顯示具有 論文 標籤的文章。 顯示所有文章
顯示具有 論文 標籤的文章。 顯示所有文章

2010年1月12日 星期二

An Evolution of Hindi Text Steganography

An Evolution of Hindi Text Steganography


Alla, K. Prasad, R.S.R.
Christu Jayanthi Jubilee Coll., Guntur
This paper appears in: Information Technology: New Generations, 2009. ITNG '09. Sixth International Conference on
Publication Date: 27-29 April 2009
On page(s): 1577 - 1578
Location: Las Vegas, NV
ISBN: 978-1-4244-3770-2
Digital Object Identifier: 10.1109/ITNG.2009.41
Current Version Published: 2009-06-10



Abstract

This paper presents a novel steganography scheme suitable for Hindi text. It can be classified under text steganography. Conveying information secretly and establishing a hidden relationship between the message and its counterpart has been of great interest since very long time ago. Methods of steganography are mostly applied on images, audio, video and text files. During the process characteristics of these methods are to change in the structure and features so as not to be identifiable by human eye. Text documents are the best examples for this. This paper presents a novel Hindi text steganography, which uses Hindi letters and its diacritics and numerical code. This method is not only useful to Hindi text but also to all other similar Indian languages.

2010年1月9日 星期六

Steganography: Past, Present, Future

Title : Steganography: Past, Present, Future
Sourse :
來源網站 : http://www.forensics.nl/steganography

James C. JudgeGSEC Version 1.2f

Paper 連結 : Steganography: Past, Present, Future(PDF)

Abstract :
    Steganography (a rough Greek translation of the term Steganography is secret writing) has beenused in various forms for 2500 years. It has found use in variously in military, diplomatic,personal and intellectual property applications. Briefly stated, steganography is the term appliedto any number of processes that will hide a message within an object, where the hidden messagewill not be apparent to an observer. This paper will explore steganography from its earliestinstances through potential future application.

2010年1月7日 星期四

theoretic model for steganography

Throughout history, people have sought secret means of protecting their property and their knowledge from being stolen. Watermarking and copyright marking, for instance, attempt to keep property secure from thieves. Cryptography and steganography aim to keep knowledge safe from spies.
In the spatial domain, we first present an efficient multi-level embedding procedure for 3D polygonal meshes. Our algorithm, which is the first technique to take advantage of the full vertex features of these meshes, achieves high capacity relying on three independent degrees of freedom. We deal with distortion through a new modified multi-level embedding procedure. Embedding that relies on the angle between triangle planes is not appropriate to a long and narrow triangle, because such embedding can cause larger distortion for a larger radius. To solve this, we embed messages based on the arc length, which efficiently avoids apparent distortion while it achieves high capacity. Based on this approach, we also propose a virtual multi-level embedding procedure to support point-sampled geometries. It produces a unique virtual triangle for each point and embeds messages by modifying the point based on virtual geometrical properties. Then, we propose an adaptive minimum-distortion estimation procedure to achieve higher capacity in each vertex by changing the vertex’s position with minimum distortion distance.
As we demonstrate in this dissertation, the proposed approaches, based on both the spatial and representation domains, can be combined to achieve higher capacity. In other words, we successfully combine both domains for steganography. Experimental results show significant improvements in terms of capacity, visual appearance, and performance with respect to the most recent, advanced techniques. These improvements will make this kind of application more widely available.Finally, all of our approaches are blind schemes, requiring no 3D cover model for message extraction, and they are secure, since retrieving the message without the key is virtually impossible. These algorithms are simple yet efficient and are robust against affine transformations. Our techniques are a feasible alternative to steganographic approaches for 3D models
. Our technique is adaptive, simple, efficient, and secure, and has proven to be feasible in steganography.In short, this dissertation presents the main issues related to the context of steganography for 3D models. We discuss steganography for HDR images, and we explore the main applications making use of secret messages and their need of reliable, high-capacity techniques. Among these techniques, we restrict our work to blind steganographic schemes with high capacity, adaptability, and no distortion. These techniques are simple, efficient, and generalizable. Moreover, they are secure in the cryptographic sense. Because research in this field is growing and diversifying, a great deal of additional work is needed. Development in the area of steganography will continue. The novel and original ideas for steganographic applications we offer in this dissertation can benefit many applications in cryptography and copyright marking, as well. We hope that our work will inspire more research in these areas.

