AN IMPROVED STEGANOGRAPHIC METHOD

Hyoung Joong Kim, Amiruzzaman Md

2008

Abstract

An improved steganographic method is proposed in this paper. Two distinct methods are combined here with optimized way with possibly high data hiding capability. The proposed method shifts the last nonzero AC coefficients in each JPEG block, and, changes the magnitude value of the first nonzero AC coefficients.

References

  1. Amiruzzaman Md. and Kim H. J. (2008). Selective block steganography. In Proceedings of the 3rd International Joint Workshop on Information Security and Applications, pp. 123-133.
  2. Fridrich J., Goljan M., and Hogea H. (2002). Attacking the Out-Guess. In Proceedings of the ACM Workshop on Multimedia and Security, pp. 967-982.
  3. Fridrich J., Goljan M., and Hogea H. (2003). Steganalysis of JPEG image: Breaking the F5 algorithm. In Lecture Notes in Computer Science, vol. 2578, pp. 310-323.
  4. Fridrich J. (2004). Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes. In Lecture Notes in Computer Science, vol. 3200, pp. 67-81.
  5. Provos N. (2001). Defending against statistical steganalysis. In Proceedings of the 10th USENIX Security Symposium, pp. 323-335.
  6. Sallee P. (2004). Model-based steganography. In Lecture Notes in Computer Science, vol. 2939, pp. 154-167.
  7. Sallee P. (2005). Model-based methods for steganography and steganalysis. In International Journal of Image and Graphics, vol. 5, no. 1, pp. 167-190.
  8. Solanki K., Sarkar A., and Manjunath B. S. (2007). YASS: Yet another steganographic scheme that resists blind steganalysis. In Proceedings of the 9th International Workshop on Information Hiding, Saint Malo, Brittany, France, pp.16-31.
  9. Westfeld A. and Pfitzmann A. (2000). Attacks on steganographic systems In Lecture Notes in Computer Science, vol. 1768, pp. 61-75.
  10. Westfeld A. (2001) F5: A steganographic algorithm: High capacity despite better steganalysis. In Lecture Notes in Computer Science, vol. 2137, pp. 289-302.
Download


Paper Citation


in Harvard Style

Joong Kim H. and Md A. (2008). AN IMPROVED STEGANOGRAPHIC METHOD . In Proceedings of the International Conference on Signal Processing and Multimedia Applications - Volume 1: SIGMAP, (ICETE 2008) ISBN 978-989-8111-60-9, pages 145-150. DOI: 10.5220/0001938901450150


in Bibtex Style

@conference{sigmap08,
author={Hyoung Joong Kim and Amiruzzaman Md},
title={AN IMPROVED STEGANOGRAPHIC METHOD},
booktitle={Proceedings of the International Conference on Signal Processing and Multimedia Applications - Volume 1: SIGMAP, (ICETE 2008)},
year={2008},
pages={145-150},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0001938901450150},
isbn={978-989-8111-60-9},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Signal Processing and Multimedia Applications - Volume 1: SIGMAP, (ICETE 2008)
TI - AN IMPROVED STEGANOGRAPHIC METHOD
SN - 978-989-8111-60-9
AU - Joong Kim H.
AU - Md A.
PY - 2008
SP - 145
EP - 150
DO - 10.5220/0001938901450150