An architecture platform for grey level modification steganography system

The secret information exchange method is an alternative approach for information protection using 3/sup rd/ party trustees such as CIA. This approach provides corporations, governments and industry systems with winning edge, sustainable competitive advantage and assist in overcoming vulnerability of a cyber attack. The proposed grey level modification steganography is an approach where words are mapped to image pixels. The pixels and pixel values are selected from an image using a mathematical algorithm. In this paper, we present an architecture platform for a new grey level modification steganography algorithm, a secret hiding technique and a prototype system. We have implemented the whole platform. We validate the secrecy of the technique and explain the results, finally we will outline the capacity of the platform and its capability of information embedding and hiding.

[1]  Douglas A. Young Object oriented programming with C++ and OSF/Motif (2nd ed.) , 1995 .

[2]  Chin-Chen Chang,et al.  Concealing a secret image using the breadth first traversal linear quadtree structure , 2001, Proceedings of the Third International Symposium on Cooperative Database Systems for Advanced Applications. CODAS 2001.

[3]  Chin-Chen Chang,et al.  A steganographic method based upon JPEG and quantization table modification , 2002, Inf. Sci..

[4]  E. Chang,et al.  Grey level modification steganography for secret communication , 2004, 2nd IEEE International Conference on Industrial Informatics, 2004. INDIN '04. 2004.

[5]  Elizabeth Chang,et al.  Visibly Invisible: Ciphertext as a Steganographic Carrier , 2004 .

[6]  Xinpeng Zhang,et al.  Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security , 2004, Pattern Recognit. Lett..

[7]  Ja-Ling Wu,et al.  Hidden digital watermarks in images , 1999, IEEE Trans. Image Process..

[8]  Sushil Jajodia,et al.  Steganalysis of Images Created Using Current Steganography Software , 1998, Information Hiding.

[9]  Bettina C. Shuford,et al.  Recommendations for the Future , 1998 .