[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.5555/647597.731871guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

An Implementation of Key-Based Digital Signal Steganography

Published: 25 April 2001 Publication History

Abstract

A real-life requirement motivated this case study of secure covert communication. An independently researched process is described in detail with an emphasis on implementation issues regarding digital images. A scheme using stego keys to create pseudo-random sample sequences is developed. Issues relating to using digital signals for steganography are explored. The terms modified remainder and unmodified remainder are defined. Possible attacks are considered in detail from passive wardens and methods of defeating such attacks are suggested. Software implementing the new ideas is introduced, which has been successfully developed, deployed and used for several years without detection.

References

[1]
Ross J. Anderson and Fabien A. P. Petitcolas. On the Limits of Steganography , IEEE Journal of Selected Areas in Communications, 16(4):474-481, May 1998. Special Issue on Copyright & Privacy Protection.
[2]
Elke Franz, Anja Jerichow, Steffen Möller, Andreas Pfitzmann and Ingo Stierand. Computer Based Steganography: How it works and why therefore any restrictions on cryptography are nonsense, at best . Springer-Verlag Lecture Notes in Computer Science, Vol. 1174 (1996).
[3]
Rafael C. Gonzalez and Richard E. Woods. Digital Image Processing . Addison-Wesley, 1993.

Cited By

View all
  • (2024)Image Steganography Approaches and Their Detection Strategies: A SurveyACM Computing Surveys10.1145/369496557:2(1-40)Online publication date: 10-Oct-2024
  • (2024)Steganalysis of AI Models LSB AttacksIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.338377019(4767-4779)Online publication date: 1-Apr-2024
  • (2023)Robust steganography without embedding based on secure container synthesis and iterative message recoveryProceedings of the Thirty-Second International Joint Conference on Artificial Intelligence10.24963/ijcai.2023/538(4838-4846)Online publication date: 19-Aug-2023
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
IHW '01: Proceedings of the 4th International Workshop on Information Hiding
April 2001
414 pages
ISBN:3540427333

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 25 April 2001

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 05 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Image Steganography Approaches and Their Detection Strategies: A SurveyACM Computing Surveys10.1145/369496557:2(1-40)Online publication date: 10-Oct-2024
  • (2024)Steganalysis of AI Models LSB AttacksIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.338377019(4767-4779)Online publication date: 1-Apr-2024
  • (2023)Robust steganography without embedding based on secure container synthesis and iterative message recoveryProceedings of the Thirty-Second International Joint Conference on Artificial Intelligence10.24963/ijcai.2023/538(4838-4846)Online publication date: 19-Aug-2023
  • (2019)Detecting and Distinguishing Adaptive and Non-Adaptive Steganography by Image SegmentationInternational Journal of Digital Crime and Forensics10.4018/IJDCF.201901010511:1(62-77)Online publication date: 1-Jan-2019
  • (2019)Detection of Classifier Inconsistencies in Image SteganalysisProceedings of the ACM Workshop on Information Hiding and Multimedia Security10.1145/3335203.3335738(222-229)Online publication date: 2-Jul-2019
  • (2019)Deep neural networks for efficient steganographic payload locationJournal of Real-Time Image Processing10.1007/s11554-019-00849-y16:3(635-647)Online publication date: 1-Jun-2019
  • (2019)Improving embedding efficiency for digital steganography by exploiting similarities between secret and cover imagesMultimedia Tools and Applications10.1007/s11042-019-7166-778:13(17799-17823)Online publication date: 1-Jul-2019
  • (2019)Undetectable least significant bit replacement steganographyMultimedia Tools and Applications10.1007/s11042-018-6541-078:8(10565-10582)Online publication date: 1-Apr-2019
  • (2019)Study on the interaction between the cover source mismatch and texture complexity in steganalysisMultimedia Tools and Applications10.1007/s11042-018-6497-078:6(7643-7666)Online publication date: 1-Mar-2019
  • (2018)Directional PVO for reversible data hiding scheme with image interpolationMultimedia Tools and Applications10.5555/3288443.328848077:23(31281-31311)Online publication date: 1-Dec-2018
  • Show More Cited By

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media