




已阅读5页,还剩14页未读, 继续免费阅读
版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
第1页外文文献资料ImageInformationHiding:AnSurveyI.INTRODUCTIONNowadaysmanyproblemsariseduringtheimagetransformationfromthesendertothereceiver.Strangerscaneasilysnoopintoothersaccountandgetmanysecretinformationevenitwashidedbysomemechanism,withouttheirpermission.Toavoidthisweproposeasecureschemebyusingsteganographyconcept.Steganographymeanshidinginformationinaparticularwaythatpreventsthedetectionofhiddeninformation.Inthisconceptnoonecanfindthatthereisahiddenmessagepresentintheimage,Becauseofinformationishiddenbehindanimageinamatrixform,whichiscreatedbybitmatrixoftheobject.ByusingtheLSBwecanstorethecharacteristicsofparticularpixelsofanimagearemodifiedtostoreamessage.FinallywesendthefinalpictureandcoverimageusedforhiddentheimagetothereceiverJohnson&Jajodia,1998.Atfirstwecalculatetheheightandwidthoftheimage,whichhidetheinformationthenmultiplyitwith8andstoreitinanyvalue.Thenwecalculatetheheightandwidthoftheimagewhichisusedtohidetheobjectandmultiplywitheachother.Thenwecomparethatanswerswithboththeimagewhichisusedtohidetheinformationandwhichisusedtohidetheobject.Theimagewhichisusedtohidetheobjectmusthavegreatervaluethantheotherimage;wechoosetheobjectmustsatisfytheabovecondition.Thentheencodedmatrixismappedwiththeimagebyusingleastsignificantbitmechanism.Leastsignificantbitonlystorestheinformationinsteadofreplacingthepixelofimage.Soscatteringofinformationtakesplacewhiletransferringtheimagesoaccordingtohumaneyethereisnodifferencebetweentheoriginalandstegoimage.Finallysendersendsthebothoriginalandstegoimagetothereceiver.InthereceiversidetogettheinformationthereceivermustdoXORoperationbetweenbytespresentinboththeimage.Comparetheresultwith0*00000000Iftheoutputwillbeyesthenstore0else1inamatrixandthismatrixwillbeequalto第2页thewidthandheightofthepixelmatrixoftheimage.Convertthebitsintobytesuntilallbitsgotutilized.Finallyreceivergetstheinformation.1.1.HistoryofInformationHiding1.2.TheBasicsofEmbeddingThreedifferentaspectsininformation-hidingsystemscontendwitheachother:capacity,security,androbustness.Capacityreferstotheamountofinformationthatcanbehiddeninthecovermedium,securitytoaneavesdroppersinabilitytodetecthiddeninformation,androbustnesstotheamountofmodificationthestegomediumcanwithstandbeforeanadversarycandestroyhiddeninformationFabienA.P.Petitcolasetal.,1999;SabuMThampi,2004;NameerN.EL-Emam,2007.1.3.DiscreteCosineTransformForeachcolorcomponent,theJPEGimageformatusesaDiscreteCosineTransform(DCT)totransformsuccessive88pixelblocksoftheimageinto64DCTcoefficientseach.TheDCTcoefficientsF(u,v)ofan88blockofimagepixelsf(x,y).Asimplepseudo-codealgorithmtohideamessageinsideaJPEGimagecouldlooklikethis:Input:message,coverimageOutput:steganographicimagecontainingmessageWhiledatalefttoembeddoGetnextDCTcoefficientfromcoverimageIfDCT=!0andDCT=!1thenGetnextLSBfrommessageReplaceDCTLSBwithmessagebit第3页EndifInsertDCTintosteganographicimageEndwhile1.4.DetectionTechniquesManyalgorithmswereproposedforestimatingthelengthofthesecretmessageinthecoverimage.Westfeld(2001)proposedtheblindsteganalysisbasedonstatisticalanalysisofPoVs(pairsofvalues).Thismethod,so-calledstatisticaltest,givesasuccessfulresulttoasequentialLSBsteganographyonly.FposedtheRSsteganalysis.ThismethodmakessmallalternationstotheleastsignificancebitplaneinanimagethebyusingthefollowingmethodourprocessKekreetal.,2008;BinLietal.,2011.1.5.SecuritythePacketDecoderThedecodeengineisorganizedaroundthelayersoftheprotocolstackpresentinthesupporteddata-linkandTCP/IPprotocoldefinitions.Eachsubroutineinthedecoderimposesorderonthepacketdatabyoverlayingdatastructuresontherawnetworktraffic.Thesedecodingroutinesarecalledinorderthroughtheprotocolstack,fromthedatalinklayerupthroughthetransportlayer,finallyendingattheapplicationlayer.Speedishighlightinthissection,andthemajorityofthefunctionalityofthedecoderconsistsofsettingpointersintothepacketdataforlateranalysisbythedetectionengineRichardPopa,1998.1.6.InternetProtocolVersionInternetProtocolversion6(IPv6)isanetworklayerIPstandardusedbyelectronicdevicestoexchangedataacrossapacket-switchedinternetwork.ItfollowsIPv4asthesecondversionoftheInternetProtocoltobeformallyadoptedforgeneraluse.AmongtheimprovementsbroughtbyIPv6istheincreaseofaddressesfornetworkeddevices,allowing,forexample,eachcellphoneandmobileelectronicdevicetohaveitsownaddress.IPv4supports4.3109(4.3billion)addresses,whichisinadequateforgivingevenoneaddresstoeverylivingperson,muchlesssupporttheburgeoningmarketforconnectivedevices.IPv6supports3.41038addresses,or51028(50octillion)foreachoftheroughly6.5第4页billionpeoplealivetoday.Normallythepacketsaretransferredfromonesystemtoanotherinpackets.Thepacketsaretransferredthroughthetcpconnectioninamoresecureway.II.HIDEANDSEEK:ANINTRODUCTIONTOSTEGANOGRAPHY2.1.ProblemFormulationInthepast,forthesecuritypurposepeopleusedhiddentattoosorinvisibleinktoconveysteganographiccontent.Todayforhidingpurposecomputerandnetworktechnologiesprovideeasy-to-usecommunicationchannelsforsteganographySarajuP.Mohant,2003;MuhalimMohamedAminetal.,2003.Steganographicsystembecauseoftheirinvasivenature,leavethedetectabletracesinthecovermedium.Thesecretcontentisnotrevealed,butitsstatisticalpropertieschangedsothethirdpartycandetectthedistortionsintheresultingimageMorkeletal.,2005.Theprocessoffindingthedistortionsiscalledstatisticalsteganalysis.2.2.ResearchDesignThispaperexplainsthesteganagraphicsystemsandpresentstherecentresearchindetectingthemthroughstatisticalsteganalysis.SteganographicsystemsfortheJPEGformatseemmoreinteresting,becausethesystemsoperateinatransformspaceandarenotaffectedmyvisualattacks.Visualattacksmeanthatwecanseesteganographicimagesonthelowbitplanesofanimagebecausetheyoverwritethevisualstructures.2.3.FindingTheJPEGimageformatusesadiscretecosinetransformtotransformsuccessive8*8pixelblocksoftheimageinto64DCTcoefficientseach.TheSIJTransactionsonComputerScienceEngineering&itsApplications(CSEA),Vol.1,No.1,March-April2013ISSN:232123812013|PublishedbyTheStandardInternationalJournals(TheSIJ)3TheembeddingalgorithmsequentiallyreplacestheleastsignificantbitofDCTcoefficientswiththemessagedata.ThesameprocessisalsodoneintheJPEGformat.