Using image steganography for decryptor distribution

被引:0
|
作者
Morkel, T. [1 ]
Eloff, J. H. P. [1 ]
Olivier, M. S. [1 ]
机构
[1] Univ Pretoria, Dept Comp Sci, ICSA Res Grp, ZA-0002 Pretoria, South Africa
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
When communicating secret information there is more than one route to follow to ensure the confidentiality of the message being transmitted. Encryption might be an obvious choice; however there are limitations and disadvantages to using encryption. An alternative approach is steganography, which is a technology for hiding information in other information. Combining the two disciplines may provide better security but more overhead, since the receiver must now have knowledge not only of how the information was encrypted, but also of how it was hidden, in order to retrieve the message. This paper proposes a system where image steganography is combined with encryption by hiding not only a message inside an image, but also the means to extract and decrypt the message. An executable program is hidden inside the image that functions as a decryptor, enabling the receiver to be oblivious to the encryption algorithm used.
引用
收藏
页码:322 / +
页数:2
相关论文
共 50 条
  • [1] Using Facebook for Image Steganography
    Hiney, Jason
    Dakve, Tejas
    Szczypiorski, Krzysztof
    Gaj, Kris
    PROCEEDINGS 10TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY ARES 2015, 2015, : 442 - 447
  • [2] Vibrant color image steganography using channel differences and secret data distribution
    Parvez, Mohammad Tanvir
    Gutub, Adnan Abdul-Aziz
    KUWAIT JOURNAL OF SCIENCE & ENGINEERING, 2011, 38 (1B): : 127 - 142
  • [3] Using the Chaotic Map in Image Steganography
    Enayatifar, Rasul
    Mahmoudi, Fariborz
    Mirzaei, Khadije
    2009 INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT AND ENGINEERING, PROCEEDINGS, 2009, : 491 - +
  • [4] Steganography using image histogram specification
    Zhang Guicang
    Yang Jun
    Chen Wanghu
    Yang Xiaodong
    3RD INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND CONTROL TECHNOLOGIES, VOL 1, PROCEEDINGS, 2005, : 226 - 231
  • [5] Using the Chaotic Map in Image Steganography
    Enayatifar, Rasul
    Faridnia, Saed
    Sadeghi, Hossein
    PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING SYSTEMS, 2009, : 754 - +
  • [6] An image steganography using pixel characteristics
    Park, YR
    Kang, HH
    Shin, SU
    Kwon, KR
    COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 581 - 588
  • [7] Generative Image Steganography Based on Guidance Feature Distribution
    Sun, Youqiang
    Liu, Jianyi
    Zhang, Ru
    ACM Transactions on Multimedia Computing, Communications and Applications, 2024, 20 (11)
  • [8] A Payload Distribution Method for High Capacity Image Steganography
    Rathor, Sandeep
    Tripathi, S. P.
    Chakraborty, Soumendu
    Jalal, A. S.
    2013 4TH IEEE INTERNATIONAL CONFERENCE ON COMPUTER & COMMUNICATION TECHNOLOGY (ICCCT), 2013, : 43 - 47
  • [9] Enhancing Image Steganography using Hybrid Algorithms
    Bansal, Shivam
    Srivastava, Prakash
    PROCEEDINGS OF THE 2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION AND SIGNAL PROCESSING (ICCSP), 2018, : 1064 - 1068
  • [10] Image Steganography Using Deep Neural Networks
    Chinniyan, Kavitha
    Samiyappan, Thamil Vani
    Gopu, Aishvarya
    Ramasamy, Narmatha
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2022, 34 (03): : 1877 - 1891