An evaluation of image based steganography methods

被引:0
作者
Bailey K. [1 ]
Curran K. [2 ]
机构
[1] Letterkenny Institute of Technology, Letterkenny, Co., Donegal, Port Road
[2] Internet Technologies Research Group, University of Ulster, Magee Campus, Derry
来源
Multimedia Tools Appl | 2006年 / 1卷 / 55-88期
关键词
Steganalysis; Steganography;
D O I
10.1007/s11042-006-0008-4
中图分类号
学科分类号
摘要
Steganography is a process that involves hiding a message in an appropriate carrier for example an image or an audio file. The carrier can then be sent to a receiver without anyone else knowing that it contains a hidden message. This is a process, which can be used for example by civil rights organisations in repressive states to communicate their message to the outside world without their own government being aware of it. Less virtuously it can be used by terrorists to communicate with one another without anyone else's knowledge. In both cases the objective is not to make it difficult to read the message as cryptography does, it is to hide the existence of the message in the first place possibly to protect the courier. The initial aim of this study was to investigate steganography and how it is implemented. Based on this work a number of common methods of steganography could then be implemented and evaluated. The strengths and weaknesses of the chosen methods can then be analysed. To provide a common frame of reference all of the steganography methods implemented and analysed used GIF images. Seven steganography methods were implemented. The methods were chosen for their different strengths in terms of resistance to different types of steganalysis or their ability to maximise the size of the message they could store. All of the methods used were based on the manipulation of the least significant bits of pixel values or the rearrangement of colours to create least significant bit or parity patterns, which correspond to the message being hidden.
引用
收藏
页码:55 / 88
页数:33
相关论文
共 11 条
  • [1] Brown A., S-tools for Windows, Shareware, (1994)
  • [2] Jiri F., A New Steganographic Method for Palette-based Images, pp. 285-289, (1999)
  • [3] Jiri F., Du R., Secure steganographic methods for palette images, Information Hiding, Proceedings of the Third International Workshop, IH'99 Dresden Germany, Computer Science, 1768, pp. 47-60, (2000)
  • [4] Hansmann F., Steganos, Deus Ex Machina Communications, (1996)
  • [5] Johnson Neil F., Jajodia S., Steganalysis of images created using current steganography software, Information Hiding, Second International Workshop, IH'98 Portland, Oregon, pp. 273-289, (1998)
  • [6] Johnson Neil F., Duric Z., Jajodia S., Information Hiding, and Watermarking - Attacks & Countermeasures, (2001)
  • [7] Mark N., LZW data compression, Dr Dobbs Journal, (1989)
  • [8] Birgit P., Information hiding terminology, First International Workshop, Cambridge, UK, Proceedings, Computer Science, 1174, pp. 347-350, (1996)
  • [9] Peter W., Disappearing Cryptography, Information Hiding: Steganography and Watermarking (2nd Edition), (2002)
  • [10] Andreas W., Andreas P., Attacks on steganographic systems, Third International Workshop, IH'99 Dresden Germany, Proceedings, Computer Science, 1768, pp. 61-76, (1999)