Data masking: A new approach for steganography?

被引:21
作者
Radhakrishnan, R [1 ]
Kharrazi, M [1 ]
Memon, N [1 ]
机构
[1] Polytech Univ, Brooklyn, NY 11201 USA
来源
JOURNAL OF VLSI SIGNAL PROCESSING SYSTEMS FOR SIGNAL IMAGE AND VIDEO TECHNOLOGY | 2005年 / 41卷 / 03期
关键词
Secret Message; Advance Encryption Standard; Cipher Stream; Stego Image; Image Stream;
D O I
10.1007/s11265-005-4153-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
It is well known that encryption provides secure channels for communicating entities. However, due to lack of covertness on these channels, an eavesdropper can identify encrypted streams through statistical tests and capture them for further cryptanalysis. Hence, the communicating entities can use steganography to achieve covertness. In this paper we propose a new form of multimedia steganography called data masking. Instead of embedding a secret message into a multimedia object, as in traditional multimedia steganography, we process the entire secret message to make it appear statistically similar to a multimedia object itself. Thereby we foil an eavesdropper who is primarily applying statistical tests to detect encrypted communication channels. We show that our approach can potentially give a covert channel capacity which is an order of magnitude higher than traditional steganography. Our experiments also show that steganalyzers trained with stego objects of known steganographic have a low detection accuracy for datamasked multimedia objects.
引用
收藏
页码:293 / 303
页数:11
相关论文
共 11 条
[1]  
AVCIBAS I, 2001, SECURITY WATERMAKING
[2]   Detection of LSB steganography via sample pair analysis [J].
Dumitrescu, S ;
Wu, XL ;
Wang, Z .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2003, 51 (07) :1995-2007
[3]  
FRANZ E, 2002, 5 INT WORKSH INF HID
[4]   Detecting LSB steganography in color and gray-scale images [J].
Fridrich, J. ;
Goljan, M. ;
Du, R. .
IEEE Multimedia, 2001, 8 (04) :22-28
[5]  
*ISO IEC, 1999, 144951 ISO IEC
[6]  
Johnson NF, 2000, ART H COMP SCI LIBR, P43
[7]  
JOHNSON NF, 1998, LNCS, V1525, P32
[8]  
LYU S, 2002, 5 INT WORKSH INF HID
[9]  
Simmons G.J., 1984, Proc. CRYPTO, P51
[10]  
Westfeld A, 2000, LECT NOTES COMPUT SC, V1768, P61