已阅读5页,还剩14页未读, 继续免费阅读
版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
第1页外文文献资料ImageInformationHiding:AnSurveyI.INTRODUCTIONNowadaysmanyproblemsariseduringtheimagetransformationfromthesendertothereceiver.Strangerscaneasilysnoopintoothersaccountandgetmanysecretinformationevenitwashidedbysomemechanism,withouttheirpermission.Toavoidthisweproposeasecureschemebyusingsteganographyconcept.Steganographymeanshidinginformationinaparticularwaythatpreventsthedetectionofhiddeninformation.Inthisconceptnoonecanfindthatthereisahiddenmessagepresentintheimage,Becauseofinformationishiddenbehindanimageinamatrixform,whichiscreatedbybitmatrixoftheobject.ByusingtheLSBwecanstorethecharacteristicsofparticularpixelsofanimagearemodifiedtostoreamessage.FinallywesendthefinalpictureandcoverimageusedforhiddentheimagetothereceiverJohnson&Jajodia,1998.Atfirstwecalculatetheheightandwidthoftheimage,whichhidetheinformationthenmultiplyitwith8andstoreitinanyvalue.Thenwecalculatetheheightandwidthoftheimagewhichisusedtohidetheobjectandmultiplywitheachother.Thenwecomparethatanswerswithboththeimagewhichisusedtohidetheinformationandwhichisusedtohidetheobject.Theimagewhichisusedtohidetheobjectmusthavegreatervaluethantheotherimage;wechoosetheobjectmustsatisfytheabovecondition.Thentheencodedmatrixismappedwiththeimagebyusingleastsignificantbitmechanism.Leastsignificantbitonlystorestheinformationinsteadofreplacingthepixelofimage.Soscatteringofinformationtakesplacewhiletransferringtheimagesoaccordingtohumaneyethereisnodifferencebetweentheoriginalandstegoimage.Finallysendersendsthebothoriginalandstegoimagetothereceiver.InthereceiversidetogettheinformationthereceivermustdoXORoperationbetweenbytespresentinboththeimage.Comparetheresultwith0*00000000Iftheoutputwillbeyesthenstore0else1inamatrixandthismatrixwillbeequalto第2页thewidthandheightofthepixelmatrixoftheimage.Convertthebitsintobytesuntilallbitsgotutilized.Finallyreceivergetstheinformation.1.1.HistoryofInformationHiding1.2.TheBasicsofEmbeddingThreedifferentaspectsininformation-hidingsystemscontendwitheachother:capacity,security,androbustness.Capacityreferstotheamountofinformationthatcanbehiddeninthecovermedium,securitytoaneavesdroppersinabilitytodetecthiddeninformation,androbustnesstotheamountofmodificationthestegomediumcanwithstandbeforeanadversarycandestroyhiddeninformationFabienA.P.Petitcolasetal.,1999;SabuMThampi,2004;NameerN.EL-Emam,2007.1.3.DiscreteCosineTransformForeachcolorcomponent,theJPEGimageformatusesaDiscreteCosineTransform(DCT)totransformsuccessive88pixelblocksoftheimageinto64DCTcoefficientseach.TheDCTcoefficientsF(u,v)ofan88blockofimagepixelsf(x,y).Asimplepseudo-codealgorithmtohideamessageinsideaJPEGimagecouldlooklikethis:Input:message,coverimageOutput:steganographicimagecontainingmessageWhiledatalefttoembeddoGetnextDCTcoefficientfromcoverimageIfDCT=!0andDCT=!1thenGetnextLSBfrommessageReplaceDCTLSBwithmessagebit第3页EndifInsertDCTintosteganographicimageEndwhile1.4.DetectionTechniquesManyalgorithmswereproposedforestimatingthelengthofthesecretmessageinthecoverimage.Westfeld(2001)proposedtheblindsteganalysisbasedonstatisticalanalysisofPoVs(pairsofvalues).Thismethod,so-calledstatisticaltest,givesasuccessfulresulttoasequentialLSBsteganographyonly.FposedtheRSsteganalysis.ThismethodmakessmallalternationstotheleastsignificancebitplaneinanimagethebyusingthefollowingmethodourprocessKekreetal.,2008;BinLietal.,2011.1.5.SecuritythePacketDecoderThedecodeengineisorganizedaroundthelayersoftheprotocolstackpresentinthesupporteddata-linkandTCP/IPprotocoldefinitions.Eachsubroutineinthedecoderimposesorderonthepacketdatabyoverlayingdatastructuresontherawnetworktraffic.Thesedecodingroutinesarecalledinorderthroughtheprotocolstack,fromthedatalinklayerupthroughthetransportlayer,finallyendingattheapplicationlayer.Speedishighlightinthissection,andthemajorityofthefunctionalityofthedecoderconsistsofsettingpointersintothepacketdataforlateranalysisbythedetectionengineRichardPopa,1998.1.6.InternetProtocolVersionInternetProtocolversion6(IPv6)isanetworklayerIPstandardusedbyelectronicdevicestoexchangedataacrossapacket-switchedinternetwork.ItfollowsIPv4asthesecondversionoftheInternetProtocoltobeformallyadoptedforgeneraluse.AmongtheimprovementsbroughtbyIPv6istheincreaseofaddressesfornetworkeddevices,allowing,forexample,eachcellphoneandmobileelectronicdevicetohaveitsownaddress.IPv4supports4.3109(4.3billion)addresses,whichisinadequateforgivingevenoneaddresstoeverylivingperson,muchlesssupporttheburgeoningmarketforconnectivedevices.IPv6supports3.41038addresses,or51028(50octillion)foreachoftheroughly6.5第4页billionpeoplealivetoday.Normallythepacketsaretransferredfromonesystemtoanotherinpackets.Thepacketsaretransferredthroughthetcpconnectioninamoresecureway.II.HIDEANDSEEK:ANINTRODUCTIONTOSTEGANOGRAPHY2.1.ProblemFormulationInthepast,forthesecuritypurposepeopleusedhiddentattoosorinvisibleinktoconveysteganographiccontent.Todayforhidingpurposecomputerandnetworktechnologiesprovideeasy-to-usecommunicationchannelsforsteganographySarajuP.Mohant,2003;MuhalimMohamedAminetal.,2003.Steganographicsystembecauseoftheirinvasivenature,leavethedetectabletracesinthecovermedium.Thesecretcontentisnotrevealed,butitsstatisticalpropertieschangedsothethirdpartycandetectthedistortionsintheresultingimageMorkeletal.,2005.Theprocessoffindingthedistortionsiscalledstatisticalsteganalysis.2.2.ResearchDesignThispaperexplainsthesteganagraphicsystemsandpresentstherecentresearchindetectingthemthroughstatisticalsteganalysis.SteganographicsystemsfortheJPEGformatseemmoreinteresting,becausethesystemsoperateinatransformspaceandarenotaffectedmyvisualattacks.Visualattacksmeanthatwecanseesteganographicimagesonthelowbitplanesofanimagebecausetheyoverwritethevisualstructures.2.3.FindingTheJPEGimageformatusesadiscretecosinetransformtotransformsuccessive8*8pixelblocksoftheimageinto64DCTcoefficientseach.TheSIJTransactionsonComputerScienceEngineering&itsApplications(CSEA),Vol.1,No.1,March-April2013ISSN:232123812013|PublishedbyTheStandardInternationalJournals(TheSIJ)3TheembeddingalgorithmsequentiallyreplacestheleastsignificantbitofDCTcoefficientswiththemessagedata.ThesameprocessisalsodoneintheJPEGformat.