Advertisement

Short Paper: Application of Noisy Attacks on Image Steganography

  • Ayidh Alharbi
  • Tahar M. Kechadi
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11028)

Abstract

The data hiding techniques have attracted a lot of attention in recent years and mainly with the intensive growth of multimedia and its possibility for covert communication. Steganography is one of the information hiding methods to confirm the ability of a multimedia carrier to exchange secret information between two end-points so that it is imperceptible, thus avoiding the detection of hidden information. The secret information can be embedded in several multimedia carriers, such as image or audio or video files. It works by embedding the message in a source cover which may make the observer feel it is the source cover itself. The type of multimedia carrier here is an image. However, this technique suffers from the problem of the carrier distortion. In this paper, we investigate the impact of some distortion types on the carrier images and discuss the possibility of using distraction images in steganography to protect the stego-image. Furthermore, we highlight the current challenges of image steganography. The experimentations show very interesting results.

Keywords

Image Steganography Speckle Poisson PSNR Distortion 

References

  1. 1.
    Al-Korbi, H.A., Al-Ataby, A., Al-Taee, M.A.: Highly efficient image steganography using Haar DWT for hiding miscellaneous data. I(JJCIT) 2(1), 17–36 (2016)Google Scholar
  2. 2.
    Johnson, N.F., Jajodia, S.: Exploring steganography: seeing the unseen. Computer (1998). https://ieeexplore.ieee.org/Xplore/home.jsp
  3. 3.
    Westfeld, A., Pfitzmann, A.: Attacks on steganographic systems. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 61–76. Springer, Heidelberg (2000).  https://doi.org/10.1007/10719724_5CrossRefGoogle Scholar
  4. 4.
    Boyat, A.K., Joshi, B.K.: A review paper: noise models in digital image processing, arXiv preprint arXiv:1505.03489 (2015). arxiv.org
  5. 5.
    Farooque, M.A., Rohankar, J.S.: Survey on various noises and techniques for denoising the color image. J. Appl. Innov. (2013). www.ijaiem.org/
  6. 6.
    Sahin, U., Uguz, S., Sahin, F.: Salt and pepper noise filtering with fuzzy-cellular automata. Comput. Electr. Eng. 40, 59–69 (2014)CrossRefGoogle Scholar
  7. 7.
    Verma, R., Ali, D.J.: A comparative study of various types of image noise and efficient noise removal techniques. International Journal of Advanced (2013). https://www.semanticscholar.org/
  8. 8.
    Yi, Y., Yu, X., Wang, L., Yang, Z.: Image quality assessment based on structural distortion and image definition. In: Computer Science and Software (2008). https://ieeexplore.ieee.org/Xplore/home.jsp
  9. 9.
    Johnson, N.F., Duric, Z., Jajodia, S.: Hiding, Information: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking: Attacks and Countermeasures. Springer, Heidelberg (2001).  https://doi.org/10.1007/978-1-4615-4375-6CrossRefGoogle Scholar
  10. 10.
    Bomewar, M., Baraskar, T.: Survey on various LSB (least significant bit) methods. J. Recent. Innov. Trends 2(6), 1649–1653 (2014)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.University College DublinDublin 4Ireland

Personalised recommendations