基于混沌密码的空域隐写,具有较强的抗统计攻击能力

Tamojit Saha, Sandeepan Sengupta, Tanmoy Dasgupta
{"title":"基于混沌密码的空域隐写,具有较强的抗统计攻击能力","authors":"Tamojit Saha, Sandeepan Sengupta, Tanmoy Dasgupta","doi":"10.1109/ICRCICN.2017.8234536","DOIUrl":null,"url":null,"abstract":"Steganography is a form of secret communication in which a secret message (text, image) is hidden inside a carrier message (text, image). While in cryptography, the goal is to make everything unreadable to the ones who do not know the password, in steganography, on the other hand, the goal is to camouflage a message inside an apparently innocent carrier. In other words, while cryptography conceals the message itself, steganography conceals the existence of the message. Since, this form of communication potentially attracts unsavoury people to secretly hide messages in plain sight, there have been many efforts on different fronts to detect the possibility of the existence of steganography in images and other multimedia objects. Most of such algorithms use different statistical analysis based attacks for detecting potential cases of steganography. In light of this, the present methodology demonstrates the development of a set of algorithms designed to implement a spatial domain steganography technique that is capable of withstanding such attacks. The merits of the present methodology has also been assessed quantitatively.","PeriodicalId":166298,"journal":{"name":"2017 Third International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Chaotic cipher based spatial domain steganography with strong resistance against statistical attacks\",\"authors\":\"Tamojit Saha, Sandeepan Sengupta, Tanmoy Dasgupta\",\"doi\":\"10.1109/ICRCICN.2017.8234536\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Steganography is a form of secret communication in which a secret message (text, image) is hidden inside a carrier message (text, image). While in cryptography, the goal is to make everything unreadable to the ones who do not know the password, in steganography, on the other hand, the goal is to camouflage a message inside an apparently innocent carrier. In other words, while cryptography conceals the message itself, steganography conceals the existence of the message. Since, this form of communication potentially attracts unsavoury people to secretly hide messages in plain sight, there have been many efforts on different fronts to detect the possibility of the existence of steganography in images and other multimedia objects. Most of such algorithms use different statistical analysis based attacks for detecting potential cases of steganography. In light of this, the present methodology demonstrates the development of a set of algorithms designed to implement a spatial domain steganography technique that is capable of withstanding such attacks. The merits of the present methodology has also been assessed quantitatively.\",\"PeriodicalId\":166298,\"journal\":{\"name\":\"2017 Third International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 Third International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICRCICN.2017.8234536\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 Third International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICRCICN.2017.8234536","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

摘要

隐写术是将秘密信息(文本、图像)隐藏在载体信息(文本、图像)中的一种秘密通信形式。在密码学中,目标是使不知道密码的人无法读取所有内容,而在隐写术中,另一方面,目标是将信息伪装在看似无害的载体中。换句话说,密码学隐藏了消息本身,而隐写术隐藏了消息的存在。由于这种通信形式可能会吸引令人讨厌的人偷偷地将信息隐藏在显眼的地方,因此在不同的方面已经做出了许多努力来检测图像和其他多媒体对象中存在隐写术的可能性。大多数这样的算法使用不同的基于统计分析的攻击来检测潜在的隐写。鉴于此,本方法展示了一组算法的发展,旨在实现能够承受此类攻击的空间域隐写技术。还从数量上评价了目前方法的优点。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Chaotic cipher based spatial domain steganography with strong resistance against statistical attacks
Steganography is a form of secret communication in which a secret message (text, image) is hidden inside a carrier message (text, image). While in cryptography, the goal is to make everything unreadable to the ones who do not know the password, in steganography, on the other hand, the goal is to camouflage a message inside an apparently innocent carrier. In other words, while cryptography conceals the message itself, steganography conceals the existence of the message. Since, this form of communication potentially attracts unsavoury people to secretly hide messages in plain sight, there have been many efforts on different fronts to detect the possibility of the existence of steganography in images and other multimedia objects. Most of such algorithms use different statistical analysis based attacks for detecting potential cases of steganography. In light of this, the present methodology demonstrates the development of a set of algorithms designed to implement a spatial domain steganography technique that is capable of withstanding such attacks. The merits of the present methodology has also been assessed quantitatively.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
RGB image encryption using hyper chaotic system Characterisation of wireless network traffic: Fractality and stationarity Security risk assessment in online social networking: A detailed survey Optimalized hydel-thermic operative planning using IRECGA Designing an enhanced ZRP algorithm for MANET and simulation using OPNET
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1