第5页Theauthorandhiscolleagueusedasupportvectormachinetocreateanonlineardiscriminationfunction.Thentheypresentalesssophisticatedbuteasiertounderstandmethodfordeterminingalineardiscriminationfunction.2.4.ConclusionandLimitationsWeofferfourdetailsforourinabilitytofindsteganographiccontentontheinternet.Theyare,Allsteganographicsystemuserscarefullychoosepasswordsthatarenotsusceptibletodictionaryattacks.Maybeimagesfromsourceswedidnotanalyzecarrysteganographiccontent.Nobodyusessteganographicsystemsthatwecouldfind.Allmessagesaretoosmallforouranalysistodetect.Althoughsteganographyisapplicabletoalldataobjectsthatcontainredundancy,weconsiderJPEGimagesonlyforsteganography.2.5.ImplicationsWeinsertthetracerimagesintoeverystegbreakjob.Thedictionaryattackfollowsthecorrectpasswordsfortheseimages.III.STEGANOGRAPHYANDSTEGANALYSIS3.1.ProblemFormulationThegrowthofcomputernetworksandinternethasexploredmeansofbusiness,scientific,entertainment,andsocialopportunities.ThedigitalinformationcanbeeasilyduplicatedanddistributedhasledtotheneedforeffectivecopyrightprotectiontoolssuchassteganographyandcryptographyStefanoCacciaguerraRobertKrenn,2004.3.2.ResearchDesignSecretscanbehiddeninsideallsortsofcoverinformation:text,images,audio,videoandmore.Moststeganographicutilitiesnowadays,hideinformationinside第6页images,asthisisrelativelyeasytoimplementChristianCachin,1998.HidinginformationinsideimagesisapopulartechniquenowadaysShashikalaChannalli,2009.AnimagewithasecretmessageinsidecaneasilybespreadovertheWorldWideWeborinnewsgroups.Themostcommonmethodstomakealterationsintheimagepresentinnoisyareainvolvetheusageoftheleast-significantbitorLSB,masking,filteringandtransformationsonthecoverimage.Thesetechniquescanbeusedwithvaryingdegreesofsuccessondifferenttypesofimagefiles.3.3.FindingMoretechniquesaredevelopedforhidingtheinformationtodetecttheuseofsteganography.Whiletheinformationcanbehiddeninsidetextsinawaythatthemessagecanonlybedetectedwiththeknowledgeofthesecretkey.Awidelyusedtechniqueforimagescanninginvolvesstatisticalanalysis,withthestatisticalanalysisonthelsb,thedifferencebetweenrandomvaluesrealimagevaluecaneasilybedetected.Thestatisticalanalysismethodcanbeusedagainsttheaudiofilestoo,sincethelsbmodificationtechniquecanbeusedonsoundstoo,includingthatseveralotherthingsalsodetected.Whilesteganogramsmaynotbesuccessfullydetectedinsteadofthatweusethestatisticalanalysisfrompossiblecoversources.3.4.ConclusionsandLimitationsSteganographycombinedwithcryptographyisapowerfultoolwhichenablespeopletocommunicatewithoutpossibleeavesdroppersevenknowsthatthereisacommunicationinthefirstplace.Steganographymightalsobecomelimitedlaws,sincegovernmentalreadyclaimedthatcriminalsusethesetechniquestocommunicate.Morerestrictionsareprovidedinthetimeofterroristattacks.3.5.ImplicationsInthefuturethemostimportantuseofsteganographictechniqueswillliein第7页thefieldofdigitalwatermarking.Contentprovidersareeagertoprotecttheircopyrightedworksagainstillegaldistributionanddigitalwatermarksprovideawayoftrackingtheownersofthesematerials.Althoughitwillnotpreventthedistributionitself,itwillenablethecontentprovidertostartlegalactionsagainsttheviolatorsofthecopyrights,astheycannowbetrackeddown.IV.HIDINGENCRYPTEDMESSAGEINTHEFEATURESOFIMAGES4.1.ProblemFormulationSteganographyistheartandscienceofwritinghiddenmessagesinsuchawaythatnoonecantknowabouttheintendedrecipientknowstheexistenceofthemessage.ItsimplytakesonepieceofinformationandhidesitwithanotherKh.ManglemSinghetal.,2007.4.2.ResearchDesignThisprocessexplainstheleastsignificantbitembeddingalgorithmforhidingencryptedmessagesinnonadjacentandrandompixellocationsinedgesofimages.Itfirstencryptsthesecretmessageanddetectsimageinthecoverimage.Thesimplestwaytohidedataonanimageistoreplacetheleastsignificantbitsofeachpixelsequentiallyinthescanlinesacrosstheimageinrawimageformatwiththebinarydata.Anattackercaneasilyseethemessagebyrepeatingtheprocess.Toavoidthistoaddbettersecurity,themessagetobehiddenisfirstencryptedusingthesimplifieddataencryptionstandardandthenitisdistributedrandomlybyapseudorandomnumbergeneratoracrosstheimage.4.3.FindingManyalgorithmsareusedtoestimatethelengthofthesecretmessageinthecoverimage.Heretheyproposetheblindsteganalysisbasedonstatisticalanalysisofpairsofvalues.Thismethodiscalledstatisticaltest.Theyproposethedetectionalgorithmbasedonhigherorderstatisticsforseparatingoriginalimagesfromstegoimages.第8页Blinddetectionalgorithmthatestimatestheaccuracyofembeddedmessagethroughtheanalysisofthevariationoftheenergyresultantfromthelsbembedding.4.4.ConclusionsandLimitationsThepaperdescribedanovelmethodforembeddingsecretmessagebitinleastsignificantbitofnonadjacentandrandompixellocationsinedgesofimages.Nooriginalcoverimageisrequiredfortheextractionofthesecretmessage.IthasbeenshownexperimentallythattheblindLSBdetectiontechniquelikethegradientenergymethodcouldnotestimatethelengthofthesecretmessagebitsaccuratelyfortheproposedalgorithm.4.5.ImplicationsThemessagetobehiddenintheimagewasfirstencryptedusingtheS-DESalgorithm.Thenestimatethelengthofthesecretmessagebitsbythegradientenergytechnique.Gradientenergytechniquecouldnotestimatethelengthofthesecretmessagebitaccurately.4.6.AdvantagesAmessageinciphertext,forinstance,mightarousesuspiciononthepartoftherecipientwhilean“invisible”messagecreatedwithsteganographicmethodswillnot.Watermarkingiseither“visible”or“invisible”.Althoughvisibleandinvisiblearevisualtermswatermarkingisnotlimitedtoimages,itcanalsobeusedtoprotectothertypesofmultimediaobject.Insteganographiccommunicationsendersandreceiversagreeonasteganographicsystemandasharedsecretkeythatdetermineshowamessageisencodedinthecovermedium.Withoutthekeytheycantidentifythesecretmessage.InsteganographicsystemstheimagesweusedforhidingmaybeJPEGformatseemmoreinterestingbecausethesystemsoperateinatransformspaceandarenotaffectedbyvisualattacks.