Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 33122
A New Approach to Steganography using Sinc-Convolution Method
Authors: Ahmad R. Naghsh-Nilchi, Latifeh Pourmohammadbagher
Abstract:
Both image steganography and image encryption have advantages and disadvantages. Steganograhy allows us to hide a desired image containing confidential information in a covered or host image while image encryption is decomposing the desired image to a non-readable, non-comprehended manner. The encryption methods are usually much more robust than the steganographic ones. However, they have a high visibility and would provoke the attackers easily since it usually is obvious from an encrypted image that something is hidden! The combination of steganography and encryption will cover both of their weaknesses and therefore, it increases the security. In this paper an image encryption method based on sinc-convolution along with using an encryption key of 128 bit length is introduced. Then, the encrypted image is covered by a host image using a modified version of JSteg steganography algorithm. This method could be applied to almost all image formats including TIF, BMP, GIF and JPEG. The experiment results show that our method is able to hide a desired image with high security and low visibility.Keywords: Sinc Approximation, Image Encryption, Sincconvolution, Image Steganography, JSTEG.
Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1079022
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1831References:
[1] G. Simmons, "The Prisoners' Problem and the Subliminal Channel", CRYPTO83 Advances in Cryptology, pp. 51{67, Aug 22 -24, 1984}.
[2] R. B. Wolfgang and E. J. Delp., "A Watermark For Digital Images", Proceedings of the IEEE Inter-national Conference on Image Processing, Lausanne, Switzerland, pp. 219-222, September 1996.
[3] B. Schneier, "Applied Cryptography", New York, John Wiley & Sons, 1996, pp. 9.
[4] R. van Schyndel, A. Tirkel and C. Osborne, "A Digital Watermark", Proceedings of the IEEE International Conference on Image Processing, pp. 86-90, 1994.
[5] Andreas Westfeld, Andreas Pfitzmann, "Attacks on Steganographic System", third international workshop, LNCS 1768, Springer-Verlag Berlin Heidelberg 2000. pp. 61-76.
[6] Robert Krenn, "Steganography and Steganalysis", chapter 1.
[7] A.Westfeld, "F5ÔÇöA Steganographic Algorithm, high Capacity Despite Better Steganalysis", Technische Universit┬¿at Dresden, Institute for System Architecture, D-01062 Dresden, Germany.
[8] Peter Wayner, "Disappearing Cryptography", 2ndEdition, by Elsevier Science (USA), 2002.
[9] F. Stenger, A.R. Naghsh-Nilchi, J. Niebsch, R. Ramlau, "Sampling Methods for Approximation Method for Approximate Solution of PDE", Vol. 313, pp. 199-249 of Contemporary Mathematics, American Mathematical Society, 2002.
[10] F. Stenger, "Numerical Methods Based on Sinc and Analytic Functions", Springer Verlag,, 1993.
[11] Naghsh-Nilchi, A. R., Khanche, M. E., "Image Compression and Encryption using Sinc-Convolution", Sheik Bahaee Engineering Science Journal, Vol. 3, No. 1, 2003 (in Farsi).
[12] Haidari, B., "Using 128 bit Key for Image Encryption using Sinc- Convolution", M.S. thesis, Azad University of Najaf-Abad, 2005 (in Farsi).
[13] G. Goth, "Steganalysis Gets Past the Hype", IEEE Computer Society, Vol. 6, No. 4, April 2005
[14] B. Koukuntla, R. Kumar, A. Lach, "Steganography ", CSCIE2005.
[15] Lisa M. Marvel,Charles T. Retter , "A Methodology For Data Hiding Using Images", IEEE 1998.
[16] N. Rasouli , " Image Steganography with JPEG Format " , MSc Thesis , Islamic Azad University Unit of Najaf Abad, 2004.