Location-Based Image Steganography

The objective of steganography is to conceal the presence of a secret communication. Nevertheless, with the development of steganalytic attack, also known as steganalysis, there are many statistical methods to estimate the presence and ratio of secret messages. The chi square (χ2) attack and regular-singular (RS) attack are two well recognized and widely applied statistical steganalysis schemes. In this paper, a new image steganography scheme with location selection is proposed to resist statistical steganalysis. The experiment results indicate that the proposed method can resist both χ2 attacks as well as RS attacks.

[1]  Chin-Chen Chang,et al.  A reversible data hiding scheme using complementary embedding strategy , 2010, Inf. Sci..

[2]  Fenlin Liu,et al.  Secure Steganography in Compressed Video Bitstreams , 2008, 2008 Third International Conference on Availability, Reliability and Security.

[3]  Der-Chyuan Lou,et al.  A steganographic scheme for secure communications based on the chaos and euler Theorem , 2004, IEEE Transactions on Multimedia.

[4]  J. Mielikainen LSB matching revisited , 2006, IEEE Signal Processing Letters.

[5]  Chin-Chen Chang,et al.  A Reversible Data Hiding Scheme Based on Side Match Vector Quantization , 2006, IEEE Transactions on Circuits and Systems for Video Technology.

[6]  Der-Chyuan Lou,et al.  Steganographic Method for Secure Communications , 2002, Comput. Secur..

[7]  Der-Chyuan Lou,et al.  LSB steganographic method based on reversible histogram transformation function for resisting statistical steganalysis , 2012, Inf. Sci..

[8]  André R. S. Marçal,et al.  A Steganographic Method for Digital Images Robust to RS Steganalysis , 2005, ICIAR.

[9]  K. Jemili,et al.  Data hiding within audio signals , 1999, 4th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Services. TELSIKS'99 (Cat. No.99EX365).

[10]  Yôiti Suzuki,et al.  Time-spread echo method for digital audio watermarking , 2005, IEEE Transactions on Multimedia.

[11]  Jessica J. Fridrich,et al.  Reliable detection of LSB steganography in color and grayscale images , 2001, MM&Sec '01.

[12]  Andreas Pfitzmann,et al.  Attacks on Steganographic Systems , 1999, Information Hiding.

[13]  Ajaz Hussain Mir,et al.  Classification of steganalysis techniques: A study , 2010, Digit. Signal Process..

[14]  Der-Chyuan Lou,et al.  Novel steganalysis schemes for BPCS steganography , 2008 .

[15]  Jiwu Huang,et al.  Edge Adaptive Image Steganography Based on LSB Matching Revisited , 2010, IEEE Transactions on Information Forensics and Security.

[16]  A.A. Hanafy,et al.  A secure covert communication model based on video steganography , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.

[17]  Jiri Fridrich,et al.  Applications of data hiding in digital images , 1999, ISSPA '99. Proceedings of the Fifth International Symposium on Signal Processing and its Applications (IEEE Cat. No.99EX359).

[18]  Jia Wu,et al.  Optimal Objects of Cooperation Selection for Human Activity in Opportunistic Networks , 2014, Smart Comput. Rev..