Resisting Blind Steganalysis in Real Time Covert Communication

In this work, we review recent developments in the field of steganography keeping real time covert communication applications in mind. We then propose a microarchitecture to transform the existing one of most successful Steganographic technique, Yet Another Steganographic Scheme (YASS) to the hardware platform for satisfying the current Steganographic application needs. This hardware will be able to resist the Self-calibration based blind Steganalysis attacks, which are the most successful attacks in breaking any Steganographic technique till now. General Terms Information security, steganography, data hiding, watermarking.

[1]  Miad Faezipour,et al.  Fast real-time hardware engine for Multipoint Text Steganography , 2014, IEEE Long Island Systems, Applications and Technology (LISAT) Conference 2014.

[2]  Anindya Sarkar,et al.  YASS: Yet Another Steganographic Scheme That Resists Blind Steganalysis , 2007, Information Hiding.

[3]  M. Saeb,et al.  DESIGN AND IMPLEMENTATION OF A SECRET KEY STEGANOGRAPHIC MICROARCHITECTURE EMPLOYING FPGA , 2003 .

[4]  B. J. Mohd,et al.  FPGA hardware of the LSB steganography method , 2012, 2012 International Conference on Computer, Information and Telecommunication Systems (CITS).

[5]  Jing Tian,et al.  An Improved YASS Approach Using Irregular Host-Blocks and Modified Quantization Index Modulation , 2012, 2012 Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[6]  Lee-Ming Cheng,et al.  Hardware Realization of Steganographic Techniques , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[7]  Jing Tian,et al.  Modified YASS algorithm with virtual host block selection and model based embedding , 2012, 2012 7th IEEE Conference on Industrial Electronics and Applications (ICIEA).

[9]  Claudia Feregrino Uribe,et al.  FPGA Hardware Architecture of the Steganographic ConText Technique , 2008, 18th International Conference on Electronics, Communications and Computers (conielecomp 2008).

[10]  C VivekAmruth,et al.  Multi-Level Steganography for Smart phones , 2014, SOCO 2014.

[11]  Data Hiding in Digital Images : A Steganographic Paradigm , 2008 .

[12]  B. S. Manjunath,et al.  Provably Secure Steganography: Achieving Zero K-L Divergence using Statistical Restoration , 2006, 2006 International Conference on Image Processing.

[13]  B. S. Manjunath,et al.  Robust image-adaptive data hiding using erasure and error correction , 2004, IEEE Transactions on Image Processing.

[14]  Anindya Sarkar,et al.  Further study on YASS: steganography based on randomized embedding to resist blind steganalysis , 2008, Electronic Imaging.

[15]  Xiang Yang,et al.  Effective Steganalysis of YASS Based on Statistical Moments of Wavelet Characteristic Function and Markov Process , 2012, 2012 International Conference on Computer Science and Electronics Engineering.

[16]  B. S. Manjunath,et al.  Statistical restoration for robust and secure steganography , 2005, IEEE International Conference on Image Processing 2005.

[17]  Anindya Sarkar,et al.  Matrix Embedding With Pseudorandom Coefficient Selection and Error Correction for Robust and Secure Steganography , 2010, IEEE Transactions on Information Forensics and Security.

[18]  Wen-hua Zhang,et al.  Effective Steganalysis of YASS Based on Statistical Moments of Wavelet Characteristic Function and Markov Process , 2012 .

[19]  Anindya Sarkar Novel image data-hiding methodologies for robust and secure steganography with extensions to image forensics , 2010 .