Secure Key Based Image Realization Steganography

被引:0
作者
Samima, Shabnam [1 ]
Roy, Ratnakirti [1 ]
Changder, Suvamoy [1 ]
机构
[1] Natl Inst Technol, Dept Comp Applicat, Durgapur, India
来源
2013 IEEE SECOND INTERNATIONAL CONFERENCE ON IMAGE INFORMATION PROCESSING (ICIIP) | 2013年
关键词
Image Steganography; Pseudo random number generator; Pairing Function; Matrix Encoding; Extraction Key;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Steganography is the science of hiding crucial information in someinnocuous objects such that the mere existence of the hidden information is unidentifiable in human sight. Various unique methodologies have been implemented over time to hide information using steganography. In most of the methodologies the exact secret information is hidden inside the cover image in a way that it is completely unrecognizable. Thus, if the embedding mechanism is compromised, there is no way that the hidden message can remain unexposed. Security of the secret information can be enhanced if the actual secret message is not embedded in the cover image at all. In this paper a novel approach to image steganography through image realization has been proposed in which, rather than sending the actual secret information some mapping information of the secret information is embedded in the stego image. The actual realization of the secret information is secured using a multi layered secure pass key.
引用
收藏
页码:377 / 382
页数:6
相关论文
共 13 条
[1]  
[Anonymous], 2011, INT J COMPUTER THEOR
[2]   A steganographic method for digital images using side match [J].
Chang, CC ;
Tseng, HW .
PATTERN RECOGNITION LETTERS, 2004, 25 (12) :1431-1437
[3]  
Chen P.Y., 2009, INT J APPL SCI ENG, V7, P53
[4]  
Crandall R., 1998, SOME NOTES STEGANOGR
[5]  
Greenwood P., 1996, Guide to Chi-Squared Testing
[6]  
Johnson Neil F., INFORM HIDING STEGAN, P1
[7]   A LSB steganography detection algorithm [J].
Li, Z ;
Sui, AF ;
Yang, YX .
PIMRC 2003: 14TH IEEE 2003 INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS PROCEEDINGS, VOLS 1-3 2003, 2003, :2780-2783
[8]  
Provos N., 2003, IEEE Security & Privacy, V1, P32, DOI 10.1109/MSECP.2003.1203220
[9]  
Sellers D., 2013, INTRO STEGANOGRAPHY
[10]  
Tomlinson M., 2002, IEEE INT WORKSH TREN, P16