基于图像隐写术的新型安全编码和隐藏技术综述

S. Ashwin, J. Ramesh, S. A. Kumar, K. Gunavathi
{"title":"基于图像隐写术的新型安全编码和隐藏技术综述","authors":"S. Ashwin, J. Ramesh, S. A. Kumar, K. Gunavathi","doi":"10.1109/ICETEEEM.2012.6494463","DOIUrl":null,"url":null,"abstract":"Steganography is the art of passing information in a manner that the very existence of the message is unknown. The goal of steganography is to avoid drawing suspicion to the transmission of a hidden message. If suspicion is raised, then this goal is defeated. It serves as a better way of securing message than cryptography which only conceals the content of the message not the existence of the message. Original message is being hidden within a carrier such that the changes so occurred in the carrier are not observable. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the Internet. The recent growth in computational power and technology has propelled it to the forefront of today's security techniques. This paper presents a review of the literature on different types of contemporary steganography techniques for image in spatial and transform domains and steganalysis techniques for the detection of secret message in the image. In addition, research trends and challenges are identified and directions for future research are discussed.","PeriodicalId":213443,"journal":{"name":"2012 International Conference on Emerging Trends in Electrical Engineering and Energy Management (ICETEEEM)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"34","resultStr":"{\"title\":\"Novel and secure encoding and hiding techniques using image steganography: A survey\",\"authors\":\"S. Ashwin, J. Ramesh, S. A. Kumar, K. Gunavathi\",\"doi\":\"10.1109/ICETEEEM.2012.6494463\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Steganography is the art of passing information in a manner that the very existence of the message is unknown. The goal of steganography is to avoid drawing suspicion to the transmission of a hidden message. If suspicion is raised, then this goal is defeated. It serves as a better way of securing message than cryptography which only conceals the content of the message not the existence of the message. Original message is being hidden within a carrier such that the changes so occurred in the carrier are not observable. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the Internet. The recent growth in computational power and technology has propelled it to the forefront of today's security techniques. This paper presents a review of the literature on different types of contemporary steganography techniques for image in spatial and transform domains and steganalysis techniques for the detection of secret message in the image. In addition, research trends and challenges are identified and directions for future research are discussed.\",\"PeriodicalId\":213443,\"journal\":{\"name\":\"2012 International Conference on Emerging Trends in Electrical Engineering and Energy Management (ICETEEEM)\",\"volume\":\"101 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"34\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 International Conference on Emerging Trends in Electrical Engineering and Energy Management (ICETEEEM)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICETEEEM.2012.6494463\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 International Conference on Emerging Trends in Electrical Engineering and Energy Management (ICETEEEM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICETEEEM.2012.6494463","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 34

摘要

隐写术是一种传递信息的艺术,这种信息的存在是未知的。隐写术的目的是避免引起对隐藏信息传输的怀疑。如果引起怀疑,那么这个目标就失败了。它是一种比加密更好的保护消息的方法,加密只隐藏消息的内容,而不隐藏消息的存在。原始消息被隐藏在一个载体中,这样在载体中发生的变化是不可观察的。可以使用许多不同的载波文件格式,但数字图像是最受欢迎的,因为它们在互联网上的频率很高。最近计算能力和技术的增长将其推向了当今安全技术的前沿。本文综述了不同类型的当代空间域和变换域图像隐写技术以及图像中秘密信息检测的隐写分析技术的文献。此外,还指出了研究趋势和挑战,并对未来的研究方向进行了讨论。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Novel and secure encoding and hiding techniques using image steganography: A survey
Steganography is the art of passing information in a manner that the very existence of the message is unknown. The goal of steganography is to avoid drawing suspicion to the transmission of a hidden message. If suspicion is raised, then this goal is defeated. It serves as a better way of securing message than cryptography which only conceals the content of the message not the existence of the message. Original message is being hidden within a carrier such that the changes so occurred in the carrier are not observable. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the Internet. The recent growth in computational power and technology has propelled it to the forefront of today's security techniques. This paper presents a review of the literature on different types of contemporary steganography techniques for image in spatial and transform domains and steganalysis techniques for the detection of secret message in the image. In addition, research trends and challenges are identified and directions for future research are discussed.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Modeling and simulation of thirty bus system employing solid state circuit breaker A real time embedded novel finger-vein recognition system for authenticated on teller machine A high speed reconfigurable virus detection processor for embedded network security Maintenance — Free solar energy drip irrigation using battery-less RF powered wireless sensors over AD-HOC network Differential Evolution algorithm based Weighted Additive FGA approach for optimal power flow using muti-type FACTS devices
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1