing problems. A binary text image is used to represent the secret message instead of normal text. Three stages implementations are used to select the pixel before random embedding to select block of (64 Ă— 64) pixels, follows by the Knight Tour algorithm to select sub-block of (8 Ă— 8) pixels, and finally by the random pixels selection. For secret embedding, Fibonacci sequence is implemented to decomposition pixel from 8 bitplane to 12 bitplane. The proposed method is distributed over the entire image to maintain high level of security against any kind of attack. Gray images from the standard dataset (USC-SIPI) including Lena, Peppers, Baboon, and Cameraman are implemented for benchmarking. The results show good PSNR value with high capacity and these findings verified the worthiness of the proposed method. High complexities of pixels distribution and replacement of bits will ensure better security and robust imperceptibility compared to the existing systems in the literature
One-Time Pad Encryption Steganography System
In this paper we introduce and describe a novel approach to adaptive image steganography which is combined with One-Time Pad encryption, and demonstrate the software which implements this methodology. Testing using the state-of-the-art steganalysis software tool StegExpose concludes the image hiding is reliably secure and undetectable using reasonably-sized message payloads (≤25% message bits per image pixel; bpp). Payload image file format outputs from the software include PNG, BMP, JP2, JXR, J2K, TIFF, and WEBP. A variety of file output formats is empirically important as most steganalysis programs will only accept PNG, BMP, and possibly JPG, as the file inputs.
Keywords: steganography, one-time pad, steganalysis, information hiding, digital forensic
- …