Graphical Data Steganographic Protection Method Based on Bits Correspondence Scheme

Автор: Zhengbing Hu, Ivan Dychka, Yevgeniya Sulema, Yevhen Radchenko

Журнал: International Journal of Intelligent Systems and Applications(IJISA) @ijisa

Статья в выпуске: 8, 2017 года.

Бесплатный доступ

The proposed method of graphical data protection is a combined crypto-steganographic method. It is based on a bit values transformation according to both a certain Boolean function and a specific scheme of correspondence between MSB and LSB. The scheme of correspondence is considered as a secret key. The proposed method should be used for protection of large amounts of secret graphical data.

Multimedia Data Protection, Steganography

Короткий адрес: https://sciup.org/15010955

IDR: 15010955

Список литературы Graphical Data Steganographic Protection Method Based on Bits Correspondence Scheme

  • Internet and cloud services – statistics on the use by individuals, http://ec.europa.eu/eurostat/statistics-explained/index.php/Internet_and_ cloud_services_-_statistics_on_the_use_by_individuals.
  • T. Morkel, J.H.P. Eloff, M.S. Olivier, An Overview of Image Steganography, Proceedings of the ISSA 2005 New Knowledge Today Conference, 2005, Pretoria, South Africa.
  • P. S. L. M. Barreto, H. Y. Kim, and V. Rijmen. Toward a secure public-key blockwise fragile authentication watermarking. In ICIP 2001, pages 494–497, Thessaloniki, Greece, October 2001.
  • B. Chen and G. W. Wornell. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding. IEEE Trans. on Information Theory., 47:1423–1443, May 2001.
  • J. J. Eggers, R. Bäuml, and B. Girod. A communications approach to image steganography. In Proceedings of SPIE: Electronic Imaging 2002, Security and Watermarking of Multimedia Contents IV, volume 4675, pages 26–37, San Jose, CA, USA, January 2002.
  • P. Guillon, T. Furon, and P. Duhamel. Applied public-key steganography. In Proceedings of SPIE 2002, volume 4675, San Jose, CA, USA, January 2002.
  • A. Cheddad, J. Condell, K. Curran, P. Mc Kevitt, Digital Image Steganography: Survey and Analysis of Current Methods, in Signal Processing, 2010, Volume 90, Issue 3, pp. 727-752.
  • S. Bhattacharyya, I. Banerjee, G. Sanyal, A Survey of Steganography and Steganalysis Technique in Image, Text, Audio and Video as Cover Carrier, in Journal of Global Research in Computer Science, 2011, Volume 2, No. 4, pp. 1-16.
  • C. C. Chang, T. S. Chen, L. Z. Chung, A steganographic method based upon JPEG and quantization table modification, Information Sciences 141(1–2)(2002)123–138.
  • A. M. Fard, M. Akbarzadeh-T, F. Varasteh-A, A new genetic algorithm approach for secure JPEG steganography, in:Proceedings of IEEE International Conference on Engineering of Intelligent Systems, 22–23 April 2006, pp.1–6.
  • A .I. Hashad, A. S. Madani, A. E. M. A. Wahdan, A robust steganography technique using discrete cosine transforminsertion, in:Proceedings of IEEE / ITI Third International Conference on Information and Communications Technology, Enabling Technologies for the New Knowledge Society, 5–6 December 2005, pp.255–264.
  • S. K. Bandyopadhyay, I. K. Maitra, An Application of Palette Based Steganography, in International Journal of Computer Applications, Volume 6, No.4, 2010, pp. 24-27.
  • Danny Pascale, A Review of RGB Color Spaces ...from xyY to R'G'B', 2003, BabelColor, Canada.
  • N. A. Ibraheem, M. M. Hasan, R. Z. Khan, P. K. Mishra, Understanding Color Models: A Review, in ARPN Journal of Science and Technology, Vol. 2, No. 3, 2012, pp. 265-275.
  • Dychka, I. A.; Shyrochyn, S. S.; Sulema, Ye. S. Analysis of Parallel Computations Efficiency for User's Private Multimedia Data Protection in Clouds // Naukovi visti NTUU-KPI, 2016, Issue 1, p. 40-46.
  • Sulema E.S., Shyrochyn S.S., "Method of image steganography fragmentation and division stehodanyh private key", Scientific and Technical Collection "Legal, regulatory and metrological support of information security in Ukraine", 2012, Issue 1 (22), P. 64-68.
  • Sulema E.S., Shyrochyn S.S., "Image steganography method based on complementary image", Journal "Information Security". 2013, Issue 4, p. 345-353.
  • Sulema E.S., Shyrochyn S.S., "Steganographic method of protecting data in audio files from complementary image", Vestnik NTUU "KPI". Informatics, Management and Computer Science: Coll. Science. pr. 2014. Vol. 61, P. 85-92.
  • Hummert, K. "The PPP Triple-DES Encryption Protocol (3DESE)", 1998.
  • Yevgeniya Sulema, "Image Protection Method Based on Binary Operations", in Proceedings of the 23rd IEEE International Conference on Systems, Signals and Image Processing IWSSIP2016, Bratislava, Slovakia, 2016, pp. 295-298.
  • Sulema Yevgeniya, Radchenko Yevhen, Method of graphical data steganographic protection based on bits difference transformation // Proceedings of the 8th Scientific Conference for Students and Postgraduates "Applied mathematics and computing (PMK-2016), 2016, p. 254-258.
  • M. Kharrazi, H. T. Sencar, N. Memon, Performance study of common image steganography and steganalysis techniques, in Journal of Electronic Imaging, 2006, No. 15 (4), pp. 1-16.
Еще
Статья научная