Subscribe Now Subscribe Today
Research Article

High Quality Steganography Model with Attacks Detection

Ahmed Al-Jaber and Ibrahim Aloqily
Facebook Twitter Digg Reddit Linkedin StumbleUpon E-mail

Steganography is the art of hiding a message in a secret way that only the receiver of the cover media knows the existence of the message. This secret message must be unobserved by a human eyes, Studies have shown that Human Vision Systems (HVS) is unable to detect changes in uncorrelated areas of the digital media, due to the complexity of such areas, where it is easy to detect changes in correlated areas. Security and quality are two important issues of steganography. In this paper we will introduce an algorithm that uses the LSB and those inhomogeneous areas of the cover image to hide a message. In this algorithm error correction code is used to increase the probability of retrieving the message, as well as the receiver will be able to detect if there is any alterations in the cover Media, in this case the receiver Informs the sender about this alterations.

Related Articles in ASCI
Similar Articles in this Journal
Search in Google Scholar
View Citation
Report Citation

  How to cite this article:

Ahmed Al-Jaber and Ibrahim Aloqily , 2003. High Quality Steganography Model with Attacks Detection. Information Technology Journal, 2: 116-127.

DOI: 10.3923/itj.2003.116.127


1:  Anderson, R.J. and F.A. Petitcolas, 1998. On the limits of steganography. IEEE J. Selected Areas Commun., 16: 474-481.
CrossRef  |  Direct Link  |  

2:  Bender, W., D. Gruhl, N. Morimoto and A. Lu, 1996. Techniques for data hiding. IBM Syst. J., 35: 313-336.
CrossRef  |  Direct Link  |  

3:  Chang-Hsing, L. and L. Yeuan-Kuen, 1999. An adaptive digital image watermarking technique for copyright protection. Proceedings of the IEEE Transactions on Consumer Electronics, Nov. 1999, Taiwan, pp: 1005-1015.

4:  Chang, C.C., T.S. Chen and L.Z. Chung, 2002. A steganographic method based upon JPEG and quantization table modification. Inform. Sci., 141: 123-138.
CrossRef  |  Direct Link  |  

5:  Franz, E., A. Jerichow, S. Moller, A. Pfitzmann and I. Stierand, 1996. Computer based steganography: How it works and why therefore any restrictions on cryptography are nonsense at best. Proceedings of the 1st International Workshop on Information Hiding, LNCS. 1174, May 30-Jun. 01, Springer-Verlag, London, UK., pp: 7-21.

6:  Gruhl, D. and W. Bender, 1998. Information hiding to foil the casual counterfeiter. Proceedings of the Workshop on Information Hiding, Apr. 14-17, Portland, Oregon, USA., pp: 1-15.

7:  Simmons, G.J., 1998. The prisoners problem and subliminal channels. CRYPTO-83, pp: 51-67.

8:  Simmons, G.J., 1998. The history of subliminal channels. IEEE J. Selected Areas Commun., 16: 452-462.

9:  Van Schyndel, R.G., A.Z. Tirkel and C.F. Osborne, 1994. A digital watermark. IEEE Int. Conf. Image Process., 2: 86-90.

10:  Wang, R.Z., C.F. Lin and J.C. Lin, 1998. Image Hiding by LSB substitution and genetic algorithm. Proceedings of International Symposium on Multimedia Information Processing. Chung-Li, Taiwan.

11:  Wayner, P., 1993. Should Encryption Be Regulated. McGraw-Hill, New York, pp: 129-134.

12:  Lee, Y.K. and L.H. Chen, 2000. High capacity image steganographic model. IEEE Proc. Vision Image Signal Process., 147: 288-294.
Direct Link  |  

13:  Petitcolas, F.A.P., R.J. Anderson and M.G. Kuhn, 1999. Information hiding-a survey. Proc. IEEE, 87: 1062-1078.
CrossRef  |  Direct Link  |  

©  2021 Science Alert. All Rights Reserved