Concepto de aristas múltiples empleado para esteganografía de imagen

Autores/as

  • Rasber Dh. Rashid Software Engineering Department, Faculty of Engineering, Koya University, Iraq
  • Ladeh S. Abdulrahman Software Engineering Department, Faculty of Engineering, Koya University, Iraq
  • Taban F. Majeed Software Engineering Department, Faculty of Engineering, Koya University, Iraq

DOI:

https://doi.org/10.15649/2346075X.691

Palabras clave:

Steganography, Edge, LSB.

Resumen

Digital Steganography means hiding sensitive data inside a cover object in
a way that is invisible to un-authorized persons. Many proposed steganography techniques in spatial domain may achieve high invisibility requirement but sacrifice the good robustness against attacks. In some cases, we
need to take in account not just the invisibility but also we need to think
about other requirement which is the robustness of recovering the embedded secrete messages. In this paper we propose a new steganoraphic
scheme that aims to achieve the robustness even the stego image attacked
by steganalyzers. Furthermore, we proposed a scheme which is more robust against JPEG compression attack compared with other traditional
steganography schemes.

Biografía del autor/a

Rasber Dh. Rashid, Software Engineering Department, Faculty of Engineering, Koya University, Iraq

Software Engineering Department, Faculty of Engineering, Koya University, Iraq

Ladeh S. Abdulrahman, Software Engineering Department, Faculty of Engineering, Koya University, Iraq

Software Engineering Department, Faculty of Engineering, Koya University, Iraq

Taban F. Majeed, Software Engineering Department, Faculty of Engineering, Koya University, Iraq

Software Engineering Department, Faculty of Engineering, Koya University, Iraq

Referencias

Agrawal N, Savvides M. Biometric data hiding: A 3 factor authentication approach to verify identity with a single image using steganography, encryption and matching. In: 2009 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops; 2009 Jun 20-25; Miami, FL, USA. IEEE; 2009. p. 85-92. Available from: https://ieeexplore.ieee.org/document/5204308/ https://doi.org/10.1109/CVPR.2009.5204308

Fridrich J, Long M. Steganalysis of LSB encoding in color images. In: 2000 IEEE International Conference on Multimedia and Expo ICME2000 Proceedings Latest Advances in the Fast Changing World of Multimedia (Cat No00TH8532);2000 Jul 30 - Aug 2; New York, NY, USA. IEEE; 2000. p. 1279-82. Available from: http://ieeexplore.ieee.org/document/871000/

Fridrich J, Goljan M, Du R. Reliable detection of LSB steganography in color and grayscale images. In: Proceedings of the 2001 workshop on Multimedia and security new challenges - MM&Sec '01 [Internet]; 2001 Oct 5; Ottawa, Ontario, Canada; New York, New York, USA: ACM Press; 2001. p. 27. Available from: http://portal.acm.org/citation.cfm?doid=1232454.1232466 https://doi.org/10.1145/1232454.1232466

Rashid RD, Sellahewa H, Jassim SA. Biometric feature embedding using robust steganography technique. In: Proceedings of SPIE - The International Society for Optical Engineering; Baltimore/Maryland/USA; 2013. https://doi.org/10.1117/12.2018910

Xu J, Sung AH, Shi P, Liu Q. JPEG compression immune steganography using wavelet transform. In: International Conference on Information Technology: Coding and Computing, 2004 Proceedings ITCC 2004; 2004 Apr 5-7; Las Vegas, NV, USA, USA;2004. p. 704-708 Vol.2. Available from: http://ieeexplore.ieee.org/document/1286737/ https://doi.org/10.1109/ITCC.2004.1286737

Rashid RD, Asaad A, Jassim S. Topological data analysis as image steganalysis technique. In: Proceedings of SPIE - The International Society for Optical Engineering; 2018 Apr 15-19; Orlando, Florida, United States; 2018.

Johnson NF, Jajodia S. Exploring steganography: Seeing the unseen. Computer (Long Beach Calif) [Internet]. 1998;31(2):26-34. Available from: http://ieeexplore.ieee.org/document/4655281/ https://doi.org/10.1109/MC.1998.4655281

Chan C-K, Cheng LM. Hiding data in images by simple LSB substitution. Pattern Recognition. 2004;37(3):459-474. Available from: https://www.sciencedirect.com/science/article/abs/pii/S003132030300284X https://doi.org/10.1016/j.patcog.2003.08.007

Morkel T, Eloff J, Olivier M. An overview of image steganography [Internet]. Available from: https://pdfs.semanticscholar.org/bb26/1e7f02f8597b37a2f71e55c2e2c21aa7575f.pdf

Rashid RD, Jassim SA, Sellahewa H. Covert exchange of face biometric data using steganography. In: 2013 5th Computer Science and Electronic Engineering Conference (CEEC);2013 Sep 17-18; Colchester, UK;2013. IEEE; p. 134-9. Available from: http://ieeexplore.ieee.org/document/6659460/ https://doi.org/10.1109/CEEC.2013.6659460

Hempstalk K. Hiding Behind Corners: Using Edges in Images for Better Steganography. Available from: https://www.researchgate.net/publication/241605558

Bailey K, Curran K. An evaluation of image based steganography methods. Multimed Tools Applications. 2006;30(1):55-88. Available from: https://doi.org/10.1007/s11042-006-0008-4

Chen W-J, Chang C-C, Le THN. High payload steganography mechanism using hybrid edge detector. Expert Syst Appl, 2010;37(4):3292-301. Available from: https://doi.org/10.1016/j.eswa.2009.09.050

Singh KM, Singh LS, Singh AB, Devi KS. Hiding Secret Message in Edges of the Image. In: 2007 International Conference on Information and Communication Technology;2007 Mar 7-9; Dhaka, Bangladesh; IEEE;2007. p. 238-41. https://doi.org/10.1109/ICICT.2007.375384

Rashid R. Robust Steganographic Techniques for Secure Biometric-based Remote Authentication, 2016. Available from: https://www.researchgate.net/publication/295549501

Yang C-H, Weng C-Y, Wang S-J, Sun H-M. Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems. IEEE Trans Inf Forensics Secur. 2008;3(3):488-97. Available from: http://ieeexplore.ieee.org/document/4598830/. https://doi.org/10.1109/TIFS.2008.926097

H-C, Wu N-I, Tsai C-S, Hwang M-S. Image steganographic scheme based on pixel-value differencing and LSB replacement methods. IEE Proceedings - Vision, Image and Signal Processing; 2007;152(5): 611-615. https://doi.org/10.1049/ip-vis:20059022

Unnikrishnan R. Analysis of Modern Steganographic Techniques. 2011. Available from: http://www.bvicam.ac.in/news/INDIACom 2011/9.pdf

Revista Innovaciencia Facultad de Ciencias Exactas, Físicas y Naturales

Descargas

Publicado

2019-10-25

Cómo citar

Rashid, R. D. ., Abdulrahman, L. S. ., & Majeed, T. F. (2019). Concepto de aristas múltiples empleado para esteganografía de imagen. Innovaciencia, 7(1), 1–12. https://doi.org/10.15649/2346075X.691

Número

Sección

Artículo de investigación científica y tecnológica

Altmetrics

Descargas

Los datos de descargas todavía no están disponibles.