第5页Theauthorandhiscolleagueusedasupportvectormachinetocreateanonlineardiscriminationfunction.Thentheypresentalesssophisticatedbuteasiertounderstandmethodfordeterminingalineardiscriminationfunction.2.4.ConclusionandLimitationsWeofferfourdetailsforourinabilitytofindsteganographiccontentontheinternet.Theyare,Allsteganographicsystemuserscarefullychoosepasswordsthatarenotsusceptibletodictionaryattacks.Maybeimagesfromsourceswedidnotanalyzecarrysteganographiccontent.Nobodyusessteganographicsystemsthatwecouldfind.Allmessagesaretoosmallforouranalysistodetect.Althoughsteganographyisapplicabletoalldataobjectsthatcontainredundancy,weconsiderJPEGimagesonlyforsteganography.2.5.ImplicationsWeinsertthetracerimagesintoeverystegbreakjob.Thedictionaryattackfollowsthecorrectpasswordsfortheseimages.III.STEGANOGRAPHYANDSTEGANALYSIS3.1.ProblemFormulationThegrowthofcomputernetworksandinternethasexploredmeansofbusiness,scientific,entertainment,andsocialopportunities.ThedigitalinformationcanbeeasilyduplicatedanddistributedhasledtotheneedforeffectivecopyrightprotectiontoolssuchassteganographyandcryptographyStefanoCacciaguerraRobertKrenn,2004.3.2.ResearchDesignSecretscanbehiddeninsideallsortsofcoverinformation:text,images,audio,videoandmore.Moststeganographicutilitiesnowadays,hideinformationinside第6页images,asthisisrelativelyeasytoimplementChristianCachin,1998.HidinginformationinsideimagesisapopulartechniquenowadaysShashikalaChannalli,2009.AnimagewithasecretmessageinsidecaneasilybespreadovertheWorldWideWeborinnewsgroups.Themostcommonmethodstomakealterationsintheimagepresentinnoisyareainvolvetheusageoftheleast-significantbitorLSB,masking,filteringandtransformationsonthecoverimage.Thesetechniquescanbeusedwithvaryingdegreesofsuccessondifferenttypesofimagefiles.3.3.FindingMoretechniquesaredevelopedforhidingtheinformationtodetecttheuseofsteganography.Whiletheinformationcanbehiddeninsidetextsinawaythatthemessagecanonlybedetectedwiththeknowledgeofthesecretkey.Awidelyusedtechniqueforimagescanninginvolvesstatisticalanalysis,withthestatisticalanalysisonthelsb,thedifferencebetweenrandomvaluesrealimagevaluecaneasilybedetected.Thestatisticalanalysismethodcanbeusedagainsttheaudiofilestoo,sincethelsbmodificationtechniquecanbeusedonsoundstoo,includingthatseveralotherthingsalsodetected.Whilesteganogramsmaynotbesuccessfullydetectedinsteadofthatweusethestatisticalanalysisfrompossiblecoversources.3.4.ConclusionsandLimitationsSteganographycombinedwithcryptographyisapowerfultoolwhichenablespeopletocommunicatewithoutpossibleeavesdroppersevenknowsthatthereisacommunicationinthefirstplace.Steganographymightalsobecomelimitedlaws,sincegovernmentalreadyclaimedthatcriminalsusethesetechniquestocommunicate.Morerestrictionsareprovidedinthetimeofterroristattacks.3.5.ImplicationsInthefuturethemostimportantuseofsteganographictechniqueswillliein第7页thefieldofdigitalwatermarking.Contentprovidersareeagertoprotecttheircopyrightedworksagainstillegaldistributionanddigitalwatermarksprovideawayoftrackingtheownersofthesematerials.Althoughitwillnotpreventthedistributionitself,itwillenablethecontentprovidertostartlegalactionsagainsttheviolatorsofthecopyrights,astheycannowbetrackeddown.IV.HIDINGENCRYPTEDMESSAGEINTHEFEATURESOFIMAGES4.1.ProblemFormulationSteganographyistheartandscienceofwritinghiddenmessagesinsuchawaythatnoonecantknowabouttheintendedrecipientknowstheexistenceofthemessage.ItsimplytakesonepieceofinformationandhidesitwithanotherKh.ManglemSinghetal.,2007.4.2.ResearchDesignThisprocessexplainstheleastsignificantbitembeddingalgorithmforhidingencryptedmessagesinnonadjacentandrandompixellocationsinedgesofimages.Itfirstencryptsthesecretmessageanddetectsimageinthecoverimage.Thesimplestwaytohidedataonanimageistoreplacetheleastsignificantbitsofeachpixelsequentiallyinthescanlinesacrosstheimageinrawimageformatwiththebinarydata.Anattackercaneasilyseethemessagebyrepeatingtheprocess.Toavoidthistoaddbettersecurity,themessagetobehiddenisfirstencryptedusingthesimplifieddataencryptionstandardandthenitisdistributedrandomlybyapseudorandomnumbergeneratoracrosstheimage.4.3.FindingManyalgorithmsareusedtoestimatethelengthofthesecretmessageinthecoverimage.Heretheyproposetheblindsteganalysisbasedonstatisticalanalysisofpairsofvalues.Thismethodiscalledstatisticaltest.Theyproposethedetectionalgorithmbasedonhigherorderstatisticsforseparatingoriginalimagesfromstegoimages.第8页Blinddetectionalgorithmthatestimatestheaccuracyofembeddedmessagethroughtheanalysisofthevariationoftheenergyresultantfromthelsbembedding.4.4.ConclusionsandLimitationsThepaperdescribedanovelmethodforembeddingsecretmessagebitinleastsignificantbitofnonadjacentandrandompixellocationsinedgesofimages.Nooriginalcoverimageisrequiredfortheextractionofthesecretmessage.IthasbeenshownexperimentallythattheblindLSBdetectiontechniquelikethegradientenergymethodcouldnotestimatethelengthofthesecretmessagebitsaccuratelyfortheproposedalgorithm.4.5.ImplicationsThemessagetobehiddenintheimagewasfirstencryptedusingtheS-DESalgorithm.Thenestimatethelengthofthesecretmessagebitsbythegradientenergytechnique.Gradientenergytechniquecouldnotestimatethelengthofthesecretmessagebitaccurately.4.6.AdvantagesAmessageinciphertext,forinstance,mightarousesuspiciononthepartoftherecipientwhilean“invisible”messagecreatedwithsteganographicmethodswillnot.Watermarkingiseither“visible”or“invisible”.Althoughvisibleandinvisiblearevisualtermswatermarkingisnotlimitedtoimages,itcanalsobeusedtoprotectothertypesofmultimediaobject.Insteganographiccommunicationsendersandreceiversagreeonasteganographicsystemandasharedsecretkeythatdetermineshowamessageisencodedinthecovermedium.Withoutthekeytheycantidentifythesecretmessage.InsteganographicsystemstheimagesweusedforhidingmaybeJPEGformatseemmoreinterestingbecausethesystemsoperateinatransformspaceandarenotaffectedbyvisualattacks.