New results on robustness of secure steganography (original) (raw)

Secure steganography based on embedding capacity

International Journal of Information Security, 2009

Mostly the embedding capacity of steganography methods is assessed in non-zero DCT coefficients. Due to unequal distribution of non-zero DCT coefficients in images with different contents, images with the same number of non-zero DCT coefficients may have different actual embedding capacities. This paper introduces embedding capacity as a property of images in the presence of multiple steganalyzers, and discusses a

Secure and robust steganography using side information at the encoder

2006

Abstract Two important classes of data hiding methods are the ones established by watermarking and steganographic applications. Whereas in both cases information is concealed inside a host signal subject to an imperceptibility constraint, some of their fundamental requirements differ.

Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions

IEEE Transactions on Information Theory, 2000

An analysis of steganographic systems subject to the following perfect undetectability condition is presented in this paper. Following embedding of the message into the covertext, the resulting stegotext is required to have exactly the same probability distribution as the covertext. Then no statistical test can reliably detect the presence of the hidden message. We refer to such steganographic schemes as perfectly secure. A few such schemes have been proposed in recent literature, but they have vanishing rate. We prove that communication performance can potentially be vastly improved; specifically, our basic setup assumes independently and identically distributed (i.i.d.) covertext, and we construct perfectly secure steganographic codes from public watermarking codes using binning methods and randomized permutations of the code. The permutation is a secret key shared between encoder and decoder. We derive (positive) capacity and random-coding exponents for perfectly-secure steganographic systems. The error exponents provide estimates of the code length required to achieve a target low error probability.

Multiple Meliorated Security Using Steganography Embedded with Watermarking and Cryptography

2016

One of the most important factors of information technology and communication is the security of information. Steganography is the method through which the very existence of the message can be kept secret. Various security mechanisms have been developed by integrating steganography with cryptography. This involves encrypting any file (piece of information data) through cryptography and encapsulating the same in another such file (carrier or container image) and then securing it with a secret key. Among the various algorithms available for steganography, LSB algorithm is the simplest and comparably more reliable. It involves modifying the LSB of the pixels of an image with the encrypted message bits such that the basic characteristics and underlying properties of the carrier remain unchanged. However the techniques should be robust enough to prevent detection and removal of embedded data. Hence we propose to embed steganography with watermarking. Watermarking is establishing the iden...

A Robust Steganography Approach with High Embedding Capacity Using Unique Value Embedding and Codebook

Journal of theoretical and applied information technology, 2014

Steganography is the art of hiding data and an effort to conceal the existence of the embedded information. There are a lot of data to be embedded such as text, image, audio, and video. An information hiding system is characterized by having three different aspects that contend with each other. These are capacity, security, and robustness. In steganography area, the common method used to hide a secret data is LSB (Least Significant Bit). LSB provides the high embedding capacity, however, when the secret data is larger than cover data, the cover data would be dramatically distorted. The distorted cover data can attract the attacker to perform steganalysis method. This study is carried out to overcome the embedding capacity problem without producing a significant distortion in cover data. The experiment is tested by hiding audio signals in image file. The idea is to convert the audio signals into native data representation (unsigned integer 8) and to find its unique values. The image ...

Robust and secure image steganographic algorithm based on matrix embedding

International Journal of Electronic Security and Digital Forensics, 2014

Steganography is a sub-discipline of data hiding with an objective to modify a digital object, known as cover object, to encode and conceal a message so that it cannot be seen while it is transmitted on public communication channels such as computer network. The main requirements of steganography system are imperceptibility, high payload, security and robustness against transmission channel noise. The proposed work presented in this paper consist of a robust (non-fragile) steganography technique based on the matrix embedding using a self-synchronising variable length T-codes (to obtain compressed message from the original message) and RS codes (as error correction coding to provide robustness to the embedded message against transmission errors). The original message is first encoded using T-codes and then with RS-codes. The selection of the plane for embedding is made on the basis of variance of intensity resolutions. The secret message is then embedded in the selected 2nd, 3rd or 4th plane of the cover image using the matrix encoding technique. The proposed method is compared with other existing steganographic schemes based on error correcting codes. Experimental results show that the proposed method is an improvement over the existing methods.

Robust Steganography Technique for Embedding Secret Images

Halabja University Journal

Steganography is a technique used to disguise the existence of a secret communication. It is used in many fields to solve information security problems. Steganography is a technique to embed secret data in a carrier image and obtain a new image that can't actually be distinguished from the original image. This paper proposes steganography method based on least significant bit (LSB) replacement and integer wavelet transform IWT through lifting scheme to achieve high quality of stego image. we will do some pre-processing on the secret image before embedding process. IWT transforms the secret image from spatial domain to a frequency domain and will be divided it into a group of sub-bands, some of which we will use for their utmost importance and ignore some of them. We have embedded the secret image in a sequential LSB method and in a randomly LSB method and also by the method LSB matching. But after applying our proposed method to the secret image and then embedded it in each of t...

Analysis of Different Steganographic Algorithms for Secured Data Hiding

The goal of steganography is to avoid drawing suspicion to the transmission of a hidden message. If suspicion is raised, steganography may fail. The success of steganography depends on the secrecy of the action. If steganography is detected, the system will fail but data security depends on the robustness of the applied algorithm. In this paper, we compress the secret message and encrypt it by the receiver's public key along with the stego key and embed both messages in a carrier using an embedding algorithm. The stego -image is the result we get by running the algorithm you select on the message (file to hide) and cover (image). It can be saved into BMP or PNG format. The reason that it can only be saved in these formats is because they are lossless -there is no information lost as part of the file formatting. The various applications of steganography include secure military communications, multimedia watermarking and fingerprinting applications for authentication purposed to curb the problem of digital piracy.

On the achievable rate of side informed embedding techniques with steganographic constraints

2005

Abstract. The development of watermarking schemes in the literature is generally guided by a power constraint on the watermark to be embedded into the host. In a steganographic framework there is an additional constraint on the embedding procedure. It states that, for a scheme to be undetectable by statistical means, the pdf of the host signal must be approximately or exactly equal to that of the stegotext. In this work we examine this additional constraint when coupled with DC-DM.

Synthesis of Optimal Steganographic Method Meeting Given Criteria

Informatics, Control, Measurement in Economy and Environment Protection, 2015

One of the steganography areas is digital watermarking. In this paper, the technique of comparative analysis of embedding information methods into an image was proposed. A comprehensive analysis of the most relevant steganographic methods of hiding information was made. Own method of embedding information in still images was synthesized. The possibility of studied methods to adapt to the real channels was evaluated for the first time. The robustness and security of steganographic systems based on the proposed method were also demonstrated.