Ahmed Al-Jaber
Department of Computer Science, King Abdullah II School for Information Technology, University of Jordan, Amman-Jordan
Ibrahim Aloqily
Department of Computer Science, King Abdullah II School for Information Technology, University of Jordan, Amman-Jordan
ABSTRACT
Steganography is the art of hiding a message in a secret way that only the receiver of the cover media knows the existence of the message. This secret message must be unobserved by a human eyes, Studies have shown that Human Vision Systems (HVS) is unable to detect changes in uncorrelated areas of the digital media, due to the complexity of such areas, where it is easy to detect changes in correlated areas. Security and quality are two important issues of steganography. In this paper we will introduce an algorithm that uses the LSB and those inhomogeneous areas of the cover image to hide a message. In this algorithm error correction code is used to increase the probability of retrieving the message, as well as the receiver will be able to detect if there is any alterations in the cover Media, in this case the receiver Informs the sender about this alterations.
PDF References Citation
How to cite this article
Ahmed Al-Jaber and Ibrahim Aloqily, 2003. High Quality Steganography Model with Attacks Detection. Information Technology Journal, 2: 116-127.
DOI: 10.3923/itj.2003.116.127
URL: https://scialert.net/abstract/?doi=itj.2003.116.127
DOI: 10.3923/itj.2003.116.127
URL: https://scialert.net/abstract/?doi=itj.2003.116.127
REFERENCES
- Anderson, R.J. and F.A. Petitcolas, 1998. On the limits of steganography. IEEE J. Selected Areas Commun., 16: 474-481.
CrossRefDirect Link - Bender, W., D. Gruhl, N. Morimoto and A. Lu, 1996. Techniques for data hiding. IBM Syst. J., 35: 313-336.
CrossRefDirect Link - Chang-Hsing, L. and L. Yeuan-Kuen, 1999. An adaptive digital image watermarking technique for copyright protection. Proceedings of the IEEE Transactions on Consumer Electronics, Nov. 1999, Taiwan, pp: 1005-1015.
CrossRef - Chang, C.C., T.S. Chen and L.Z. Chung, 2002. A steganographic method based upon JPEG and quantization table modification. Inform. Sci., 141: 123-138.
CrossRefDirect Link - Franz, E., A. Jerichow, S. Moller, A. Pfitzmann and I. Stierand, 1996. Computer based steganography: How it works and why therefore any restrictions on cryptography are nonsense at best. Proceedings of the 1st International Workshop on Information Hiding, LNCS. 1174, May 30-Jun. 01, Springer-Verlag, London, UK., pp: 7-21.
Direct Link - Lee, Y.K. and L.H. Chen, 2000. High capacity image steganographic model. IEEE Proc. Vision Image Signal Process., 147: 288-294.
Direct Link - Petitcolas, F.A.P., R.J. Anderson and M.G. Kuhn, 1999. Information hiding-a survey. Proc. IEEE, 87: 1062-1078.
CrossRefDirect Link