第9页4.7.DisadvantagesEncryptionprotectscontentsduringthetransmissionofthedatafromthesendertoreceiver.However,afterreceiptandsubsequentdecryption,thedataisnolongerprotected.Byusingthesecretkeywearedeliverthesecretmessagesaferatthesametimeifanyhackerfindsthekeythentheycaneasilygetthesecretmessage.Visualattacksmeanthatyoucanseesteganographicmessagesonthelowbitplanesofanimagebecausetheyoverwritevisualstructures;thisusuallyhappensinBMPimages.V.PROPOSEDSYSTEMSteganographyisusedtohidetheinformationintheformofmultimediaobjectsconsideringtwothingsthatissizeanddegreeofsecurity.Thisconceptassiststhescatteringofinformationatthetimeofhidingandimplementsthenontraceablerandomizationtodifferentiatefromtheexistingwork.Doubleembeddingisdoneformoresecurity.5.1.AdvantagesSteganographyistheconceptofhiddenmessagesinsuchawaythatnooneapartfromtheintendedrecipientknowsoftheexistenceofthemessage.Heredoubleembeddingtakesplace.Soitissafer.Itdoesnthaveanykeytodecrypttheimage.Sothehackerhasnochancetogetthemessageinthisway.Thisconceptdealsthattheeavesdropperswillnothaveanysuspicionthatmessagebitsarehiddenintheimageandstandardsteganographydetectionmethodscannotestimatethelengthofthesecretmessagecorrectly.Withsteganographywecansendmessageswithoutanyonehavingknowledgeoftheexistenceofthecommunication.Therearemanycountrieswhereitisnotpossibletospeakasfreelyasitisinsomemoredemocraticcountries.Thenitistheeasymethodtosendnewsandinformationwithoutbeingcensoredandwithoutthefearofthemessagesbeing第10页interrupted.5.2.DisadvantagesThisconceptisappliedonlyforimagesnotforaudioandvideofiles.Thereceivermustknowabouttheleastsignificantbittechnique.VI.CONCLUSIONHereweconcludethatwepreventthedetectionofhiddeninformationbyusingsteganographyconceptandproposeaTheSIJTransactionsonComputerScienceEngineering&itsApplications(CSEA),Vol.1,No.1,March-April2013ISSN:232123812013|PublishedbyTheStandardInternationalJournals(TheSIJ)5secureschemeforimagetransformation.HereweuseleastsignificantBitmodificationtechniquetoinserttheimageintoanotherimageforhiddenpurpose.Imageishiddenintoanotherimageisthetechniqueweintroducedinourpaper.Inothersecuritymechanismsthestrangerscaneasilystolethemessagefromtheimagebyrepeatingtheprocess.Butinourtechniquewithoutthestegokeywecantextractthemessagefromtheimage.Thistechniquefacilitatesthescatteringofinformationatthetimeofhiding;thisisnewmethodweproposedinourpaper.VII.FUTUREENHANCEMENTApartfromthis,anykindoffutureendeavorinthisfieldwilldefinitelyrouteitapathtodesignasecuresystemusingtheproposedalgorithmforbothInternetandMobileCommunicationTechnology.Thescatteringofinformationtechniqueisusedatthetimeofhidingisusefulformanynewspapersbasedonsteganography.Developmentincovertcommunicationsandsteganographywillresearchinbuildingmorerobustdigitalwatermarksthatcansurviveimagemanipulationandattacks.Wehopesomecommercialandeffectiveschemeswillbeavailableinfuture.Inthenearfuture,themostimportantuseofsteganographictechniqueswillprobablylieinthefieldofdigitalwatermarking.Contentprovidersareeagertoprotecttheircopyrightedworksagainstillegaldistributionanddigitalwatermarksprovideawayoftrackingtheownersofthesematerials.InfuturewecanusethispaperintheGovernment,SoftwareCompany,Detectiveagenciesetc.