ENHANCING LSB STEGANOGRAPHY AGAINST STEGANALYSIS ATTACKS USING COMBINATIONAL LSBS

Yahya Belghuzooz, Ali Al-Qayedi

Abstract

This paper describes an enhanced approach for hiding secret messages in the spatial domain of digital cover images such that the resulting stego-images are robust to steganalysis attacks. Firstly, different methods of hiding in the Least Significant Bits (LSBs) are comparatively discussed including the Sequential and the Random algorithms. Then our approach is illustrated which uses a combination of LSBs to store large amounts of secret information while maintaining robustness against detection by steganalysis attacks. The results achieved are commensurate to those obtained using widely available stego tools.

References

  1. Westfeld, A. and Pfitzmann, A. (2000) Attacks on Steganographic Systems, Lecture Notes in Computer Science, vol.1768, Springer-Verlag, Berlin, pp. 61-75.
  2. Cole, E. and Krutz, R. (2003) Hiding in Plain Sight: Steganography and the Art of Covert Communication, Wiley, John & Sons.
  3. Katzenbeisser S. and Petitcolas, F. (2000) Information Hiding Techniques for Steganography and Digital Watermarking, Artech House.
  4. Provos, N. and Honeyman, P. (2003) Hide and Seek: An Introduction to Steganography, IEEE security & privacy 1:33, 32-44, IEEE Computer Society .
  5. FortKnox (2007), Online, Available: http://www.softpedia.com/get/Security/Firewall/FortK nox-Personal-Firewall.shtml , 31 May 2007
  6. Camouflage (2007), Online, Available: http://camouflage.unfiction.com/, 31 May 2007.
  7. JpegX (2007), Online, Available: http://nerdlogic.org/jpegx/ , 31 May 2007
  8. Safe (2007), Safe & Quick Hide, Online, Available: http://www.freedownloadscenter.com/Utilities/File_E ncryption_Utilities/Safe_Quick_Hide_File_and_Folde r.html [31 May 2007]
  9. DataStash (2007), Online, Available: http://www.skyjuicesoftware.com/software/ds_info.ht ml, 31 May 2007
  10. Lenti, J. (2000) Stegangraphic Methods, PERIODICA POLYTECHNICA,VOL. 44, NO. 3-4, PP. 249-258.
  11. Johnson, N. and Jajodia, S. (1998) Steganography: Seeing the Unseen, IEEE Computer, vol. 31, no. 2, pp. 26-34.
  12. Soukal, D. and Goljan, M (2005) Maximum Likelihood Estimation of Secret Message Length Embedded Using +-K Steganography in Spatial Domain, Proc. SPIE Electronic Imaging San Jose, CA, January 16- 20, pp. 595-606.
  13. S-Tools (2007), Online, Available: http://www.snapfiles.com/get/stools.html, 31 May 07
Download


Paper Citation


in Harvard Style

Belghuzooz Y. and Al-Qayedi A. (2007). ENHANCING LSB STEGANOGRAPHY AGAINST STEGANALYSIS ATTACKS USING COMBINATIONAL LSBS . In Proceedings of the Second International Conference on Signal Processing and Multimedia Applications - Volume 1: SIGMAP, (ICETE 2007) ISBN 978-989-8111-13-5, pages 237-242. DOI: 10.5220/0002133602370242


in Bibtex Style

@conference{sigmap07,
author={Yahya Belghuzooz and Ali Al-Qayedi},
title={ENHANCING LSB STEGANOGRAPHY AGAINST STEGANALYSIS ATTACKS USING COMBINATIONAL LSBS},
booktitle={Proceedings of the Second International Conference on Signal Processing and Multimedia Applications - Volume 1: SIGMAP, (ICETE 2007)},
year={2007},
pages={237-242},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002133602370242},
isbn={978-989-8111-13-5},
}


in EndNote Style

TY - CONF
JO - Proceedings of the Second International Conference on Signal Processing and Multimedia Applications - Volume 1: SIGMAP, (ICETE 2007)
TI - ENHANCING LSB STEGANOGRAPHY AGAINST STEGANALYSIS ATTACKS USING COMBINATIONAL LSBS
SN - 978-989-8111-13-5
AU - Belghuzooz Y.
AU - Al-Qayedi A.
PY - 2007
SP - 237
EP - 242
DO - 10.5220/0002133602370242