2009年12月30日 星期三

On information hiding techniques for digital images

標題:On information hiding techniques for digital images


作者:Gareth Charles Brisbane


日期:2004


版權:University of wollongong


連結: http://ro.uow.edu.au/cgi/viewcontent.cgi?article=1370&context=theses

2009年12月22日 星期二

Separation and Information Hiding

標題:Separation and Information Hiding

作者:Queen Mary University of London的Peter W. O’Hearn
   Seoul National University的Hongseok Yang
   Carnegie Mellon University的John C. Reynolds


日期:January 14–16, 2004, Venice, Italy.

版權: 2004 ACM 1-58113-729-X/04/0001

連結:http://www.dcs.qmul.ac.uk/~ohearn/papers/separation-and-hiding.pdf

2009年11月12日 星期四

選擇論文題目

題目
1998
Cryptography And Steganography Of Video Information In Modern Communication

作者
Zenon Hrytskiv, Sviatoslav Voloshynovskiy and Yuriy Rytsar

2009年10月22日 星期四

Hide and Seek: An Introduction to Steganography

題目:Hide and Seek: An Introduction to Steganography
作者:Niels Provos 與 Peter Honeyman
摘要:

This article discusses existing steganographic systems and presents recent research in detecting them via statistical steganalysis. Other surveys focus on the general usage of information hiding and watermarking or else provide an overview of detection algorithms. Here, we present recent research and discuss the practical application of detection algorithms and the mechanisms for getting around them.
 

2009年10月21日 星期三

Vision Research Lab - Zero Divergence Secure Steganography

Steganography is the art and science of communicating in such a way that the very existence of communication is not revealed to a third party. In order to communicate without being detected, the data-hider must obey following two conditions.

1.Perceptual constraint. The perceptual distortion between the original and stego image should not be more than a certain maximum amount, D1 , for some perceptual distance measure.

2.Statistical constraint. The embedding process should not modify the statistics of the host signal more than a very small number, epsilon, for some statistical distance measure.

The objective in this project is to investigate steganographic schemes that can provide provable security by achieving zero Kullback-Leibler divergence between the cover and the stego signal distributions, while communicating at high rates.

An Overview of Steganography for the Computer Forensics Examiner

author:Gary C. Kessler
Associate Professor
Computer and Digital Forensics Program
Champlain College
Burlington, Vermont

Abstract

Steganography is the art of covered or hidden writing. The purpose of steganography is covert communication—to hide the existence of a message from a third party. This paper is intended as a high-level technical introduction to steganography for those unfamiliar with the field. It is directed at forensic computer examiners who need a practical understanding of steganography without delving into the mathematics, although references are provided to some of the ongoing research for the person who needs or wants additional detail. Although this paper provides a historical context for steganography, the emphasis is on digital applications, focusing on hiding information in online image or audio files. Examples of software tools that employ steganography to hide data inside of other files as well as software to detect such hidden files will also be presented.

2009年10月14日 星期三

A New Image Steganography Technique

Author: Mathkour, H. Al-Sadoon, B. Touir, A.
Comput. Sci. Dept., King Saud Univ., Riyadh
This paper appears in: Wireless Communications, Networking and Mobile Computing, 2008. WiCOM '08. 4th International Conference on
Publication Date: 12-14 Oct. 2008
On page(s): 1 - 4
Location: Dalian
ISBN: 978-1-4244-2107-7
Digital Object Identifier: 10.1109/WiCom.2008.2918
Current Version Published: 2008-11-18
Abstract:
Various image steganography techniques have been proposed. In this paper, we investigate diverse steganography techniques and tools. We state a set of criteria to analyze and evaluate the strengths and weaknesses of the presented techniques. We propose a more robust steganography technique that takes advantages of the strengths and avoids the limitations.
連結文章

