Abstract
This paper discusses the different embedding strategies in multi-secret steganography. Each secret is related to one selected embedding procedure, which may depend or not on personal features or characteristics. Such multi-way embedding approach allows to reveal secrets independently of each other. Presented idea may be used in single-user system in which one person stores a number of secrets or in multi-user cloud or fog computing systems.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Ogiela, M.R., Koptyra, K.: False and multi-secret steganography in digital images. Soft. Comput. 19, 3331–3339 (2015)
Westfeld, A., Pfitzmann, A.: Attacks on steganographic systems. In: Pfitzmann, A. (ed.) Information Hiding, vol. 1768, pp. 61–76. Springer, Heidelberg (2000)
Westfeld, A.: F5—a steganographic algorithm: high capacity despite better steganalysis. In: 4th International Workshop on Information Hiding, pp. 289–302. Springer (2001)
Provos, N.: Defending against statistical steganalysis. In: Proceedings of the 10th Conference on USENIX Security Symposium, Berkeley, CA, USA, vol. 10, p. 24 (2001)
Castiglione, A., Santis, A.D., Soriente, C.: Taking advantages of a disadvantage: digital forensics and steganography using document metadata. J. Syst. Softw. 80, 750–764 (2007)
Qazanfari, K., Reza, S.: A new steganography method which preserves histogram: generalization of LSB++. Inf. Sci. 277, 90–101 (2014)
Nair, A.S., Kumar, A., Sur, A., Nandi, S.: Length based network steganography using UDP protocol. In: IEEE 3rd International Conference on Communication Software and Networks, pp. 726–730 (2011)
Abdullaziz, O.I., Goh, V.T., Ling, H.C., Wong, K.: Network packet payload parity based steganography. In: IEEE Conference on Sustainable Utilization and Development in Engineering and Technology, pp. 56–59 (2013)
Furuta, T., Noda, H., Niimi, M., Kawaguchi, E.: Bit-plane decomposition steganography using wavelet compressed video. In: Fourth International Conference on Information, Communications and Signal Processing and the Fourth Pacific Rim Conference on Multimedia. Proceedings of the 2003 Joint, vol. 2, pp. 970–974 (2003)
Castiglione, A., D’Alessio, B., De Santis, A., Palmieri, F.: New steganographic techniques for the OOXML file format. In: Proceedings of the IFIP WG 8.4/8.9 International Cross Domain Conference on Availability, Reliability and Security for Business, Enterprise and Health Information Systems, Berlin, Heidelberg, pp. 344–358 (2011)
Savateev, E.O.: Design of the steganography system based on the version 4 Internet protocol. In: Siberian Conference on Control and Communications, pp. 38–51 (2005)
Murdoch, S.J., Lewis, S.: Embedding covert channels into TCP/IP. In: Barni, M., Herrera-Joancomartí, J., Katzenbeisser, S., Pérez-González, F. (eds.) Information Hiding, vol. 3727, pp. 247–261. Springer, Heidelberg (2005)
Ogiela, M.R., Koptyra, K.: Visual pattern embedding in multi-secret image steganography. In: ICIIBMS 2015 International Conference on Intelligent Informatics and BioMedical Sciences, Okinawa, Japan, 28–30 November 2015, pp. 434–437 (2015)
Koptyra, K., Ogiela, M.R.: Key generation for multi-secret steganography. In: ICISS 2015 2nd International Conference on Information Science and Security, Seoul, South Korea, 14–16 December 2015, pp. 1–4 (2015)
Acknowledgments
This work was supported by the AGH University of Science and Technology research Grant No 15.11.120.868.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
Koptyra, K., Ogiela, M.R. (2018). Embedding Strategies in Multi-secret Steganography. In: Xhafa, F., Caballé, S., Barolli, L. (eds) Advances on P2P, Parallel, Grid, Cloud and Internet Computing. 3PGCIC 2017. Lecture Notes on Data Engineering and Communications Technologies, vol 13. Springer, Cham. https://doi.org/10.1007/978-3-319-69835-9_28
Download citation
DOI: https://doi.org/10.1007/978-3-319-69835-9_28
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-69834-2
Online ISBN: 978-3-319-69835-9
eBook Packages: EngineeringEngineering (R0)