Acta Informatica Pragensia 2015, 4(3), 258-275 | DOI: 10.18267/j.aip.732335

Modifikácia steganografického algoritmu využívajúceho LSB použitím množiny stegomédií

Branislav Madoš, Mária Feková
Department of Computers and Informatics, Faculty of Electrical Engineering and Informatics, Technical University of Košice, Letná 9, 042 00 Košice, Slovak Republic

Ambícia získať možnosť ukrývať digitálne reprezentované informácie kódované ako sekvencie bitov v digitálnych krycích médiách je naplnená prostredníctvom viacerých steganografických algoritmov, vrátane algoritmu využívajúceho najmenej dôležitý bit jednotlivých dátových zložiek digitálnych médií - Least Significant Bit (LSB). Rozvinutím týchto algoritmov môže byť použitie viacerých krycích médií vo forme ich množín, do ktorých je ukrývaná informácia rozdistribuovaná pomocou viacerých distribučných funkcií. Predkladaný článok popisuje návrh steganografického algoritmu založeného na využití najmenej dôležitého bitu digitálnych médií (LSB) a definovaní troch distribučných funkcií. Súčasťou článku je aj predstavenie programového vybavenia, ktoré bolo v tejto súvislosti navrhnuté, implementované a otestované.

Keywords: Steganografia, Least Significant Bit, LSB, multi-carrier

Modification of Steganographic Algorithm Using LSB and a Set of Stegomedia

Ambition to achieve possibility to hide digitally represented information which is coded in bit sequences into digital cover media is fulfilled through a number of steganographic algorithms, including Least Significant Bit (LSB) algorithm. A further development of those algorithms can be seen in the use of multiple cover media in the form of their sets, into which digital information is distributed by the use of multiple distribution functions (multi-carrier steganographic algorithms). This paper describes design of steganographic algorithm that is based on the use of the Least Significant Bit (LSB) and three distribution functions, which allow to distribute digital information into the set of cover media. The part of this article is describing software solution which was designed, developed and tested as the part of this research.

Keywords: Steganography, Least Significant Bit, LSB, Multi-carrier

Received: October 31, 2015; Revised: November 22, 2015; Accepted: November 28, 2015; Published: December 31, 2015  Show citation

ACS AIP APA ASA Harvard Chicago Chicago Notes IEEE ISO690 MLA NLM Turabian Vancouver
Madoš, B., & Feková, M. (2015). Modification of Steganographic Algorithm Using LSB and a Set of Stegomedia. Acta Informatica Pragensia4(3), 258-275. doi: 10.18267/j.aip.73
Download citation

References

  1. Baran, B., Gomez, S., & Bogarin, V. (2001). Steganographic Watermarking for Documents. In Proceedings of the 34th Annual Hawaii International Conference on System Sciences (pp. 1-10). Los Alamitos: IEEE.
  2. Bennet, K. (2004). Linguistic Steganography: Survey, Analysis, and Robustness Concerns for Hiding Information in Text. West Lafayette: Purdue University. CERIAS Tech Report 2004-13.
  3. Cox, I. J. (2008). Digital Watermarking and Steganography. Second Edition. Burlington: Elsevier. Go to original source...
  4. Cvejic, N., & Seppanen, T. (2005). Increasing Robustness of LSB Audio Steganography by Reduced Distortion LSB Coding. Journal of Universal Computer Science, 11(1), 56-65. doi: 10.3217/jucs-011-01-0056
  5. Davidson, I., & Paul, G. (2004). Locating secret messages in images. In ACM SIGKDD international conference on Knowledge discovery and data mining (pp. 545-550). New York: ACM. doi: 10.1145/1014052.1014117 Go to original source...
  6. Dumitrescu, S., & Wu, X. (2008). LSB steganalysis based on high-order statistics. In Proceedings of the 7th workshop on Multimedia and security (pp. 25-32). New York: ACM. doi: 10.1145/1073170.1073176 Go to original source...
  7. Fridrich, J., Goljan, M., & Du., R. (2001). Reliable detection of LSB steganography in grayscale and color images. In Proceedings of the 2001 workshop on Multimedia and security: new challenges (pp. 27-30). New York: ACM. doi: 10.1145/1232454.1232466 Go to original source...
  8. Hurtuk, J., Čopjak, M., Dufala, M., & Drienik, P. (2014). The malicious code hiding techniques, code obfuscation problem. In 12th IEEE International Conference on Emerging eLearning Technologies and Applications (pp. 181-185). Danvers: IEEE. doi: 10.1109/ICETA.2014.7107581 Go to original source...
  9. Hurtuk, J. (2014). Malware categorization and recognition problem. In: 14th Scientific Conference of Young Researchers: proceedings from conference (pp. 207-211). Košice: TU.
  10. Chapman, M., Davida, G., & Rennhard, M. (2001). A Practical and Effective Approach to Large-Scale Automated Linguistic Steganography. Proceedings of 4th International Conference, ISC 2001 (pp. 156-165). New York: Springer. doi: 10.1007/3-540-45439-X_11 Go to original source...
  11. Kessler, G., & Hosmer, C. (2011). An Overview of Steganography. Advances in Computers, 83(1) 51-107. Go to original source...
  12. Madoš, B., Hurtuk, J., Čopjak, M., Hamaš, P., & Ennert, M. (2014). Steganographic algorithm for information hiding using scalable vector graphics images. Acta Electrotechnica et Informatica, 14(4), 42-45. doi: 10.15546/aeei-2014-0040. Go to original source...
  13. Petitcolas, F. A. P., Anderson, R. J., & Kuhn, M. G. (1999). Information hiding a survey. Proceedings of the IEEE, special issue on protection of multimedia content, 87(7), 1062-1078. Go to original source...
  14. Reiland, K., Oblitey, W., Ezekiel, S., Wolfe, J. (2005). Steganography and Covert Channels. Indiana: Indiana University of Pennsylvania.
  15. Vokorokos, L., Madoš, B., Hurtuk, J., & Feková, M. (2015). Multi-carrier steganographic algorithm using LSB steganography. Acta Electrotechnica et Informatica, 15(2), 39-42. doi: 10.15546/aeei-2015-0016. Go to original source...
  16. Watters, P., Martin, F., & Stripf, H. S. (2008). Visual detection of LSB-encoded natural image steganography. ACM Transactions on Applied Perception, 5(1). doi: 10.1145/1279640.1328775. Go to original source...

This is an open access article distributed under the terms of the Creative Commons Attribution 4.0 International License (CC BY 4.0), which permits use, distribution, and reproduction in any medium, provided the original publication is properly cited. No use, distribution or reproduction is permitted which does not comply with these terms.