Steganographic Software: Analysis and Implementation

 Abstract— Steganography is the method of hiding data in such a way that no one, except the sender and the intended recipient, expects the existence of the hidden data. Thus the goal here is always to conceal the very existence of the secret data embedded in an innocent data in such a way that it will be undetectable, robust and the innocent data should be able to accommodate high capacity of the secret data. Unfortunately, these goals were not commonly seen in most of the techniques. This paper studied different Steganographic techniques and undertakes an experiment using five Steganographic software in order to explore their capabilities. Benchmarking tool for identifying different performance aspects of the Steganographic techniques and Steganographic software like visual quality, performance indices, memory requirement and the evaluation of the maximum capacity for each software under this study. Experimental results show that all the software under this study performs above optimal level, although there are some differences of features and capabilities observed. Keywords—Steganography, Steganographic Software, Information Hiding, Steganographic tools, PSNR.

[1]  Jiun-Jian Liaw,et al.  An improvement of robust and blind data hiding based on self reference in spatial domain , 2007 .

[2]  Johann A. Briffa,et al.  Channel models for high-capacity information hiding in images , 2003, SPIE Optics + Photonics.

[3]  Touradj Ebrahimi,et al.  Perceptual quality assessment for video watermarking , 2002, Proceedings. International Conference on Information Technology: Coding and Computing.

[4]  Mauro Barni,et al.  DCT-based watermark recovering without resorting to the uncorrupted original image , 1997, Proceedings of International Conference on Image Processing.

[5]  Klimis S. Ntalianis A short-message robust steganographic method for effective information recovery under transmission losses of cellular networks , 2005 .

[6]  Stephen D. Wolthusen,et al.  Techniques and Applications of Digital Watermarking and Content Protection , 2003, Artech House computer security series.

[7]  Syed Fahad Tahir,et al.  Support Vector Machine based Intelligent Watermark Decoding for Anticipated Attack , 2008 .

[8]  Cuiling Jiang,et al.  A steganographic method based on the JPEG digital images , 2011, 2011 3rd International Conference on Computer Research and Development.

[9]  Prabir Bhattacharya,et al.  A robust block-based image watermarking scheme using fast Hadamard transform and singular value decomposition , 2006, 18th International Conference on Pattern Recognition (ICPR'06).

[10]  A. Viterbi CDMA: Principles of Spread Spectrum Communication , 1995 .

[11]  Jihane Bennour,et al.  Watermarking attack: BOWS contest , 2007, Electronic Imaging.

[12]  Gabriel Bugar,et al.  A novel method of image steganography in DWT domain , 2011, Proceedings of 21st International Conference Radioelektronika 2011.

[13]  Naman Agarwal,et al.  Robust Watermarking in Transform Domain Using Edge Detection Technique , 2007, International Conference on Computational Intelligence and Multimedia Applications (ICCIMA 2007).

[14]  David G. Stork,et al.  Pattern Classification , 1973 .

[15]  Ioannis Pitas,et al.  Protecting Digital-Image Copyrights: A Framework , 1999, IEEE Computer Graphics and Applications.

[16]  Stephen Clark,et al.  Linguistic Steganography Using Automatically Generated Paraphrases , 2010, NAACL.

[17]  Jeffrey A. Bloom,et al.  Computing the Probability of False Watermark Detection , 1999, Information Hiding.

[18]  Arijit Sur,et al.  Length based network steganography using UDP protocol , 2011, 2011 IEEE 3rd International Conference on Communication Software and Networks.

[19]  Bernd Girod,et al.  Robustness of a blind image watermarking scheme , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[20]  Malay Kumar Kundu,et al.  Robust and Blind Spatial Watermarking In Digital Image , 2002, ICVGIP.

[21]  A. N. Skodras " Multiple Channel Watermarking of Color Images " , .