第9页4.7.DisadvantagesEncryptionprotectscontentsduringthetransmissionofthedatafromthesendertoreceiver.However,afterreceiptandsubsequentdecryption,thedataisnolongerprotected.Byusingthesecretkeywearedeliverthesecretmessagesaferatthesametimeifanyhackerfindsthekeythentheycaneasilygetthesecretmessage.Visualattacksmeanthatyoucanseesteganographicmessagesonthelowbitplanesofanimagebecausetheyoverwritevisualstructures;thisusuallyhappensinBMPimages.V.PROPOSEDSYSTEMSteganographyisusedtohidetheinformationintheformofmultimediaobjectsconsideringtwothingsthatissizeanddegreeofsecurity.Thisconceptassiststhescatteringofinformationatthetimeofhidingandimplementsthenontraceablerandomizationtodifferentiatefromtheexistingwork.Doubleembeddingisdoneformoresecurity.5.1.AdvantagesSteganographyistheconceptofhiddenmessagesinsuchawaythatnooneapartfromtheintendedrecipientknowsoftheexistenceofthemessage.Heredoubleembeddingtakesplace.Soitissafer.Itdoesnthaveanykeytodecrypttheimage.Sothehackerhasnochancetogetthemessageinthisway.Thisconceptdealsthattheeavesdropperswillnothaveanysuspicionthatmessagebitsarehiddenintheimageandstandardsteganographydetectionmethodscannotestimatethelengthofthesecretmessagecorrectly.Withsteganographywecansendmessageswithoutanyonehavingknowledgeoftheexistenceofthecommunication.Therearemanycountrieswhereitisnotpossibletospeakasfreelyasitisinsomemoredemocraticcountries.Thenitistheeasymethodtosendnewsandinformationwithoutbeingcensoredandwithoutthefearofthemessagesbeing第10页interrupted.5.2.DisadvantagesThisconceptisappliedonlyforimagesnotforaudioandvideofiles.Thereceivermustknowabouttheleastsignificantbittechnique.VI.CONCLUSIONHereweconcludethatwepreventthedetectionofhiddeninformationbyusingsteganographyconceptandproposeaTheSIJTransactionsonComputerScienceEngineering&itsApplications(CSEA),Vol.1,No.1,March-April2013ISSN:232123812013|PublishedbyTheStandardInternationalJournals(TheSIJ)5secureschemeforimagetransformation.HereweuseleastsignificantBitmodificationtechniquetoinserttheimageintoanotherimageforhiddenpurpose.Imageishiddenintoanotherimageisthetechniqueweintroducedinourpaper.Inothersecuritymechanismsthestrangerscaneasilystolethemessagefromtheimagebyrepeatingtheprocess.Butinourtechniquewithoutthestegokeywecantextractthemessagefromtheimage.Thistechniquefacilitatesthescatteringofinformationatthetimeofhiding;thisisnewmethodweproposedinourpaper.VII.FUTUREENHANCEMENTApartfromthis,anykindoffutureendeavorinthisfieldwilldefinitelyrouteitapathtodesignasecuresystemusingtheproposedalgorithmforbothInternetandMobileCommunicationTechnology.Thescatteringofinformationtechniqueisusedatthetimeofhidingisusefulformanynewspapersbasedonsteganography.Developmentincovertcommunicationsandsteganographywillresearchinbuildingmorerobustdigitalwatermarksthatcansurviveimagemanipulationandattacks.Wehopesomecommercialandeffectiveschemeswillbeavailableinfuture.Inthenearfuture,themostimportantuseofsteganographictechniqueswillprobablylieinthefieldofdigitalwatermarking.Contentprovidersareeagertoprotecttheircopyrightedworksagainstillegaldistributionanddigitalwatermarksprovideawayoftrackingtheownersofthesematerials.InfuturewecanusethispaperintheGovernment,SoftwareCompany,Detectiveagenciesetc.