Multi-Level Steganography for Smart Phones

被引:0
作者
Amruth, Vivck C. [1 ]
Amrita, P. P. [1 ]
机构
[1] Amrita Viswa Vidyapeetham, TIFAC Core CyberSecur, Coimbatore, Tamil Nadu, India
来源
2014 FIRST INTERNATIONAL CONFERENCE ON NETWORKS & SOFT COMPUTING (ICNSC) | 2014年
关键词
Steganography; Inpainting; Compression; One Time Padding; YASS; Blind Steganalysis;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A new approach for securing data while transmitting or storing in Smart phones has been proposed in this Research paper. The proposed method employs Multi-Level Steganography vith Defense in Depth mechanism for enhanced protection of embedded data and a compression method to effectively compress the data. Multi-Level Steganography have many levels of steganography employed one after the other. It makes sure that without knowing the number of level and the methods used in each level it becomes practically impossible to detect the message. In-painting method is used for compressing secret images and VASS steganography which works on JPEG cover images is used which resists blind steganalysis on both the levels. To enhance the security in inner level One Time padding (XOR) is used.
引用
收藏
页码:81 / 84
页数:4
相关论文
共 50 条
[31]   Multi-level Encrypted Reversible Data Hiding using Histogram Shifting for Configurable Embedding Rate [J].
Mohan, Arun K. ;
Saranya, M. R. ;
Anusudha, K. .
2015 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI), 2015,
[32]   Multi-Edge Concept used for Image Steganography [J].
Rashid, Rasber Dh ;
Abdulrahman, Ladeh S. ;
Majeed, Taban F. .
REVISTA INNOVACIENCIA, 2019, 7 (01)
[33]   MULTI-CHANNEL ECG-BASED STEGANOGRAPHY [J].
Boostani, R. ;
Sabeti, M. .
BIOMEDICAL ENGINEERING-APPLICATIONS BASIS COMMUNICATIONS, 2018, 30 (06)
[34]   Secret sharing with multi-cover adaptive steganography [J].
Yuan, Hai-Dong .
INFORMATION SCIENCES, 2014, 254 :197-212
[35]   Lightweight and efficient approach for multi-secret steganography [J].
Koptyra, Katarzyna ;
Ogiela, Marek R. .
INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2020, 12 (04) :434-440
[36]   Deep Multi-Image Steganography with Private Keys [J].
Kweon, Hyeokjoon ;
Park, Jinsun ;
Woo, Sanghyun ;
Cho, Donghyeon .
ELECTRONICS, 2021, 10 (16)
[37]   Robust block-based watermarking algorithm with parallelization using multi-level discrete wavelet transformation [J].
Yadav, Akash ;
Goyal, Jitendra ;
Ahmed, Mushtaq .
JOURNAL OF REAL-TIME IMAGE PROCESSING, 2024, 21 (06)
[38]   A Secure Triple Level Encryption Method Using Cryptography and Steganography [J].
Usha, S. ;
Kumar, G. A. Sathish ;
Boopathybagan, K. .
2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, :1017-1020
[39]   New deep data hiding and extraction algorithm using multi-channel with multi-level to improve data security and payload capacity [J].
Hardan, Hanan ;
Alawneh, Ali ;
El-Emam, Nameer N. .
PEERJ COMPUTER SCIENCE, 2022, 8
[40]   Multi image encryption and steganography based on synchronization of chaotic lasers [J].
Mukhopadhyay, Sumona ;
Leung, Henry .
2013 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC 2013), 2013, :4403-4408