Blind consistency based steganography for information hiding in digital media

被引:1
|
作者
Qi, HR [1 ]
Snyder, WE [1 ]
Sander, WA [1 ]
机构
[1] Univ Tennessee, ECE Dept, Knoxville, TN 37996 USA
关键词
D O I
10.1109/ICME.2002.1035849
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We propose a new approach to steganography for information hiding in digital media. We refer to it as blind consistency-based steganography (BCBS). Our main concerns in designing BCBS is high imperceptibility, high security level, and large capacity. Steganography differs from digital watermarking because both the information and the very existence of the information are hidden. Even though the discussion focuses on digital images, BCBS can be applied to any digital media. While existing steganographic approaches all have different advantages for specific applications, they also suffer a similar problem: such systems are unable to handle subterfuge attacks, i.e., they cannot deal with the opponents who not only detect a message, but also render it useless, or even worse, modify it to the opponent's favor. The breakthrough of BCBS is that it not only decodes the message exactly, it also detects if the message has been tampered without using any extra error correction. The detection is integrated into the process of decoding. Another advantage of BCBS is the "blindness" of the decoding process, meaning the decoding can be operated without access to the cover image. The encoding and decoding process are detailed in the paper, along with the analysis on imperceptibility, security, and capacity. Experimental results are provided as well.
引用
收藏
页码:585 / 588
页数:4
相关论文
共 50 条
  • [31] Perfectly secure steganography: Hiding information in the quantum noise of a photograph
    Sanguinetti, Bruno
    Traverso, Giulia
    Lavoie, Jonathan
    Martin, Anthony
    Zbinden, Hugo
    PHYSICAL REVIEW A, 2016, 93 (01)
  • [32] WhiteSteg: A new scheme in information hiding using text steganography
    Faculty of Computer Science and Information Technology, University of Malaya, 50603 Kuala Lumpur, Malaysia
    WSEAS Trans. Comput., 2008, 6 (735-745):
  • [33] Quantifying the impact of adversarial attacks on information hiding security with steganography
    Mohammad Ubaidullah Bokhari
    Basil Gulfam
    undefined Hanafi
    International Journal of Information Technology, 2025, 17 (1) : 409 - 422
  • [34] Steganography in QR Codes-Information Hiding with Suboptimal Segmentation
    Koptyra, Katarzyna
    Ogiela, Marek R.
    ELECTRONICS, 2024, 13 (13)
  • [35] A Blind High-Capacity Wavelet-Based Steganography Technique for Hiding Images into other Images
    Hamad, Safwat
    Khalifa, Amal
    Elhadad, Ahmed
    ADVANCES IN ELECTRICAL AND COMPUTER ENGINEERING, 2014, 14 (02) : 35 - 42
  • [36] Research on Robust Digital Watermarking Based on Reversible Information Hiding
    Gao, Zhijing
    Qiu, Weilin
    Wenqi, Ren
    Xiao, Yan
    INTERNATIONAL JOURNAL OF IMAGE AND GRAPHICS, 2023,
  • [38] STEGANOGRAPHY ALGORITHM FOR INFORMATION HIDING BASED ON SPATIAL DEFORMATION OF FULL-COLOR IMAGE FRAGMENTS
    Dryuchenko, M. A.
    Sirota, A. A.
    COMPUTER OPTICS, 2014, 38 (04) : 833 - 842
  • [39] Data Hiding With Deep Learning: A Survey Unifying Digital Watermarking and Steganography
    Wang, Zihan
    Byrnes, Olivia
    Wang, Hu
    Sun, Ruoxi
    Ma, Congbo
    Chen, Huaming
    Wu, Qi
    Xue, Minhui
    IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2023, 10 (06) : 2985 - 2999
  • [40] Image Steganography : Hiding Short Audio Messages within Digital Images
    Khalil, M. I.
    JOURNAL OF COMPUTER SCIENCE & TECHNOLOGY, 2011, 11 (02): : 68 - 73