Secure Steganography in Multimedia Content

نویسندگان

  • Miroslav Goljan
  • Andreas Westfeld
چکیده

Steganography, known as the art of covert communication, entered digital world about ten years ago. After gaining special interest of research groups around the world, steganography and steganalysis are slowly reaching maturity. Images produced by digital cameras are typical multimedia carriers where hiding secrets has been studied deeply. They contain a large amount of randomness that is hard to distinguish from telltale signs of hidden and eventually encrypted messages. The security requirement in steganography ultimately means that no such detection method should exist that would be able to tell carriers with hidden messages from innocent ones with a significant reliability. Introduction of every new steganographic scheme spurred a number of publications on steganalysis of that scheme. Empirically determined secure capacities shrink with advances in steganalysis. A hope for finding general optimal solutions is narrow since they have to be tied to carrier models. To achieve undetectability, steganographers minimize the impact of message data embedding on the carrier in two ways, by content-aware embedding in various transform domains and by applying advanced coding techniques. While the first is a kind of an art that needs to undergo the scrutiny of steganalysis testing and validating, the second is much more of a mathematical science. Theoretical bounds on coding efficiency are known but hard to achieve in practical schemes. Thus, secure steganographic capacity is difficult to determine for multimedia carriers and remains to be an open issue. We are delighted to present five papers devoted to the above mentioned aspects of steganography and its counterpart, steganalysis. Fontaine and Galand prove the power of established structured codes in “How can ReedSolomon codes improve steganographic schemes.” While syndrome coding in steganographic schemes tends to reduce distortion during embedding, Miche et al. in “Reliable Steganalysis Using a Minimum Set of Samples and Features” push sensitivity of universal steganalysis a step further and reduce secure capacities of any steganography a bit. “Steganography in 3D Geometries and Images by Adjacent Bin Mapping” presented by Wu and Dugelay introduces a new countermeasure to steganography detection through histogram characteristic function. JPEG compression format for images became the one that attracts steganographers the most. Rossi, Garzia, and Cusani return to the topic with “Peak-Shaped-Based Steganographic Technique for JPEG Images.” Their novel model-based steganographic technique for JPEG images involves heuristic assumptions about the shape of the DCT frequency histograms, and finally, both aspects—coding and embedding operation—are merged in the design of a new scheme by Chao et al. described in “A Novel Image Data Hiding Scheme with Diamond Encoding.” Our thanks belong to the authors and to all reviewers for their contribution to this journal. We hope that readers will find the papers interesting at least and that blank pages in steganography area will continue being filled.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Recent Advances in Multimedia Information System Security

A multimedia communication system enables multimedia data's generation, storage, management, distribution, receiving, consuming, editing, sharing, and so on. In such systems, there are various security issues, which must be considered such as eavesdropping, intrusion, forgery, piracy and privacy, etc. Until now, various security solutions for multimedia communication systems have been reported,...

متن کامل

Alternatives for Multimedia Messaging System Steganography

The Multimedia Messaging System allows a user of a mobile phone to send messages containing multimedia objects, such as images, audio or video clips. MMS has very quickly gained the popularity of SMS among mobile users. Alongside, the need for a secure communication became more imperative. Hiding information, especially in images has been an attractive solution for secret communication. In this...

متن کامل

Data masking: a secure-covert channel paradigm

It is well known that encryption provides secure channels for communicating entities. However, due to lack of covertness on these channels, an eavesdropper can identify encrypted streams through statistical tests and capture them for further cryptanalysis. Hence, the communicating entities can use steganography to achieve covertness. In this paper we propose a new form of multimedia steganograp...

متن کامل

An Enhanced Least Significant Bit Steganography Technique

Message transmission through internet as medium, is becoming increasingly popular. Hence issues like information security are becoming more relevant than earlier. This necessitates for a secure communication method to transmit messages via internet. Steganography is the science of communicating secret data in several multimedia carriers like audio, text, video or image. A modified technique to ...

متن کامل

Multimedia based Steganography using PMM and M4M

In today’s highly digitalized world maintaining the secrecy of the secret data is a vital problem. Steganography is an emerging area which may be used for secure transmission of the digital data. It is the art and science of embedding data into different covers such that the data embedded is imperceptible. The covers that can be used cover all forms of digital multimedia object namely text, ima...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • EURASIP J. Information Security

دوره 2009  شماره 

صفحات  -

تاریخ انتشار 2009