HOME JOURNALS CONTACT

Information Technology Journal

Year: 2003 | Volume: 2 | Issue: 2 | Page No.: 116-127
DOI: 10.3923/itj.2003.116.127
High Quality Steganography Model with Attacks Detection
Ahmed Al-Jaber and Ibrahim Aloqily

Abstract: Steganography is the art of hiding a message in a secret way that only the receiver of the cover media knows the existence of the message. This secret message must be unobserved by a human eyes, Studies have shown that Human Vision Systems (HVS) is unable to detect changes in uncorrelated areas of the digital media, due to the complexity of such areas, where it is easy to detect changes in correlated areas. Security and quality are two important issues of steganography. In this paper we will introduce an algorithm that uses the LSB and those inhomogeneous areas of the cover image to hide a message. In this algorithm error correction code is used to increase the probability of retrieving the message, as well as the receiver will be able to detect if there is any alterations in the cover Media, in this case the receiver Informs the sender about this alterations.

Fulltext PDF

How to cite this article
Ahmed Al-Jaber and Ibrahim Aloqily , 2003. High Quality Steganography Model with Attacks Detection. Information Technology Journal, 2: 116-127.

Keywords: information hiding, steganography, human vision sytem, error correction codes and least significat bit(lsb)

REFERENCES

  • Anderson, R.J. and F.A. Petitcolas, 1998. On the limits of steganography. IEEE J. Selected Areas Commun., 16: 474-481.
    CrossRef    Direct Link    


  • Bender, W., D. Gruhl, N. Morimoto and A. Lu, 1996. Techniques for data hiding. IBM Syst. J., 35: 313-336.
    CrossRef    Direct Link    


  • Chang-Hsing, L. and L. Yeuan-Kuen, 1999. An adaptive digital image watermarking technique for copyright protection. Proceedings of the IEEE Transactions on Consumer Electronics, Nov. 1999, Taiwan, pp: 1005-1015.


  • Chang, C.C., T.S. Chen and L.Z. Chung, 2002. A steganographic method based upon JPEG and quantization table modification. Inform. Sci., 141: 123-138.
    CrossRef    Direct Link    


  • Franz, E., A. Jerichow, S. Moller, A. Pfitzmann and I. Stierand, 1996. Computer based steganography: How it works and why therefore any restrictions on cryptography are nonsense at best. Proceedings of the 1st International Workshop on Information Hiding, LNCS. 1174, May 30-Jun. 01, Springer-Verlag, London, UK., pp: 7-21.


  • Gruhl, D. and W. Bender, 1998. Information hiding to foil the casual counterfeiter. Proceedings of the Workshop on Information Hiding, Apr. 14-17, Portland, Oregon, USA., pp: 1-15.


  • Simmons, G.J., 1998. The prisoners problem and subliminal channels. CRYPTO-83, pp: 51-67.


  • Simmons, G.J., 1998. The history of subliminal channels. IEEE J. Selected Areas Commun., 16: 452-462.


  • Van Schyndel, R.G., A.Z. Tirkel and C.F. Osborne, 1994. A digital watermark. IEEE Int. Conf. Image Process., 2: 86-90.


  • Wang, R.Z., C.F. Lin and J.C. Lin, 1998. Image Hiding by LSB substitution and genetic algorithm. Proceedings of International Symposium on Multimedia Information Processing. Chung-Li, Taiwan.


  • Wayner, P., 1993. Should Encryption Be Regulated. McGraw-Hill, New York, pp: 129-134


  • Lee, Y.K. and L.H. Chen, 2000. High capacity image steganographic model. IEEE Proc. Vision Image Signal Process., 147: 288-294.
    Direct Link    


  • Petitcolas, F.A.P., R.J. Anderson and M.G. Kuhn, 1999. Information hiding-a survey. Proc. IEEE, 87: 1062-1078.
    CrossRef    Direct Link    

  • © Science Alert. All Rights Reserved