scholarly journals Improving embedding efficiency for digital steganography by exploiting similarities between secret and cover images

2019 ◽  
Vol 78 (13) ◽  
pp. 17799-17823 ◽  
Author(s):  
Alan A. Abdulla ◽  
Harin Sellahewa ◽  
Sabah A. Jassim
Author(s):  
Pinky Saikia Dutta ◽  
Sauvik Chakraborty

Steganography is data hidden within data. Steganography is an encryption technique that can be used along with cryptography as an extra-secure method in which to protect data. Steganography techniques can be applied to images, a video file or an audio file. Steganography is the practice of concealing a file, message, image, or video within another file, message, image, or video. The first recorded use of the term was in 1499 by Johannes Trithemius in his Steganographia, a treatise on cryptography and steganography, disguised as a book on magic. The advantage of steganography over cryptography alone is that the intended secret message does not attract attention to itself as an object of scrutiny. Plainly visible encrypted messages, no matter how unbreakable they are, arouse interest and may in themselves be incriminating in countries in which encryption is illegal. Whereas cryptography is the practice of protecting the contents of a message alone, steganography is concerned both with concealing the fact that a secret message is being sent and its contents. Steganography includes the concealment of information within computer files. In digital steganography, electronic communications may include steganographic coding inside of a transport layer, such as a document file, image file, program or protocol.


Author(s):  
Maciej Liskiewicz ◽  
Ulrich Wölfel

This chapter provides an overview, based on current research, on theoretical aspects of digital steganography— a relatively new field of computer science that deals with hiding secret data in unsuspicious cover media. We focus on formal analysis of security of steganographic systems from a computational complexity point of view and provide models of secure systems that make realistic assumptions of limited computational resources of involved parties. This allows us to look at steganographic secrecy based on reasonable complexity assumptions similar to ones commonly accepted in modern cryptography. In this chapter we expand the analyses of stego-systems beyond security aspects, which practitioners find difficult to implement (if not impossible to realize), to the question why such systems are so difficult to implement and what makes these systems different from practically used ones.


Author(s):  
Parkavi R. ◽  
Anitha S. ◽  
Gayathri R.

Steganography has been considered as a major instrument used for an unauthorized and destructive purpose such as crime and warfare, and forensics has been used for a constructive purpose such as crime detection and fraud detection. Hence, the combination of both steganography and forensics plays a major role in the present internet era for information exchange between two parties. It has been propelled to the forefront of the current security techniques. The main objective of the technique is to provide an imperceptible way of transferring secret messages to the recipient. Another issue to be noted is that the term steganography completely differs from cryptography. The above-stated analysis is used in digital forensics. There are many steganography software tools available for ordinary computer users.


2020 ◽  
Vol 10 (21) ◽  
pp. 7820
Author(s):  
Han-Yan Wu ◽  
Ling-Hwei Chen ◽  
Yu-Tai Ching

The primary goal of steganographic methods is to develop statically undetectable methods with high steganographic capacity. The embedding efficiency is one kind of measure for undetectability. Block-based steganography methods have been proposed for achieving higher embedding efficiency under limited embedding capacity. However, in these methods, some blocks with larger embedding distortions are skipped, and a location map is usually incorporated into these methods to record the embedding status of each block. This reduces the embedding capacity for secret messages. In this study, we proposed a block-based steganography method without a location map for palette images. In this method, multiple secret bits can be embedded in a block by modifying at most one pixel with minimal embedding distortion; this enables each block to be used for data embedding; thus, our method provides higher embedding capacity. Furthermore, under the same capacity, the estimated and experimental embedding efficiencies of the proposed method are compared with those of Imaizumi et al. and Aryal et al.’s methods; the comparisons indicate that the proposed method has higher embedding efficiency than Imaizumi et al. and Aryal et al.’s methods.


2018 ◽  
Vol 05 (01) ◽  
pp. 9-16
Author(s):  
Deepak Sharma ◽  
Anshu Sharma ◽  
Gaurav Agarwal

2008 ◽  
Author(s):  
H. Oktay Altun ◽  
Orhan Bulan ◽  
Gaurav Sharma ◽  
Mark F. Bocko
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document