Graphical Data Steganographic Protection Method Based on Bits Correspondence Scheme

The proposed method of graphical data protection is a combined crypto-steganographic method. It is based on a bit values transformation according to both a certain Boolean function and a specific scheme of correspondence between MSB and LSB. The scheme of correspondence is considered as a secret key. The proposed method should be used for protection of large amounts of secret graphical data.

[1]  Jan H. P. Eloff,et al.  An overview of image steganography , 2005, ISSA.

[2]  Chin-Chen Chang,et al.  A steganographic method based upon JPEG and quantization table modification , 2002, Inf. Sci..

[3]  M.-R. Akbarzadeh-T,et al.  A New Genetic Algorithm Approach for Secure JPEG Steganography , 2006, 2006 IEEE International Conference on Engineering of Intelligent Systems.

[4]  Bernd Girod,et al.  Communications approach to image steganography , 2002, IS&T/SPIE Electronic Imaging.

[5]  Nasir D. Memon,et al.  Performance study of common image steganography and steganalysis techniques , 2006, J. Electronic Imaging.

[6]  Gautam Sanyal,et al.  A Survey of Steganography and Steganalysis Technique in Image, Text, Audio and Video as Cover Carrier , 2011 .

[7]  Kevin Curran,et al.  Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..

[8]  Danny Pascale,et al.  A Review of RGB Color Spaces , 2003 .

[9]  P. K. Mishra,et al.  Understanding Color Models: A Review , 2012 .

[10]  H. Y. Kim,et al.  Toward a secure public-key blockwise fragile authentication watermarking , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).

[11]  Samir Kumar Bandyopadhyay,et al.  An Application of Palette Based Steganography , 2010 .

[12]  Gregory W. Wornell,et al.  Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.

[13]  Holger Kummert,et al.  The PPP Triple-DES Encryption Protocol (3DESE) , 1998, RFC.

[14]  Yevgeniya Sulema Image protection method based on binary operations , 2016, 2016 International Conference on Systems, Signals and Image Processing (IWSSIP).

[15]  Pierre Duhamel,et al.  Applied public-key steganography , 2002, IS&T/SPIE Electronic Imaging.