A Information Steganography System Based on Channel Encoding

Conference paper
Part of the Advances in Intelligent and Soft Computing book series (AINSC, volume 146)

Abstract

Researches on communication security not only include study of cryptography, but also include that on channel security, the essence of which is to hide existence of information. Information steganography is important branch in information hiding field and technical approach to achieve steganography communication. Based on thoroughly analysis and research on information hiding and steganography techniques, the paper gave the model of information steganography system and designed a steganography system based on channel encoding. The system achieves embedment and extraction of steganography with bit replacement method based on pseudo-random sequence, so as to improve the security of system.

Keywords

information hiding steganography channel encoding pseudo-random sequence 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Ganeshkumar, V., Koggalage, R.L.W.: Secured communication using Steganography Framework with sample RTF implementation. In: 2009 International Conference on Industrial and Information Systems, pp. 15–21 (2009)Google Scholar
  2. 2.
    Pfitzman, B.: Information hiding terminology. In: 1st International Workshop on Information Hiding, pp. 347–350. Springer, Heidelberg (1996)Google Scholar
  3. 3.
    Marvel, L.M., Boncelet, C.G., Retter, C.T.: Reliable Blind Information Hiding for Images. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 48–61. Springer, Heidelberg (1998)CrossRefGoogle Scholar
  4. 4.
    Niimi, M., Noda, H., Kawaguchi, E.: A study on the steganography using bit-plane complexity segmentation. In: Conference on Image and Vision Computing, pp. 151–156 (1998)Google Scholar
  5. 5.
    Smith, J.R., Comiskey, B.O.: Modulation and information hiding in images. In: 1st International Workshop on Information Hiding, pp. 207–226. Springer, Heidelberg (1996)CrossRefGoogle Scholar
  6. 6.
    Niwayama, N., Ogihara, T.: A data embedding method using fractal image compression. In: Pacific Rim Workshop on Digital Steganography, pp. 771–775 (2004)Google Scholar
  7. 7.
    Provos, N., Honeyman, P.: Hide and seek: an introduction to stegangography. IEEE Security & Privacy Magazine 5, 32–44 (2003)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag GmbH Berlin Heidelberg 2012

Authors and Affiliations

  1. 1.Chengdu Institute of Computer ApplicationChengduChina
  2. 2.Institute of ComputerGuangdong University of TechnologyGuangzhouChina

Personalised recommendations