Loading...

Selecting a reliable steganography method

Sajedi, H ; Sharif University of Technology | 2010

447 Viewed
  1. Type of Document: Article
  2. DOI: 10.1109/MCIT.2010.5444848
  3. Publisher: 2010
  4. Abstract:
  5. Due to the various contents of images, the stego images produced by a steganography method may have different levels of undetectability against steganalyzers. In other words, a steganography method may cause less detectable statistical artifacts on some images compared to other images. In this paper, we analyze different features of images to find the similarity between proper cover images for each steganography method Similarity between images is modeled in form of fuzzy if-then rules using an evolutionary algorithm. Subsequently for hiding secret data in a cover image, we suggest a reliable steganography method that results in an undetectable stego image against most recently reported steganalysis methods. Experimental results show the efficiency of the proposed method in improving the security ofstego images
  6. Keywords:
  7. Cover-image ; Fuzzy if-then rules ; Secret data ; Statistical artifacts ; Steganalysis ; Stego image ; Cryptography ; Evolutionary algorithms ; Information technology ; Steganography
  8. Source: MCIT'2010 : International Conference on Multimedia Computing and Information Technology, 2 March 2010 through 4 March 2010, SharjahMCIT'2010 ; 2010 , Pages 69-72 ; 9781424470037 (ISBN)
  9. URL: http://ieeexplore.ieee.org/document/5444848/?reload=true