New Steganography Technique for Palette Based Images

文章連結

Publication Date: 9-11 Aug. 2007
Page:335~340
來源: Second International Conference on Industrial and Information Systems
Author: S.G.K.D.N. Samaratunge

Abstract:
Steganography is the art and science of hidinginformation. The goal of steganography is to avoid drawingsuspicion to the transmission of a hidden message. Thesuccess of steganography depends on the secrecy of the covercarrier. Once the steganographic carrier is disclosed then thesecurity depends on the robustness of the algorithm and thecryptographic methods used. Therefore, to maintain secrecyeither we need to make the carrier more robust againststeganalysis or discover new and better carriers. This paperdiscusses a new steganography technique for palette basedimages. Secret message is encrypted using public keycryptography before hiding. The bits of encrypted messagewill be hidden inside the stretched palette of image.

A Study on Object Image Watermarking and Palette Image Steganography

論文名稱: A Study on Object Image Watermarking and Palette Image Steganography
物件影像浮水印與調色盤影像資料隱藏技術之研究


The current rapid development of information technologies makes provision of commercial multimedia services on Internet. However, in rerum natura, digital multimedia is easy to be copied, re-scaled, rotated, transformed, and modified using handy processing software without much effort. This fact has derived an urgent demand for reliable and secure copyright protection for digital multimedia. Watermarking is the technology used for copy control and media identification and tracing. Most proposed watermarking methods are designed for the protection of digital images. Theses methods embed a short message (a watermark) in the image without affecting the usability but that can be detected using dedicated analysis software.
Watermarking techniques have been widely discussed and developed in recent years. However, studies which focus on watermarking techniques those can resist geometrical attacks are still not quite mature. Geometrical attacks like rotation, scaling, and transforming will miss-position the location of watermark embedded. There are some previous works working on this problem for watermark re-synchronization. We use the geometrical features of object shape in a digital image to achieve the goal of watermark re-synchronization to obtain quite remarkable imperceptibility and robustness.

In this dissertation, we aim to design some information hiding techniques for protecting images and private messages of communication on the Internet. Four information hiding related schemes are proposed. They are (1) Geometric attack free self-synchronized object image watermarking schemes (2) Palette-based object image watermarking scheme (3) Palette-based image Steganography scheme, and (4) Hierarchic texture classification based on statistical steganography.
First of all, to achieve the goal of watermark re-synchronization and embed digital watermark into an object image, geometric features of an object image like the length of principal axes, eigenvectors, and orient of mass center are use for subdividing the object shape. Using those geometric features for shape subdividing makes re-synchronization of watermark detection possible. In our study, different shape subdivision methods, including self-similarity, parallel segmentation and recursively principal axes, are proposed for object watermark embedding. And the geometric attack resistance schemes for object images can be applied to different image formats, including raw and palette-based images. Unlike the true color images and gray level images, palette-based images have discrete color palette. To embed watermark into limited colors and hold the imperceptibleness and robustness is a challenging work. An algorithm for palette-based object image watermarking is proposed here. These proposed methods are easily implemented and can obtain comparable NC values to against outside geometrical attacks such as rotation, scaling and translation.
For the issue of steganography, an iterative method of palette-based image steganography scheme is proposed to improve the existed methods. Better quality of stego- images can be produced using the proposed method. Besides, we also proposed a hierarchic texture classification using statistical steganography technique to obtain robust texture features for texture classification. Experimental results show that the proposed methods can achieve high accuracy rate and also work well even the query textures are distorted by noise corruption or compressed.

