Loading...
Search for: image-steganography
0.005 seconds

    On the effect of spatial to compressed domains transformation in LSB-based image steganography

    , Article 7th IEEE/ACS International Conference on Computer Systems and Applications, AICCSA-2009, Rabat, 10 May 2009 through 13 May 2009 ; 2009 , Pages 260-264 ; 9781424438068 (ISBN) Sarreshtedari, S ; Ghotbi, M ; Ghaemmaghami, S ; Sharif University of Technology
    2009
    Abstract
    This paper introduces an efficient scheme to image steganography by introducing the hidden message (payload) insertion in spatial domain and transforming the stego-image to compressed domain. We apply a recently-proposed LSB method in order to obtain better statistical behavior of the stego-message and subsequently, the obtained stego-image is transformed and quantized in order to enhance the security of hiding. Performance analysis comparisons confirm a higher efficiency for our proposed method. Compared to recently-proposed approaches, our method offers the advantage that it combines an efficient LSB method with transform domain security. © 2009 IEEE  

    Improved collage steganography

    , Article 4th IEEE International Conference on Emerging Technologies 2008, ICET 2008, Rawalpindi, 18 October 2008 through 19 October 2008 ; February , 2008 , Pages 223-227 ; 9781424422111 (ISBN) Shirali Shahreza, S ; Shirali Shahreza, M ; Sharif University of Technology
    2008
    Abstract
    Establishing Hidden Communication Is An Important Subject That Nowadays Has Gained Increasing Importance. Embedding A Secret Message Into A Cover Media Without Attracting Any Attention, Known As Steganography, Is One Of The Methods Used For Hidden Communication Purposes. In This Paper, We Present An Advanced Version Of "Collage Steganography" Method Which Is Robust Against Various Attacks. In This Method, An Image (For Example A View Of A Room) Is Created Which Contains Some Coded Information. This Method Is Robust Against Attacks Such As Adding Noise, Blurring And Jpeg Compression  

    HYSA: HYbrid steganographic approach using multiple steganography methods

    , Article Security and Communication Networks ; Volume 4, Issue 10 , OCT , 2011 , Pages 1173-1184 ; 19390114 (ISSN) Sajedi, H ; Jamzad, M ; Sharif University of Technology
    John Wiley and Sons Inc  2011
    Abstract
    The aim of image steganography is to hide data in an image with visual and statistical invisibility. There have been a number of steganography techniques proposed over the past few years. In sequence, the development of these methods has led to an increased interest in steganalysis techniques. Most of the steganalysis methods attempt to estimate cover image statistics. One way to provide a secure steganography method is to disturb the estimation of steganalyzers. The main concern of this paper is to resist against steganalysis methods and utilize a mechanism to securely embed more secret data into an image. We present HYbrid steganographic approach (HYSA), which embeds secret data with... 

    Reduced complexity enhancement of steganalysis of LSB-matching image steganography

    , Article 7th IEEE/ACS International Conference on Computer Systems and Applications, AICCSA-2009, Rabat, 10 May 2009 through 13 May 2009 ; 2009 , Pages 1013-1017 ; 9781424438068 (ISBN) Malekmohamadi, H ; Ghaemmaghami, S ; Sharif University of Technology
    2009
    Abstract
    We propose a method for steganalysis of still, grayscale images using a novel set of features that are extracted from images. This feature set employs the Gabor filter coefficients to train a multi-layer perceptron neural network and a support vector machine classifier. We show that incorporation of the Gabor filter coefficients to the feature sets of images could have a significant role in discrimination between clean and altered images. Experimental results show that the proposed method outperforms previous methods, introduced for steganalysis of LSB-matching image steganography, in terms of both discrimination accuracy and feature set dimensionality. © 2009 IEEE  

    LSB ++: An improvement to LSB + steganography

    , Article IEEE Region 10 Annual International Conference, Proceedings/TENCON, 21 November 2011 through 24 November 2011, Bali ; 2011 , Pages 364-368 ; 9781457702556 (ISBN) Ghazanfari, K ; Ghaemmaghami, S ; Khosravi, S. R ; Sharif University of Technology
    Abstract
    The Least Significant Bit (LSB) substitution is an old and simple data hiding method that could almost effortlessly be implemented in spatial or transform domain over any digital media. This method can be attacked by several steganalysis methods, because it detectably changes statistical and perceptual characteristics of the cover signal. A typical method for steganalysis of the LSB substitution is the histogram attack that attempts to diagnose anomalies in the cover image's histogram. A well-known method to stand the histogram attack is the LSB + steganography that intentionally embeds some extra bits to make the histogram look natural. However, the LSB + method still affects the perceptual... 

