Evaluation of pixel-based steganography and stegodetection methods

被引:10
|
作者
Bailey, K
Curran, K
Condell, J
机构
[1] Inst Technol, Letterkennt, Donegal, Ireland
[2] Univ Ulster, Internet Technol Res Grp, Coleraine BT52 1SA, Londonderry, North Ireland
来源
IMAGING SCIENCE JOURNAL | 2004年 / 52卷 / 03期
关键词
steganography; steganalysis; stego-image;
D O I
10.1179/136821904225020249
中图分类号
TB8 [摄影技术];
学科分类号
0804 ;
摘要
Steganography is a process that involves hiding a message in an appropriate carrier, for example an image or an audio file. The carrier can then be sent to a receiver without anyone else knowing that it contains a hidden message. This is a process which can be used, for example, by civil rights organizations in repressive states to communicate their message to the outside world without their own government's being aware of it. Less virtuously, it can be used by terrorists to communicate with one another without other people's knowledge. In both cases, the objective is not to make it difficult to read the message as cryptography does, but to hide the existence of the message in the first place, possibly to protect the courier. The aim of this study was to investigate, implement and evaluate a number of common methods of pixel-based steganography. The strengths and weaknesses of the chosen methods were analysed. To provide a common frame of reference, all the steganography methods implemented and analysed worked with GIF images. Eight steganography methods were implemented. The methods were chosen for their different strengths in terms of resistance to different types of steganalysis or their ability to maximize the size of the message they could store. All the methods used were based on the manipulation of the least significant bits of pixel values or the rearrangement of colours to create least significant bit(s) or parity patterns, which correspond to the message being hidden.
引用
收藏
页码:131 / 150
页数:20
相关论文
共 50 条
  • [1] An Evaluation of Pixel-Based Methods for the Detection of Floating Objects on the Sea Surface
    Alexander Borghgraef
    Olivier Barnich
    Fabian Lapierre
    Marc Van Droogenbroeck
    Wilfried Philips
    Marc Acheroy
    [J]. EURASIP Journal on Advances in Signal Processing, 2010
  • [2] A novel approach to Steganography using pixel-based algorithm in image hiding
    Kazi, Jawwad A. R.
    Kiratkar, Gunjan N.
    Ghogale, Sonali S.
    Kazi, Atiya R.
    [J]. 2020 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI - 2020), 2020, : 35 - +
  • [3] An Evaluation of Pixel-Based Methods for the Detection of Floating Objects on the Sea Surface
    Borghgraef, Alexander
    Barnich, Olivier
    Lapierre, Fabian
    Van Droogenbroeck, Marc
    Philips, Wilfried
    Acheroy, Andmarc
    [J]. EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING, 2010,
  • [4] Interpolated Implicit Pixel-based Novel Hybrid Approach Towards Image Steganography
    Saini, Ravi
    Joshi, Kamaldeep
    Punyani, Khusboo
    Yadav, Rajkumar
    Nandal, Rainu
    Kumari, Deepika
    [J]. RECENT ADVANCES IN ELECTRICAL & ELECTRONIC ENGINEERING, 2023, 16 (08) : 851 - 871
  • [5] Evaluation of feature- and pixel-based methods for deflection measurements in temporary structure monitoring
    Feng Y.
    Dai F.
    Zhu H.-H.
    [J]. Journal of Civil Structural Health Monitoring, 2015, 5 (05) : 615 - 628
  • [6] Pixel-Based Skin Colour Detection Techniques Evaluation
    Mharib, Ahmed M.
    Marhaban, Mohammad Hamiruce
    Ramli, Abdul Rahman
    [J]. PERTANIKA JOURNAL OF SCIENCE AND TECHNOLOGY, 2007, 15 (02): : 131 - 137
  • [7] Evaluating pixel-based visualization
    Borgo, R.
    Proctor, K.
    Chen, M.
    Thornton, T. M.
    [J]. PERCEPTION, 2010, 39 : 17 - 17
  • [8] Pixel-based behavior learning
    Hugues, L
    Drogoul, A
    [J]. ECAI 2002: 15TH EUROPEAN CONFERENCE ON ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 2002, 77 : 731 - 735
  • [9] Content and Hierarchy in Pixel-Based Methods for Reverse Engineering Interface Structure
    Dixon, Morgan
    Leventhal, Daniel
    Fogarty, James
    [J]. 29TH ANNUAL CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS, 2011, : 969 - 978
  • [10] An evaluation of image based steganography methods
    Bailey K.
    Curran K.
    [J]. Multimedia Tools Appl, 2006, 1 (55-88): : 55 - 88