A testbed for evaluating security and robustness of steganography techniques

被引:0
|
作者
Al Hawi, T [1 ]
Al Qutayri, M [1 ]
Barada, H [1 ]
机构
[1] Emirates Telecommun Corp, Etisalat Coll Engn, Sharjah, U Arab Emirates
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper proposes a testbed environment for evaluating the security and robustness of the major steganography techniques. The testbed environment allows the embedding of messages into still images, preprocessing to detect the hidden messages and a post processing stage to perform further analysis on an image. The environment was used to test the survivability of stego-images. This was achieved by using cover images and hidden messages of different formats and sizes. A large set of images were subjected to a wide range of steganography tools. The output of the pre-processing stage achieved a high success rate in indicating the presence of hidden messages in the tested images.
引用
收藏
页码:1583 / 1586
页数:4
相关论文
共 50 条
  • [31] Steganography based information security
    Ratan, R
    Madhavan, CEV
    IETE TECHNICAL REVIEW, 2002, 19 (04): : 213 - 219
  • [32] Robust JPEG steganography based on the robustness classifier
    Jimin Zhang
    Xianfeng Zhao
    Xiaolei He
    EURASIP Journal on Information Security, 2023
  • [33] Significance of steganography on data security
    Venkatraman, S
    Abraham, A
    Paprzycki, M
    ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 2, PROCEEDINGS, 2004, : 347 - 351
  • [34] Robust JPEG steganography based on the robustness classifier
    Zhang, Jimin
    Zhao, Xianfeng
    He, Xiaolei
    EURASIP JOURNAL ON INFORMATION SECURITY, 2023, 2023 (01)
  • [35] Building a SCADA Security Testbed
    Queiroz, Carlos
    Mahmood, Abdun
    Hu, Jiankun
    Tari, Zahir
    Yu, Xinghuo
    NSS: 2009 3RD INTERNATIONAL CONFERENCE ON NETWORK AND SYSTEM SECURITY, 2009, : 357 - 364
  • [36] A study of the security of a steganography method and security enhancement methods
    State Key Lab. of Integrated Service Networks, Xidian Univ., Xi'an 710071, China
    不详
    Xi'an Dianzi Keji Daxue Xuebao, 2006, 3 (448-452):
  • [37] Efficient security and capacity techniques for Arabic text steganography via engaging Unicode standard encoding
    Alanazi, Norah
    Khan, Esam
    Gutub, Adnan
    MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (01) : 1403 - 1431
  • [38] Efficient security and capacity techniques for Arabic text steganography via engaging Unicode standard encoding
    Norah Alanazi
    Esam Khan
    Adnan Gutub
    Multimedia Tools and Applications, 2021, 80 : 1403 - 1431
  • [39] An Introduction to Image Steganography Techniques
    Altaay, Alaa A. Jabbar
    bin Sahib, Shahrin
    Zamani, Mazdak
    2012 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE APPLICATIONS AND TECHNOLOGIES (ACSAT), 2012, : 122 - 126
  • [40] A Review on Text Steganography Techniques
    Majeed, Mohammed Abdul
    Sulaiman, Rossilawati
    Shukur, Zarina
    Hasan, Mohammad Kamrul
    MATHEMATICS, 2021, 9 (21)