Cryptography and Steganography of Video Information in Modern Communications

Source:
FACTA UNIVERSITATIS (NIS)
出處/年份:Series: Electronics and Energetics vol. 11, No.1 (1998)
Pages:115~125
作者:Zenon Hrytskiv, Sviatoslav Voloshynovskiy and Yuriy Rytsar

點我連結此篇文章

Modern Steganography

Introduction

In this paper, we will introduce what steganography is and what kindof applications can be expected. Steganography is an art and scienceof hidding information within other information. The word itself comesfrom Greek and means hidden writting. First complex book coveringsteganography was written by Johannes Trithemius in 1499. Thebook Steganographia itself was published later in 1606 and immediatelyplaced on the Index Librorum Prohibitorum.

In recent years cryptography become very popular science. As steganographyhas very close to cryptography and its applications, we can withadvantage highlight the main differences. Cryptography is about concealingthe content of the message. At the same time encrypted data packageis itself evidence of the existence of valuable information. Steganographygoes a step further and makes the ciphertext invisible to unauthorizedusers. Hereby we can dene steganography as cryptography withthe additional property that its output looks unobtrusively.

One can ask what is it good for. Well, image the common situationwhen you encrypt your important business data. Suddenly robbers captureand torture you into revealing cryptographics keys. As well policepower may be abused. They ask you to give them the private keys or youare highly suspicious of committing crime. Next, what if the police isbribed. Would not it be better, if you can plausibly deny the existence ofimportant data?

A famous example of steganography is Simmons' Prisoners' problem, see [1]. Bob and Alice are in a jail and wish to escape. Their cellsare far apart from each other and the only allowed communication issending messages via prison ofcer. If warden detects any sign of conspiracy,he will secure their cells even more. Bob and Alice are wellaware of these facts.

Happily, before they got arrested, they have agreed a stegosystem.Stegosystem describes the way the secret message is embedded into a covertext(seemingly innocent message). According to the standard terminologyof information hidding a covertext with hidden information iscalled stegotext.

Examples of historical stegosystems can be secret inks, wax tabletsor microdots used during WWII. In modern era these methods can invokesmile on face, but image their power, when they were not widely known.Nowadays methods still hold the same simplicity, just exploit advantagesof digital media and communications.

We can distinguish between stegosystems with passive warder andactive warder. Passive warder just monitors the communication channel.He can pass the covertexts throught several statistical tests, but do notmodify them. It is the same situation as when the network packets gothrought Intrusion Detect System. Applications from this eld are oftenrefered to as trafc security.

On the other side, active warden manipulates covertexts in order topreclude the possibility of hidden communication. Bob and Alice haveto use very sophisticated embedding algorithm. Hidden information mustwithstand various recoding of covering medium, the use of error correctioncodes is recommended. Typical real-life application is watermarkingand ngerprinting.

Watermark is a small piece of embedded information which can proofcopyrighted material. Fingerprint is very similar, but is intended to trackthe concrete copy of copyrighted data.

A Secure Image Hiding Scheme with

A Secure Image Hiding Scheme withAuthentication
一個具有認証能力的安全影像隱藏機制
來源:http://ethesys.lib.fcu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0705104-161910
作者:Shih-Cheng Chen
Image hiding aims to embed a secret image into a cover image to form a stego-image, transmitted over the public networks without revealing the secret image. To our best knowledge, the previous research of image hiding mainly focuses on privacy, good image quality, and high hiding capacity. However, there are two inevitable issues, not address in present image hiding schemes. Firstly, authentication, ascertaining the origin and integrity of the transmitted images, is an important issue for the transmitted images. Secondly, some parameters of image hiding are all shared by sender and receiver in advance so that the hidden image can be correctly extracted. Nevertheless, if a lot of information has to be shared/transmitted by a secure channel in advance, image hiding becomes impractical. In this thesis, a new secure image hiding scheme, in which the VQ technique is adopted to compress secret images before embedding, is proposed to convey several secret images. Other then satisfying the basic properties of image hiding such as privacy, good image quality, and high hiding capacity, the proposed scheme has other valuable advantages. Firstly, for transmitting codebook, not only secret images but also the corresponding codebook is embedded into the cover image. As a result, the codebook can be automatically extracted by the intended receiver for decompression in extracting process. Secondly, the proposed scheme highlights a future, image authentication of both the stego-image and secret images, often existing in image security mechanisms but seldom addressed in present image hiding schemes. Thirdly, for transmitting the parameters used in extraction process, digital signature is also applied to convey the corresponding parameters

