High Quality Steganography Model with Attacks Detection

Steganography is the art of hiding a message in a secret way that only the receiver of the cover media knows the existence of the message. This secret message must be unobserved by a human eyes, Studies have shown that Human Vision Systems (HVS) is unable to detect changes in uncorrelated areas of the digital media, due to the complexity of such areas, where it is easy to detect changes in correlated areas. Security and quality are two important issues of steganography . In this paper we wil l introduce an algorithm that uses the LSB and those inhomogeneous areas of the cover image to hide a message. In this algorithm error correction code is used to increase the probability of retrieving the message, as well as the receiver will be able to detect if there is any alterations in the cover Media, in this case the receiver Informs the sender about this alterations.

[1]  Ingo Stierand,et al.  Computer Based Steganography: How It Works and Why Therefore Any Restrictions on Cryptography Are Nonsense, at Best , 1996, Information Hiding.

[2]  Gustavus J. Simmons,et al.  The history of subliminal channels , 1996, IEEE J. Sel. Areas Commun..

[3]  Chin-Chen Chang,et al.  A steganographic method based upon JPEG and quantization table modification , 2002, Inf. Sci..

[4]  Yeuan-Kuen Lee,et al.  High capacity image steganographic model , 2000 .

[5]  Chang-Hsing Lee,et al.  An adaptive digital image watermarking technique for copyright protection , 1999, IEEE Trans. Consumer Electron..

[6]  Walter Bender,et al.  Information Hiding to Foil the Casual Counterfeiter , 1998, Information Hiding.

[7]  Gustavus J. Simmons,et al.  The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.

[8]  Ross J. Anderson,et al.  On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..

[9]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[10]  C. F. Osborne,et al.  A digital watermark , 1994, Proceedings of 1st International Conference on Image Processing.

[11]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..