2009年10月31日 星期六
S-Tools研究心得
加密和解密必須是同一密鑰,如DES、IDEA、triple DES
以上是在操作s-tools軟體的流程..
以下連結是我在網路上搜尋s-tools找到的網站
裡面也有介紹其他隱藏檔案的軟體
http://kit168.blogspot.com/2008/10/blog-post.html
心得嘛..
就是藏入檔案的圖片size真的居然不會變大,
而且肉眼也難以辨別出原圖和藏檔案的圖片有差別
但是檔案大小受限於原始檔(圖片檔)的大小
有個疑問就是 我拉gif檔進去視窗,可是視窗卻關掉了= =..
屢試不爽阿..
S-Tools軟體研究心得
2009年10月22日 星期四
Hide and Seek: An Introduction to Steganography
作者:Niels Provos 與 Peter Honeyman
摘要:
This article discusses existing steganographic systems and presents recent research in detecting them via statistical steganalysis. Other surveys focus on the general usage of information hiding and watermarking or else provide an overview of detection algorithms. Here, we present recent research and discuss the practical application of detection algorithms and the mechanisms for getting around them.
2009年10月21日 星期三
An Efficient Linguistic Steganography for Chinese Text
對中文有效的語言之隱藏學
摘要
Linguistic steganography, as a method of text steganography, is becoming a hot spot.
To investigate the linguistic steganography for Chinese text, a Chinese linguistic steganography algorithm is presented by utilizing the existing Chinese information processing techniques. The algorithm is based on the substitution of synonyms and variant forms of the same word. Furthermore, in order to decrease the interaction between the surrounding words and the substituted word, the contextual window of sentence is taken into account by using the disambiguation function of Chinese lexical analysis. Experimental results show that the algorithm can achieve a good result with the imperceptibility, a degree of information-carrying capacity and the performance of resistant to steganalysis.
語言隱藏學做為隱藏學的方法已逐漸成為熱門方式
調查中國的語言隱藏學,運用現有的中國訊息處理的技術提出中國語言隱藏學的演算法
演算法根據同義詞和同一個詞的變形形式的代替
此外,為了減少周圍的詞和被替代的詞之間的作用,上下文的部分會透過使用中文詞彙分析的方式去計算
實驗性結果表示,算法可能達到一個細微的好結果,程度訊息運載的容量和具抗性的加密
poor English....大概翻完了
我之所以找這篇是想說
利用中國文字做為隱藏學的基礎 我會比較了解
不然其他種方式就算看了 可能也沒辦法那麼快意會
在家沒辦法看圖書館IEEE的資料
還得設proxy...好麻煩
感謝學長指導 不然還真的沒看到圖書館有寫說在家使用要設proxy的說明
所以我才能順利下載paper
略看一下paper....
好像中文字也沒那麼好懂0.0
有空慢慢看囉
Vision Research Lab - Zero Divergence Secure Steganography
1.Perceptual constraint. The perceptual distortion between the original and stego image should not be more than a certain maximum amount, D1 , for some perceptual distance measure.
2.Statistical constraint. The embedding process should not modify the statistics of the host signal more than a very small number, epsilon, for some statistical distance measure.
The objective in this project is to investigate steganographic schemes that can provide provable security by achieving zero Kullback-Leibler divergence between the cover and the stego signal distributions, while communicating at high rates.
An Overview of Steganography for the Computer Forensics Examiner
Associate Professor
Computer and Digital Forensics Program
Champlain College
Burlington, Vermont
Abstract
Steganography is the art of covered or hidden writing. The purpose of steganography is covert communication—to hide the existence of a message from a third party. This paper is intended as a high-level technical introduction to steganography for those unfamiliar with the field. It is directed at forensic computer examiners who need a practical understanding of steganography without delving into the mathematics, although references are provided to some of the ongoing research for the person who needs or wants additional detail. Although this paper provides a historical context for steganography, the emphasis is on digital applications, focusing on hiding information in online image or audio files. Examples of software tools that employ steganography to hide data inside of other files as well as software to detect such hidden files will also be presented.