第11页Thesamestepisinvolvedtoembedtheinformationandsendtoparticularuser.REFERENCES1N.F.Johnson&S.Jajodia(1998),“ExploringSteganography:SeeingtheUnseenComputer”,Vol.31,No.2,Pp.2634.2RichardPopa(1998),“AnAnalysisofSteganographicTechniques”,Pp.117.3ChristianCachin(1998),“AnInformation-TheoreticModelforSteganography”,InformationHiding,LectureNotesinComputerScience,Vol.1525,Pp306-318.4FabienA.P.Petitcolas,RossJ.Anderson&MarkusG.Kuhn(1999),“InformationHidingASurvey”,ProceedingsoftheIEEE,SpecialIssueonProtectionofMultimediaContent,Vol.87,No.7,Pp.10621078.5A.Westfeld(2001),“F5-ASteganographicAlgorithm:HighCapacityDespiteBetterSteganalysis”,Proceedingsof4thInternationalWorkshopInformationHiding,Pp.289302.6SarajuP.Mohant(2003),“DigitalWatermarking:ATutorialReviewNielsProvos,PeterHoneyman,HideandSeek:IntroductiontoSteganography”.7MuhalimMohamedAmin,SubariahIbrahim,MazleenaSalleh&MohdRoziKatmin(2003),“InformationHidingusingSteganography”,InformationHidingusingSteganographyApproach,Vol.71847,Pp.134.8StefanoCacciaguerra&StefanoFerretti(2003),“DataHiding:StegnographyandCopyrightMarking”,DepartmentofComputerScience,UniversityofBologna,Italy,Pp.130.9RobertKrenn(2004),“SteganographyandSteganalysis”.10SabuMThampi(2004),“InformationHidingTechniques:ATutorialReview”,ISTE-STTPonNetworkSecurity&Cryptography,LBSCE2004.11T.Morkel,JHPEloff&MSOlivier(2005),“AnOverviewofImageSteganography”,ProceedingsoftheFifthAnnualInformationSecuritySouthAfricaConference(ISSA2005),Sandton,SouthAfrica.12NameerN.EL-Emam(2007),“HidingaLargeAmountofDatawithHighSecurityusingSteganography”,AlgorithmJournalofComputerScience,Vol.3,No.4,Pp.223232.13Kh.ManglemSingh,S.BirendraSingh&L.ShyamSundarSingh(2007),“HidingEncryptedMessageintheFeaturesofImages”,InternationalJournalofComputerScienceandNetworkSecurity(IJCSNS),Vol.7,No.4.14H.B.Kekre,ArchanaAthawale&PallaviN.Halarnkar(2008),“IncreasedCapacityofInformationHidinginLSBsMethodforTextandImage”,WorldAcademyofScience,EngineeringandTechnology,Pp.910913.15ShashikalaChannalli(2009),“Steganography:AnArtofHidingData”,InternationalJournalonComputerScienceandEngineering,Vol.1,No.3,Pp137141.16BinLi,JunhuiHe,JiwuHuang,YunQingShi(2011),“ASurveyonImageSteganographyandSteganalysis”,JournalofInformationHidingandMultimediaSignalProcessing,Vol.2,No.2,Pp.142171.D.SaravanancurrentlyworkingasanAssistantProfessorinthedepartmentofcomputerapplicationsinSathaybamaUniversity,Chennai.Hisareasofinterestareimageprocessing,datamining,DBMS.Hehaspublishedpaperinfivenationalconferences&twointernationaljournalsinthefieldofdatamining.A.RonoldDoniworkingasanAssistantProfessorinthedepartmentofcomputerapplicationsinSathaybamaUniversity,Chennai.Hisareasofinterestareimageprocessing,datamining,DBMS.Hehaspublishedpaperinthreenationalconferences&oneinternationaljournalinthe
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 伊核协议书有几国
- 2025年生物医学工程血糖监测仪器原理测评答案及解析
- 2025年急诊医学抢救流程考核答案及解析
- 2025年传染病防控策略应用测试答案及解析
- 2025年肿瘤科肿瘤临床病例讨论模拟试题答案及解析
- 孩子18岁后离婚协议书
- 2025年马鞍山当涂县公开引进中小学教师65人考前自测高频考点模拟试题(含答案详解)
- 2025年泌尿外科常见病例处理模拟测试卷答案及解析
- 2025年智能农业行业智能农业生产模式创新研究报告
- 2025年急诊医学心源性休克抢救技能考核答案及解析
- DL-T5024-2020电力工程地基处理技术规程
- PICC堵管原因与再通方法
- 初中数学分层作业设计举例-有理数
- 给小学生科普化学
- 驾照体检表完整版本
- 磁保持继电器基础知识课件
- 安全生产区域管理办法范本
- 2023-2024学年辽宁省沈阳市郊联体高二上学期10月月考物理试题(解析版)
- 设备保管协议
- 中石油职称英语通用教材
- 焊接质量手册
评论
0/150
提交评论