Cyber warfare: Steganography vs. steganalysis

被引:195
作者
Wang, HQ [1 ]
Wang, SZ
机构
[1] City Univ Hong Kong, Dept Informat Syst, Hong Kong, Hong Kong, Peoples R China
[2] Shanghai Univ, Sch Commun & Informat Engn, Shanghai 200444, Peoples R China
关键词
D O I
10.1145/1022594.1022597
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The comparison between steganography and steganalysis which represents an important part of 21st century cyber warfare with a profound influence on information security is discussed. Quantization Index Modulation (QIM) approach uses different quantizers to carry different bits of the secret data. Some embedding tools cause subtle changes in the set of possible values that may be taken by the pixel gray levels and transform coefficients. Latest embedding methods are devised that avoid creation of new colors to combat steganalytic tools based on analyzing the increase of unique colors in an image.
引用
收藏
页码:76 / 82
页数:7
相关论文
共 13 条
  • [1] Protecting ownership rights through digital watermarking
    Berghel, H
    OGorman, L
    [J]. COMPUTER, 1996, 29 (07) : 101 - 103
  • [2] Quantization index modulation: A class of provably good methods for digital watermarking and information embedding
    Chen, B
    Wornell, GW
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2001, 47 (04) : 1423 - 1443
  • [3] Practical steganalysis of digital images - State of the art
    Fridrich, J
    Goljan, M
    [J]. SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS IV, 2002, 4675 : 1 - 13
  • [4] Exploring steganography: Seeing the unseen
    Johnson, NF
    Jajodia, S
    [J]. COMPUTER, 1998, 31 (02) : 26 - +
  • [5] Defining security in steganographic systems
    Katzenbeisser, S
    Petitcolas, FAP
    [J]. SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS IV, 2002, 4675 : 50 - 56
  • [6] Kovacich GL, 2002, COMPUT SECUR, V21, P35, DOI 10.1016/S0167-4048(02)00104-9
  • [7] What InfoSec professionals should know about information warfare tactics by terrorists
    Kovacich, GL
    Jones, A
    [J]. COMPUTERS & SECURITY, 2002, 21 (02) : 113 - 119
  • [8] Spread spectrum image steganography
    Marvel, LM
    Boncelet, CG
    Retter, CT
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 1999, 8 (08) : 1075 - 1083
  • [9] Memon N, 1998, COMMUN ACM, V41, P34
  • [10] MOSKOWITZ I, 2000, P 2000 WORKSH NEW SE, P41