2009年10月20日 星期二
調色盤影像
2009年10月15日 星期四
Steganography in SMS by Sudoku puzzle
Publication Date: March 31 2008-April 4 2008
On page(s): 844 - 847
Location: Doha
ISBN: 978-1-4244-1967-8
Digital Object Identifier: 10.1109/AICCSA.2008.4493626
Current Version Published: 2008-04-22
論文簡介:
SMS (short message service) 是指人們可以利用大眾傳播工具來傳遞彼此間的訊息,而這種傳遞訊息的方式不易被懷疑,因此非常受歡迎。另外,因為最近數獨非常的流行,報紙上也幾乎都會有數獨遊戲,所以作者們認為可以利用這個特點,讓數獨成為傳遞訊息的工具。
文章連結
2009年10月14日 星期三
A New Image Steganography Technique
Comput. Sci. Dept., King Saud Univ., Riyadh
This paper appears in: Wireless Communications, Networking and Mobile Computing, 2008. WiCOM '08. 4th International Conference on
Publication Date: 12-14 Oct. 2008
On page(s): 1 - 4
Location: Dalian
ISBN: 978-1-4244-2107-7
Digital Object Identifier: 10.1109/WiCom.2008.2918
Current Version Published: 2008-11-18
Abstract:
Various image steganography techniques have been proposed. In this paper, we investigate diverse steganography techniques and tools. We state a set of criteria to analyze and evaluate the strengths and weaknesses of the presented techniques. We propose a more robust steganography technique that takes advantages of the strengths and avoids the limitations.
連結文章
New Steganography Technique for Palette Based Images
Publication Date: 9-11 Aug. 2007
Page:335~340
來源: Second International Conference on Industrial and Information Systems
Author: S.G.K.D.N. Samaratunge
Abstract:
Steganography is the art and science of hidinginformation. The goal of steganography is to avoid drawingsuspicion to the transmission of a hidden message. Thesuccess of steganography depends on the secrecy of the covercarrier. Once the steganographic carrier is disclosed then thesecurity depends on the robustness of the algorithm and thecryptographic methods used. Therefore, to maintain secrecyeither we need to make the carrier more robust againststeganalysis or discover new and better carriers. This paperdiscusses a new steganography technique for palette basedimages. Secret message is encrypted using public keycryptography before hiding. The bits of encrypted messagewill be hidden inside the stretched palette of image.
A Study on Object Image Watermarking and Palette Image Steganography
物件影像浮水印與調色盤影像資料隱藏技術之研究
The current rapid development of information technologies makes provision of commercial multimedia services on Internet. However, in rerum natura, digital multimedia is easy to be copied, re-scaled, rotated, transformed, and modified using handy processing software without much effort. This fact has derived an urgent demand for reliable and secure copyright protection for digital multimedia. Watermarking is the technology used for copy control and media identification and tracing. Most proposed watermarking methods are designed for the protection of digital images. Theses methods embed a short message (a watermark) in the image without affecting the usability but that can be detected using dedicated analysis software.
Watermarking techniques have been widely discussed and developed in recent years. However, studies which focus on watermarking techniques those can resist geometrical attacks are still not quite mature. Geometrical attacks like rotation, scaling, and transforming will miss-position the location of watermark embedded. There are some previous works working on this problem for watermark re-synchronization. We use the geometrical features of object shape in a digital image to achieve the goal of watermark re-synchronization to obtain quite remarkable imperceptibility and robustness.
In this dissertation, we aim to design some information hiding techniques for protecting images and private messages of communication on the Internet. Four information hiding related schemes are proposed. They are (1) Geometric attack free self-synchronized object image watermarking schemes (2) Palette-based object image watermarking scheme (3) Palette-based image Steganography scheme, and (4) Hierarchic texture classification based on statistical steganography.
First of all, to achieve the goal of watermark re-synchronization and embed digital watermark into an object image, geometric features of an object image like the length of principal axes, eigenvectors, and orient of mass center are use for subdividing the object shape. Using those geometric features for shape subdividing makes re-synchronization of watermark detection possible. In our study, different shape subdivision methods, including self-similarity, parallel segmentation and recursively principal axes, are proposed for object watermark embedding. And the geometric attack resistance schemes for object images can be applied to different image formats, including raw and palette-based images. Unlike the true color images and gray level images, palette-based images have discrete color palette. To embed watermark into limited colors and hold the imperceptibleness and robustness is a challenging work. An algorithm for palette-based object image watermarking is proposed here. These proposed methods are easily implemented and can obtain comparable NC values to against outside geometrical attacks such as rotation, scaling and translation.
For the issue of steganography, an iterative method of palette-based image steganography scheme is proposed to improve the existed methods. Better quality of stego- images can be produced using the proposed method. Besides, we also proposed a hierarchic texture classification using statistical steganography technique to obtain robust texture features for texture classification. Experimental results show that the proposed methods can achieve high accuracy rate and also work well even the query textures are distorted by noise corruption or compressed.
Cryptography and Steganography of Video Information in Modern Communications
FACTA UNIVERSITATIS (NIS)
出處/年份:Series: Electronics and Energetics vol. 11, No.1 (1998)
Pages:115~125
作者:Zenon Hrytskiv, Sviatoslav Voloshynovskiy and Yuriy Rytsar
點我連結此篇文章
Modern Steganography
Introduction
In this paper, we will introduce what steganography is and what kindof applications can be expected. Steganography is an art and scienceof hidding information within other information. The word itself comesfrom Greek and means hidden writting. First complex book coveringsteganography was written by Johannes Trithemius in 1499. Thebook Steganographia itself was published later in 1606 and immediatelyplaced on the Index Librorum Prohibitorum.
In recent years cryptography become very popular science. As steganographyhas very close to cryptography and its applications, we can withadvantage highlight the main differences. Cryptography is about concealingthe content of the message. At the same time encrypted data packageis itself evidence of the existence of valuable information. Steganographygoes a step further and makes the ciphertext invisible to unauthorizedusers. Hereby we can dene steganography as cryptography withthe additional property that its output looks unobtrusively.
One can ask what is it good for. Well, image the common situationwhen you encrypt your important business data. Suddenly robbers captureand torture you into revealing cryptographics keys. As well policepower may be abused. They ask you to give them the private keys or youare highly suspicious of committing crime. Next, what if the police isbribed. Would not it be better, if you can plausibly deny the existence ofimportant data?
A famous example of steganography is Simmons' Prisoners' problem, see [1]. Bob and Alice are in a jail and wish to escape. Their cellsare far apart from each other and the only allowed communication issending messages via prison ofcer. If warden detects any sign of conspiracy,he will secure their cells even more. Bob and Alice are wellaware of these facts.
Happily, before they got arrested, they have agreed a stegosystem.Stegosystem describes the way the secret message is embedded into a covertext(seemingly innocent message). According to the standard terminologyof information hidding a covertext with hidden information iscalled stegotext.
Examples of historical stegosystems can be secret inks, wax tabletsor microdots used during WWII. In modern era these methods can invokesmile on face, but image their power, when they were not widely known.Nowadays methods still hold the same simplicity, just exploit advantagesof digital media and communications.
We can distinguish between stegosystems with passive warder andactive warder. Passive warder just monitors the communication channel.He can pass the covertexts throught several statistical tests, but do notmodify them. It is the same situation as when the network packets gothrought Intrusion Detect System. Applications from this eld are oftenrefered to as trafc security.
On the other side, active warden manipulates covertexts in order topreclude the possibility of hidden communication. Bob and Alice haveto use very sophisticated embedding algorithm. Hidden information mustwithstand various recoding of covering medium, the use of error correctioncodes is recommended. Typical real-life application is watermarkingand ngerprinting.
Watermark is a small piece of embedded information which can proofcopyrighted material. Fingerprint is very similar, but is intended to trackthe concrete copy of copyrighted data.
A Secure Image Hiding Scheme with
一個具有認証能力的安全影像隱藏機制
來源:http://ethesys.lib.fcu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0705104-161910
作者:Shih-Cheng Chen
Image hiding aims to embed a secret image into a cover image to form a stego-image, transmitted over the public networks without revealing the secret image. To our best knowledge, the previous research of image hiding mainly focuses on privacy, good image quality, and high hiding capacity. However, there are two inevitable issues, not address in present image hiding schemes. Firstly, authentication, ascertaining the origin and integrity of the transmitted images, is an important issue for the transmitted images. Secondly, some parameters of image hiding are all shared by sender and receiver in advance so that the hidden image can be correctly extracted. Nevertheless, if a lot of information has to be shared/transmitted by a secure channel in advance, image hiding becomes impractical. In this thesis, a new secure image hiding scheme, in which the VQ technique is adopted to compress secret images before embedding, is proposed to convey several secret images. Other then satisfying the basic properties of image hiding such as privacy, good image quality, and high hiding capacity, the proposed scheme has other valuable advantages. Firstly, for transmitting codebook, not only secret images but also the corresponding codebook is embedded into the cover image. As a result, the codebook can be automatically extracted by the intended receiver for decompression in extracting process. Secondly, the proposed scheme highlights a future, image authentication of both the stego-image and secret images, often existing in image security mechanisms but seldom addressed in present image hiding schemes. Thirdly, for transmitting the parameters used in extraction process, digital signature is also applied to convey the corresponding parameters
2008_ICCCE_Stealth steganography in visual cryptography for half tone images
A novel approach for detection of cheating in visualcryptography based on steganography for hidingdigital signature of the secret image is proposed. Theproposed technique hides the verification bits of thesignature in the different shares of the participants.For hiding binary “0”, no flipping of the subpixel isdone in the block of the share, but change is done forhiding binary “1” by flipping a white (black) subpixelin one of the blocks of black (white) share The hiddensignature can be recovered in the presence of allshares and verified by comparing with thereconstructed digital signature in case of doubt.
