Concepto de aristas múltiples empleado para esteganografía de imagen
DOI:
https://doi.org/10.15649/2346075X.691Palabras clave:
Steganography, Edge, LSB.Resumen
Digital Steganography means hiding sensitive data inside a cover object in
a way that is invisible to un-authorized persons. Many proposed steganography techniques in spatial domain may achieve high invisibility requirement but sacrifice the good robustness against attacks. In some cases, we
need to take in account not just the invisibility but also we need to think
about other requirement which is the robustness of recovering the embedded secrete messages. In this paper we propose a new steganoraphic
scheme that aims to achieve the robustness even the stego image attacked
by steganalyzers. Furthermore, we proposed a scheme which is more robust against JPEG compression attack compared with other traditional
steganography schemes.
Referencias
Agrawal N, Savvides M. Biometric data hiding: A 3 factor authentication approach to verify identity with a single image using steganography, encryption and matching. In: 2009 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops; 2009 Jun 20-25; Miami, FL, USA. IEEE; 2009. p. 85-92. Available from: https://ieeexplore.ieee.org/document/5204308/ https://doi.org/10.1109/CVPR.2009.5204308
Fridrich J, Long M. Steganalysis of LSB encoding in color images. In: 2000 IEEE International Conference on Multimedia and Expo ICME2000 Proceedings Latest Advances in the Fast Changing World of Multimedia (Cat No00TH8532);2000 Jul 30 - Aug 2; New York, NY, USA. IEEE; 2000. p. 1279-82. Available from: http://ieeexplore.ieee.org/document/871000/
Fridrich J, Goljan M, Du R. Reliable detection of LSB steganography in color and grayscale images. In: Proceedings of the 2001 workshop on Multimedia and security new challenges - MM&Sec '01 [Internet]; 2001 Oct 5; Ottawa, Ontario, Canada; New York, New York, USA: ACM Press; 2001. p. 27. Available from: http://portal.acm.org/citation.cfm?doid=1232454.1232466 https://doi.org/10.1145/1232454.1232466
Rashid RD, Sellahewa H, Jassim SA. Biometric feature embedding using robust steganography technique. In: Proceedings of SPIE - The International Society for Optical Engineering; Baltimore/Maryland/USA; 2013. https://doi.org/10.1117/12.2018910
Xu J, Sung AH, Shi P, Liu Q. JPEG compression immune steganography using wavelet transform. In: International Conference on Information Technology: Coding and Computing, 2004 Proceedings ITCC 2004; 2004 Apr 5-7; Las Vegas, NV, USA, USA;2004. p. 704-708 Vol.2. Available from: http://ieeexplore.ieee.org/document/1286737/ https://doi.org/10.1109/ITCC.2004.1286737
Rashid RD, Asaad A, Jassim S. Topological data analysis as image steganalysis technique. In: Proceedings of SPIE - The International Society for Optical Engineering; 2018 Apr 15-19; Orlando, Florida, United States; 2018.
Johnson NF, Jajodia S. Exploring steganography: Seeing the unseen. Computer (Long Beach Calif) [Internet]. 1998;31(2):26-34. Available from: http://ieeexplore.ieee.org/document/4655281/ https://doi.org/10.1109/MC.1998.4655281
Chan C-K, Cheng LM. Hiding data in images by simple LSB substitution. Pattern Recognition. 2004;37(3):459-474. Available from: https://www.sciencedirect.com/science/article/abs/pii/S003132030300284X https://doi.org/10.1016/j.patcog.2003.08.007
Morkel T, Eloff J, Olivier M. An overview of image steganography [Internet]. Available from: https://pdfs.semanticscholar.org/bb26/1e7f02f8597b37a2f71e55c2e2c21aa7575f.pdf
Rashid RD, Jassim SA, Sellahewa H. Covert exchange of face biometric data using steganography. In: 2013 5th Computer Science and Electronic Engineering Conference (CEEC);2013 Sep 17-18; Colchester, UK;2013. IEEE; p. 134-9. Available from: http://ieeexplore.ieee.org/document/6659460/ https://doi.org/10.1109/CEEC.2013.6659460
Hempstalk K. Hiding Behind Corners: Using Edges in Images for Better Steganography. Available from: https://www.researchgate.net/publication/241605558
Bailey K, Curran K. An evaluation of image based steganography methods. Multimed Tools Applications. 2006;30(1):55-88. Available from: https://doi.org/10.1007/s11042-006-0008-4
Chen W-J, Chang C-C, Le THN. High payload steganography mechanism using hybrid edge detector. Expert Syst Appl, 2010;37(4):3292-301. Available from: https://doi.org/10.1016/j.eswa.2009.09.050
Singh KM, Singh LS, Singh AB, Devi KS. Hiding Secret Message in Edges of the Image. In: 2007 International Conference on Information and Communication Technology;2007 Mar 7-9; Dhaka, Bangladesh; IEEE;2007. p. 238-41. https://doi.org/10.1109/ICICT.2007.375384
Rashid R. Robust Steganographic Techniques for Secure Biometric-based Remote Authentication, 2016. Available from: https://www.researchgate.net/publication/295549501
Yang C-H, Weng C-Y, Wang S-J, Sun H-M. Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems. IEEE Trans Inf Forensics Secur. 2008;3(3):488-97. Available from: http://ieeexplore.ieee.org/document/4598830/. https://doi.org/10.1109/TIFS.2008.926097
H-C, Wu N-I, Tsai C-S, Hwang M-S. Image steganographic scheme based on pixel-value differencing and LSB replacement methods. IEE Proceedings - Vision, Image and Signal Processing; 2007;152(5): 611-615. https://doi.org/10.1049/ip-vis:20059022
Unnikrishnan R. Analysis of Modern Steganographic Techniques. 2011. Available from: http://www.bvicam.ac.in/news/INDIACom 2011/9.pdf
Descargas
Publicado
Cómo citar
Número
Sección
Altmetrics
Descargas
Licencia
Todos los artículos publicados en esta revista científica están protegidos por los derechos de autor. Los autores retienen los derechos de autor y conceden a la revista el derecho de primera publicación con el trabajo simultáneamente licenciado bajo una Licencia Creative Commons Atribución-NoComercial 4.0 Internacional (CC BY-NC 4.0) que permite compartir el trabajo con reconocimiento de autoría y sin fines comerciales.
Los lectores pueden copiar y distribuir el material de este número de la revista para fines no comerciales en cualquier medio, siempre que se cite el trabajo original y se den crédito a los autores y a la revista.
Cualquier uso comercial del material de esta revista está estrictamente prohibido sin el permiso por escrito del titular de los derechos de autor.
Para obtener más información sobre los derechos de autor de la revista y las políticas de acceso abierto, por favor visite nuestro sitio web.