2008_ICCCE_Stealth steganography in visual cryptography for half tone images

Abstract:
A novel approach for detection of cheating in visualcryptography based on steganography for hidingdigital signature of the secret image is proposed. Theproposed technique hides the verification bits of thesignature in the different shares of the participants.For hiding binary “0”, no flipping of the subpixel isdone in the block of the share, but change is done forhiding binary “1” by flipping a white (black) subpixelin one of the blocks of black (white) share The hiddensignature can be recovered in the presence of allshares and verified by comparing with thereconstructed digital signature in case of doubt.

來源:http://biotech.csie.mcu.edu.tw/

An Efficient Reversible Information Hiding Scheme Based on Interval Expansion

Abstract: Reversible information hiding technique not only can effectively embed secret message into a host image, but also can completely remove the concealed message to recover the original media. This technique has been widely used in medical and military areas. Because these two areas not allow any error and the reversible information hiding technique is suitable for the request. Its practicability and significant make the reversible information hiding technique to become an important research issue. This paper proposes an efficiency reversible hiding scheme based on interval expansion. The proposed scheme expands the interval between pixels to embed information in an image. The receiver can extract the concealed message and restore the original image from the stego image.
相關網址


Authentication of secret information in image Steganography

Authentication of secret information in image Steganography Babu, K.S.; Raja, K.B.; Kiran, K.K.; Manjula Devi, T.H.; Venugopal, K.R.; Patnaik, L.M.
TENCON 2008 - 2008, TENCON 2008. IEEE Region 10 Conference
Volume , Issue , 19-21 Nov. 2008 Page(s):1 - 6
Digital Object Identifier 10.1109/TENCON.2008.4766581




Summary:
In recent years, steganography and steganalysis are two important areas of research that involve a number of applications. These two areas of research are important especially when reliable and secure information exchange is required. Steganography is an art of embedding information in a cover image without causing statistically significant variations to the cover image. Steganalysis is the technology that attempts to defeat steganography by detecting the hidden information and extracting. In this paper we propose an image steganography that can verify the reliability of the information being transmitted to the receiver. The method can verify whether the attacker has tried to edit, delete or forge the secret information in the stego-image. The technique embeds the hidden information in the spatial domain of the cover image and uses two special AC coefficients of the discrete wavelet transform domain to verify the veracity (integrity) of the secret information from the stego image. The analysis shows that the BER and PSNR is improved in the case of DWT than DCT.

Generalized collage steganography on images

Mei-Ching Chen Agaian, S.S. Chen, C.L.P.
Dept. of Electr. & Comput. Eng., Univ. of Texas at San Antonio, San Antonio, TX;



Publication Date: 12-15 Oct. 2008

On page(s): 1043-1047

Location: Singapore,

ISSN: 1062-922X

ISBN: 978-1-4244-2383-5

INSPEC Accession Number: 10560351

Digital Object Identifier: 10.1109/ICSMC.2008.4811419

Current Version Published: 2009-04-07

Reliable Detection of LSB Steganography in Color and Grayscale Images

文章名稱:Reliable Detection of LSB Steganography in Color and Grayscale Images

作者:Jessica Fridrich; Miroslav Goljan; RuiDu


Source
International Multimedia Conference archive
Proceedings of the 2001 workshop on Multimedia and security: new challenges table of contents
Ottawa, Ontario, Canada
SESSION: Steganographical approaches table of contents
Pages: 27 - 30
Year of Publication: 2001
ISBN:1-58113-393-6
Authors
Jessica Fridrich
Suny Binghamton
Miroslav Goljan
Suny Binghamton
Rui Du
Suny Binghamton
Sponsor
SIGMULTIMEDIA: ACM Special Interest Group on Multimedia
Publisher
ACM New York, NY, USA

連結頁面