來源:http://biotech.csie.mcu.edu.tw/
An Efficient Reversible Information Hiding Scheme Based on Interval Expansion
Authentication of secret information in image Steganography
TENCON 2008 - 2008, TENCON 2008. IEEE Region 10 Conference
Volume , Issue , 19-21 Nov. 2008 Page(s):1 - 6
Digital Object Identifier 10.1109/TENCON.2008.4766581
Summary:
In recent years, steganography and steganalysis are two important areas of research that involve a number of applications. These two areas of research are important especially when reliable and secure information exchange is required. Steganography is an art of embedding information in a cover image without causing statistically significant variations to the cover image. Steganalysis is the technology that attempts to defeat steganography by detecting the hidden information and extracting. In this paper we propose an image steganography that can verify the reliability of the information being transmitted to the receiver. The method can verify whether the attacker has tried to edit, delete or forge the secret information in the stego-image. The technique embeds the hidden information in the spatial domain of the cover image and uses two special AC coefficients of the discrete wavelet transform domain to verify the veracity (integrity) of the secret information from the stego image. The analysis shows that the BER and PSNR is improved in the case of DWT than DCT.
Generalized collage steganography on images
Dept. of Electr. & Comput. Eng., Univ. of Texas at San Antonio, San Antonio, TX;
Publication Date: 12-15 Oct. 2008
On page(s): 1043-1047
Location: Singapore,
ISSN: 1062-922X
ISBN: 978-1-4244-2383-5
INSPEC Accession Number: 10560351
Digital Object Identifier: 10.1109/ICSMC.2008.4811419
Current Version Published: 2009-04-07
Reliable Detection of LSB Steganography in Color and Grayscale Images
作者:Jessica Fridrich; Miroslav Goljan; RuiDu
Source
International Multimedia Conference archive
Proceedings of the 2001 workshop on Multimedia and security: new challenges table of contents
Ottawa, Ontario, Canada
SESSION: Steganographical approaches table of contents
Pages: 27 - 30
Year of Publication: 2001
ISBN:1-58113-393-6
Authors
Jessica Fridrich
Suny Binghamton
Miroslav Goljan
Suny Binghamton
Rui Du
Suny Binghamton
Sponsor
SIGMULTIMEDIA: ACM Special Interest Group on Multimedia
Publisher
ACM New York, NY, USA
連結頁面
2009年10月13日 星期二
Some Notes on Steganography
作者:Ron Crandall
日期:Friday, December 18, 1998
來源: google搜尋
An Effective Image Steganographic Scheme Based onWavelet Transformation and Pattern-Based Modification
出處:IEEE
Computer Networks and Mobile Computing, 2003. ICCNMC 2003. 2003 International Conference on Volume , Issue , 20-23 Oct. 2003 Page(s): 450 - 453
文章連結:點我
A novel steganographic algorithm using animations as cover
作者:Gopalakrishna Reddy Tadiparthia and Toshiyuki Sueyoshi
出處: ScienceDirect
Keywords: Information Hiding; Steganographic model; Encoding; Decoding; Animation
2009年10月12日 星期一
Paper:Steganography in MMS
標題:Steganography in MMS
來源:IEEE
作者:Shirali-Shahreza,M
大綱:
隨著時代的進步,手機使用率增加,手機電信業者開始增加許多額外的功能,如MMS(多媒體信息服務),這篇論文提出了一種新的隱藏方法,可以同時使用文字和圖片隱密的方法介紹有關(MMS)的相關隱藏技術。
Exploring steganography: Seeing the unseen
作者:NF Johnson, S Jajodia
出版日期: 1998
出處:IEEE
文章連結:http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.40.460&rep=rep1&type=pdf
2009年10月9日 星期五
A New Method for Real-Time Steganography
作者:Shirali-Shahreza, M.
Dept. of Comput. Sci., Sharif Univ. of Technol., Tehran;
出版日期: 16-20 2006
This paper appears in: Signal Processing, 2006 8th International Conference on
地點:北京
最新版本:2007-04-10
ISBN: 0-7803-9736-3
INSPEC Accession Number: 9475240
Digital Object Identifier: 10.1109/ICOSP.2006.345954
自己看完摘要的摘要:
作者所提出的方法是將即時信息藏在輸出的screens中,例如螢幕。
而作者在摘要提到這個方法就像是在討論image steganography和video steganography。
文章相關連結(IEEE的簡介)--->請按標題(謝謝)
Multibit Assignment Steganography in Palette Images
作者:Xinpeng Zhang Shuozhong Wang Zhenyu Zhou
Sch. of Commun. & Inf. Eng., Shanghai Univ., Shanghai;
出版日期: 2008
最新版本:2008-10-07
Digital Object Identifier: 10.1109/LSP.2008.2001117
ISSN: 1070-9908
INSPEC Accession Number: 10236526
此文章在 Signal Processing Letters, IEEE的553~556頁中出現。
This paper appears in: Signal Processing Letters, IEEE
連結:http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=4639588
內容大概是在說調色板圖像利用Multibit Assignment Steganography的技術,利用調色板上每一色群擁有的鄰近色利用來代表幾個秘密位元。
內容好像是這樣,我不太確定......