Analysis and Implementation of Distinct Steganographic Methods
نویسندگان
چکیده
In this paper, different steganographic methods have been analyzed and implementations of those techniques have been performed. Those methods include hiding in text, hiding in audio file, hiding in file system, and hiding in image files.
منابع مشابه
Steganalysis of embedding in difference of image pixel pairs by neural network
In this paper a steganalysis method is proposed for pixel value differencing method. This steganographic method, which has been immune against conventional attacks, performs the embedding in the difference of the values of pixel pairs. Therefore, the histogram of the differences of an embedded image is di_erent as compared with a cover image. A number of characteristics are identified in the di...
متن کاملA steganographic method based on tetris games
Although various steganographic methods have been proposed that use distinct cover media, using games to hide data remains a recent development. The study presents a steganographic method based on online Tetris games, in which secret messages are embedded using a generated tetrimino sequence. Each time a person plays an online Tetris game, a new tetrimino sequence should be generated. The propo...
متن کاملA Comparative Analysis in Hardware Partitioning of a Steganographic based LSB-substitution Algorithm
Steganography is an amalgamation of art and science complimenting each other where the embedding or hiding of information is done in a digital image. This paper presents a logic level design synthesis (RTL) and IC design is done in Synopsys to visualize the implementation of LSB substitution steganographic algorithm based on 8 bit images, using HDL. This paper intends to visualize and compare t...
متن کاملJ2: Refinement of a Topological Image Steganographic Method
Prior work described the baseline version J1 of a spatial domain image steganographic embedding based on manipulation of the frequency domain, and presented a topological approach to the problem. This paper modifies the embedding and extraction processes of J1 to allow for larger payload. The improved steganographic algorithm is called J2, and is more robust to steganographic detection than J1....
متن کاملSkyDe: a Skype-based Steganographic Method
This paper introduces SkyDe (Skype Hide), a new steganographic method that utilizes Skype encrypted packets with silence to provide the means for clandestine communication. It is possible to reuse packets that do not carry voice signals for steganographic purposes because Skype does not use any silence suppression mechanism. The method’s proof-of-concept implementation and first experimental re...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1108.2153 شماره
صفحات -
تاریخ انتشار 2011