Using image steganography for decryptor distribution

被引:0
|
作者
Morkel, T. [1 ]
Eloff, J. H. P. [1 ]
Olivier, M. S. [1 ]
机构
[1] Univ Pretoria, Dept Comp Sci, ICSA Res Grp, ZA-0002 Pretoria, South Africa
来源
ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2006: OTM 2006 WORKSHOPS, PT 1, PROCEEDINGS | 2006年 / 4277卷
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
When communicating secret information there is more than one route to follow to ensure the confidentiality of the message being transmitted. Encryption might be an obvious choice; however there are limitations and disadvantages to using encryption. An alternative approach is steganography, which is a technology for hiding information in other information. Combining the two disciplines may provide better security but more overhead, since the receiver must now have knowledge not only of how the information was encrypted, but also of how it was hidden, in order to retrieve the message. This paper proposes a system where image steganography is combined with encryption by hiding not only a message inside an image, but also the means to extract and decrypt the message. An executable program is hidden inside the image that functions as a decryptor, enabling the receiver to be oblivious to the encryption algorithm used.
引用
收藏
页码:322 / +
页数:2
相关论文
共 50 条
  • [21] Image steganography using zerotrees of DCT coefficients
    Sun, Ziwen
    Ji, Zhicheng
    Zhou, Zhiping
    DYNAMICS OF CONTINUOUS DISCRETE AND IMPULSIVE SYSTEMS-SERIES B-APPLICATIONS & ALGORITHMS, 2007, 14 : 1622 - 1626
  • [22] Increasing image compression rate using steganography
    Jafari, Reza
    Ziou, Djemel
    Rashidi, Mohammad Mehdi
    EXPERT SYSTEMS WITH APPLICATIONS, 2013, 40 (17) : 6918 - 6927
  • [23] Cover Selection for Steganography Using Image Similarity
    Wang, Zichi
    Feng, Guorui
    Shen, Liquan
    Zhang, Xinpeng
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (03) : 2328 - 2340
  • [24] Image steganography using texture features and GANs
    Huang, Jinjing
    Cheng, Shaoyin
    Lou, Songhao
    Jiang, Fan
    2019 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2019,
  • [25] A New Steganography Method Using Image Layers
    Kurtuldu, Oemer
    Arica, Nafiz
    23RD INTERNATIONAL SYMPOSIUM ON COMPUTER AND INFORMATION SCIENCES, 2008, : 203 - 206
  • [26] Digital Image Steganography using Dithering Technique
    Biswas, D.
    Biswas, S.
    Majumder, A.
    Sarkar, D.
    Sinha, D.
    Chowdhury, A.
    Das, S. K.
    2ND INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION, CONTROL AND INFORMATION TECHNOLOGY (C3IT-2012), 2012, 4 : 251 - 255
  • [27] Enhancing image steganography via adversarial optimization of the stego distribution
    Zha, Hongyue
    Zhang, Weiming
    Yu, Nenghai
    Fan, Zexin
    SIGNAL PROCESSING, 2023, 212
  • [28] Steganography and Classification of Image Steganography Techniques
    Kaur, Sumeet
    Bansal, Savina
    Bansal, R. K.
    2014 INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2014, : 870 - 875
  • [29] Coverless image steganography using partial-duplicate image retrieval
    Zhili Zhou
    Yan Mu
    Q. M. Jonathan Wu
    Soft Computing, 2019, 23 : 4927 - 4938
  • [30] Coverless image steganography using partial-duplicate image retrieval
    Zhou, Zhili
    Mu, Yan
    Wu, Q. M. Jonathan
    SOFT COMPUTING, 2019, 23 (13) : 4927 - 4938