    High capacity image steganography in wavelet domain

    , Article 2010 7th IEEE Consumer Communications and Networking Conference, CCNC 2010, 9 January 2010 through 12 January 2010, Las Vegas, NV ; 2010 ; 9781424451760 (ISBN) Sarreshtedari, S ; Ghaemmaghami, S ; Sharif University of Technology
    2010
    Abstract
    A new high capacity method for transform domain image steganography is introduced in this paper. The proposed steganography algorithm works on the wavelet transform coefficients of the original image to embed the secret data. As compared to current transform domain data hiding methods, this scheme can provide a larger capacity for data hiding without sacrificing the cover image quality. This is achieved through retaining integrity of the wavelet coefficients at high capacity embedding. This improvement to capacity-quality trading-off interrelation is analyzed in detailed and experimentally illustrated in the paper  

    On limits of embedding in 3D images based on 2D Watson's model

    , Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 1 October 2010 through 3 October 2010 ; Volume 6526 LNCS , October , 2011 , Pages 293-304 ; 03029743 (ISSN); 9783642184048 (ISBN) Kavehvash, Z ; Ghaemmaghami, S ; Sharif University of Technology
    2011
    Abstract
    We extend the Watson image quality metric to 3D images through the concept of integral imaging. In the Watson's model, perceptual thresholds for changes to the DCT coefficients of a 2D image are given for information hiding. These thresholds are estimated in a way that the resulting distortion in the 2D image remains undetectable by the human eyes. In this paper, the same perceptual thresholds are estimated for a 3D scene in the integral imaging method. These thresholds are obtained based on the Watson's model using the relation between 2D elemental images and resulting 3D image. The proposed model is evaluated through subjective tests in a typical image steganography scheme  

    A new solution for password key transferring in steganography methods by CAPTCHA through MMS technology

    , Article 2007 International Conference on Information and Emerging Technologies, ICIET, Karachi, 6 July 2007 through 7 July 2007 ; 2007 , Pages 136-141 ; 1424412463 (ISBN); 9781424412464 (ISBN) Shirali Shahreza, M ; Shirali Shahreza, M. H ; Sharif University of Technology
    2007
    Abstract
    The Multimedia Messaging System (MMS) allows a user of a mobile phone to send messages containing multimedia objects, such as images, audio or video clips. On the other hand establishing hidden communication is an important subject of discussion that has gained increasing importance nowadays with the development of the Internet. One of the methods introduced for establishing hidden communication is steganography. Therefore steganography in MMS is an interesting idea. One of the problems in steganography methods is the security of transferring password key used for steganography between sender and receiver of secure data. In this paper a new method is proposed for solving this problem using... 

    Steganography in MMS

    , Article 11th IEEE International Multitopic Conference, INMIC 2007, Lahore, 28 December 2007 through 30 December 2007 ; 2007 ; 1424415535 (ISBN); 9781424415533 (ISBN) Shirali Shahreza, M ; Sharif University of Technology
    2007
    Abstract
    After rapid growth of the Internet, establishing hidden communication is an important subject of security that has gained increasing importance. One of the methods for establishing hidden communication is steganography. On the other hand with the expanding the use of mobile phones mobile telecommunication companies starting to add additional features to their mobile phones such as MMS (Multimedia Messaging Service) in order to attract more customers. Considering above statements, steganography in MMS messages is a good solution for establishing hidden communication. In this paper a new method for steganography in MMS messages using both text and image steganography methods is presented. This... 

    Secure steganography using Gabor filter and neural networks

    , Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) ; Volume 4920 LNCS , 2008 , Pages 33-49 ; 03029743 (ISSN); 3540690166 (ISBN); 9783540690160 (ISBN) Jamzad, M ; Zahedi Kermani, Z ; Sharif University of Technology
    2008
    Abstract
    The main concern of steganography (image hiding) methods is to embed a secret image into a host image in such a way that it causes minimum distortion to the host; to make it possible to extract a version of secret image from the host in such a way that the extracted version of secret image be as similar as possible to its original version (this should be possible even after usual attacks on the host image), and to provide ways of embedding secret images with larger size into a given host image. In this paper we propose a method that covers all above mentioned concerns by suggesting the idea of finding from an image data base, the most suitable host for a given secret image. In our method,...