62 research outputs found
Multilevel Steganography to Improve Secret Communication
This chapter presents multilevel audio steganography, which describes a new model for hidden communication in secret communication technology. At least two embedding methods are used in such a way that the second method will use the first method as a carrier. The proposed method has several potential benefits in hidden communication. This method can be used to increase the level of security while transmitting the confidential information over public channels or internet and also can be used to provide two or more information hiding solutions simultaneously. The performance of the proposed method in terms of imperceptibility, capacity & security is measured through different experiments
The Realizations of Steganography in Encrypted Domain
With the popularization and application of privacy protection technologies in
cloud service and social network, ciphertext has been gradually becoming a
common platform for public to exchange data. Under the cover of such a
plat-form, we propose steganography in encrypted domain (SIED) in this paper to
re-alize a novel method to realize secret communication Based on Simmons' model
of prisoners' problems, we discuss the application scenarios of SIED. According
to the different accesses to the encryption key and decryption key for secret
mes-sage sender or receiver, the application modes of SIED are classified into
four modes. To analyze the security requirments of SIED, four levels of
steganalysis attacks are introduced based on the prior knowledge about the
steganography system that the attacker is assumed to obtain in advance. Four
levels of security standards of SIED are defined correspondingly. Based on the
existing reversible data hiding techniques, we give four schemes of SIED as
practical instances with different security levels. By analyzing the embedding
and extraction characteris-tics of each instance, their SIED modes, application
frameworks and security lev-els are discussed in detail
Concepto de aristas múltiples empleado para esteganografía de imagen
Digital Steganography means hiding sensitive data inside a cover object ina way that is invisible to un-authorized persons. Many proposed steganography techniques in spatial domain may achieve high invisibility requirement but sacrifice the good robustness against attacks. In some cases, weneed to take in account not just the invisibility but also we need to thinkabout other requirement which is the robustness of recovering the embedded secrete messages. In this paper we propose a new steganoraphicscheme that aims to achieve the robustness even the stego image attackedby steganalyzers. Furthermore, we proposed a scheme which is more robust against JPEG compression attack compared with other traditionalsteganography schemes
PENGAMANAN PESAN MENGGUNAKAN TEKNIK STEGANOGRAFI DENGAN ALGORITMA LEAST SIGNIFICANT BIT (LSB)
Steganography is a technique or art to hide a secret message into a cover so that the existence of the secret message cannot be known by other people or third parties who do not have the ability to know the contents of the secret message. The Least Significant Bit (LSB) method is one of the methods used in steganography to hide a message by changing the value of the rightmost bit of a stego cover with a secret message. The purpose of this study was to hide a text message into an image using the LSB method
Text hiding in text using invisible character
Steganography can be defined as the art and science of hiding information in the data that could be read by computer. This science cannot recognize stego-cover and the original one whether by eye or by computer when seeing the statistical samples. This paper presents a new method to hide text in text characters. The systematic method uses the structure of invisible character to hide and extract secret texts. The creation of secret message comprises four main stages such using the letter from the original message, selecting the suitable cover text, dividing the cover text into blocks, hiding the secret text using the invisible character and comparing the cover-text and stego-object. This study uses an invisible character (white space) position of in the cover text that used to hide the the secrete sender masseges. The experiments results show that the suggested method presents highly secret due to use the multi-level of complexity to avoid the attackers
- …