A testbed for evaluating security and robustness of steganography techniques

被引:0
|
作者
Al Hawi, T [1 ]
Al Qutayri, M [1 ]
Barada, H [1 ]
机构
[1] Emirates Telecommun Corp, Etisalat Coll Engn, Sharjah, U Arab Emirates
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper proposes a testbed environment for evaluating the security and robustness of the major steganography techniques. The testbed environment allows the embedding of messages into still images, preprocessing to detect the hidden messages and a post processing stage to perform further analysis on an image. The environment was used to test the survivability of stego-images. This was achieved by using cover images and hidden messages of different formats and sizes. A large set of images were subjected to a wide range of steganography tools. The output of the pre-processing stage achieved a high success rate in indicating the presence of hidden messages in the tested images.
引用
收藏
页码:1583 / 1586
页数:4
相关论文
共 50 条
  • [1] A Review on Security Techniques in Image Steganography
    Ghoul, Sami
    Sulaiman, Rossilawati
    Shukur, Zarina
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (06) : 361 - 385
  • [2] An Approach to Improve the Robustness of Substitution Techniques of Audio Steganography
    Zamani, Mazdak
    Manaf, Azizah Bt Abdul
    Ahmad, Rabiah Bt
    Zeki, Akram M.
    [J]. 2009 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 2, 2009, : 5 - +
  • [3] Security analysis of DNA based steganography techniques
    Al-Harbi, Omnia Abdullah
    Alahmadi, Walaa Essa
    Aljahdali, Asia Othman
    [J]. SN APPLIED SCIENCES, 2020, 2 (02):
  • [4] Enhancing security of images by Steganography and Cryptography techniques
    Bukhari, Sadaf
    Arif, Muhammad Shoaib
    Anjum, M. R.
    Dilbar, Samia
    [J]. 2016 SIXTH INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING TECHNOLOGY (INTECH), 2016, : 531 - 534
  • [5] Security analysis of DNA based steganography techniques
    Omnia Abdullah Al-Harbi
    Walaa Essa Alahmadi
    Asia Othman Aljahdali
    [J]. SN Applied Sciences, 2020, 2
  • [6] Data Security Using Cryptography and Steganography Techniques
    Saleh, Marwa E.
    Aly, Abdelmgeid A.
    Omara, Fatma A.
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2016, 7 (06) : 390 - 397
  • [7] Evaluating Security of Executable Steganography for Digital Software Watermarking
    Mullins, J. Alex
    McDonald, J. Todd
    Mahoney, William R.
    Andel, Todd R.
    [J]. SOUTHEASTCON 2022, 2022, : 666 - 673
  • [8] Analysis of various data security techniques of steganography: A survey
    Dhawan, Sachin
    Gupta, Rashmi
    [J]. INFORMATION SECURITY JOURNAL, 2021, 30 (02): : 63 - 87
  • [9] Improved Security Based on Combined Encryption and Steganography Techniques
    Mocanu, Stefan
    Duluta, Andrei
    Merezeanu, Daniel
    Pietraru, Radu
    [J]. STUDIES IN INFORMATICS AND CONTROL, 2017, 26 (01): : 115 - 126
  • [10] Evaluating Image Steganography Techniques: Future Research Challenges
    Roy, Ratnakirti
    Changder, Suvamoy
    Sarkar, Anirban
    Debnath, Narayan C.
    [J]. 2013 INTERNATIONAL CONFERENCE ON COMPUTING, MANAGEMENT AND TELECOMMUNICATIONS (COMMANTEL), 2013, : 309 - 314