第11页Thesamestepisinvolvedtoembedtheinformationandsendtoparticularuser.REFERENCES1N.F.Johnson&S.Jajodia(1998),“ExploringSteganography:SeeingtheUnseenComputer”,Vol.31,No.2,Pp.2634.2RichardPopa(1998),“AnAnalysisofSteganographicTechniques”,Pp.117.3ChristianCachin(1998),“AnInformation-TheoreticModelforSteganography”,InformationHiding,LectureNotesinComputerScience,Vol.1525,Pp306-318.4FabienA.P.Petitcolas,RossJ.Anderson&MarkusG.Kuhn(1999),“InformationHidingASurvey”,ProceedingsoftheIEEE,SpecialIssueonProtectionofMultimediaContent,Vol.87,No.7,Pp.10621078.5A.Westfeld(2001),“F5-ASteganographicAlgorithm:HighCapacityDespiteBetterSteganalysis”,Proceedingsof4thInternationalWorkshopInformationHiding,Pp.289302.6SarajuP.Mohant(2003),“DigitalWatermarking:ATutorialReviewNielsProvos,PeterHoneyman,HideandSeek:IntroductiontoSteganography”.7MuhalimMohamedAmin,SubariahIbrahim,MazleenaSalleh&MohdRoziKatmin(2003),“InformationHidingusingSteganography”,InformationHidingusingSteganographyApproach,Vol.71847,Pp.134.8StefanoCacciaguerra&StefanoFerretti(2003),“DataHiding:StegnographyandCopyrightMarking”,DepartmentofComputerScience,UniversityofBologna,Italy,Pp.130.9RobertKrenn(2004),“SteganographyandSteganalysis”.10SabuMThampi(2004),“InformationHidingTechniques:ATutorialReview”,ISTE-STTPonNetworkSecurity&Cryptography,LBSCE2004.11T.Morkel,JHPEloff&MSOlivier(2005),“AnOverviewofImageSteganography”,ProceedingsoftheFifthAnnualInformationSecuritySouthAfricaConference(ISSA2005),Sandton,SouthAfrica.12NameerN.EL-Emam(2007),“HidingaLargeAmountofDatawithHighSecurityusingSteganography”,AlgorithmJournalofComputerScience,Vol.3,No.4,Pp.223232.13Kh.ManglemSingh,S.BirendraSingh&L.ShyamSundarSingh(2007),“HidingEncryptedMessageintheFeaturesofImages”,InternationalJournalofComputerScienceandNetworkSecurity(IJCSNS),Vol.7,No.4.14H.B.Kekre,ArchanaAthawale&PallaviN.Halarnkar(2008),“IncreasedCapacityofInformationHidinginLSBsMethodforTextandImage”,WorldAcademyofScience,EngineeringandTechnology,Pp.910913.15ShashikalaChannalli(2009),“Steganography:AnArtofHidingData”,InternationalJournalonComputerScienceandEngineering,Vol.1,No.3,Pp137141.16BinLi,JunhuiHe,JiwuHuang,YunQingShi(2011),“ASurveyonImageSteganographyandSteganalysis”,JournalofInformationHidingandMultimediaSignalProcessing,Vol.2,No.2,Pp.142171.D.SaravanancurrentlyworkingasanAssistantProfessorinthedepartmentofcomputerapplicationsinSathaybamaUniversity,Chennai.Hisareasofinterestareimageprocessing,datamining,DBMS.Hehaspublishedpaperinfivenationalconferences&twointernationaljournalsinthefieldofdatamining.A.RonoldDoniworkingasanAssistantProfessorinthedepartmentofcomputerapplicationsinSathaybamaUniversity,Chennai.Hisareasofinterestareimageprocessing,datamining,DBMS.Hehaspublishedpaperinthreenationalconferences&oneinternationaljournalinthe
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 2025首都医科大学附属北京朝阳医院面向应届毕业生(含社会人员)招聘155人备考题库附答案解析
- 2025北京门头沟龙泉镇流动人口协管员招聘2人备考题库及答案详解(网校专用)
- 2025年阜阳阜南县柳沟镇招考村级后备干部8人备考题库附答案详解(预热题)
- 中石油2026校园招聘-2026年中石油秋招网站(公共基础知识)测试题带答案解析
- 2026年三门峡社会管理职业学院单招职业技能测试题库带答案解析
- 2025年惠州市直机关遴选公务员考试真题汇编带答案解析
- 2025福建漳州南靖县消防救援大队招聘政府专职消防员6人备考题库及答案详解(名校卷)
- 2024年黄山市直遴选笔试真题汇编带答案解析
- 2025四川雅安市人力资源和社会保障局考试招聘事业单位人员59人考试模拟卷带答案解析
- 2025河南周口市商水县招录警务助理人员体能测试考试模拟卷及答案解析(夺冠)
- 拖车救援合作合同范本
- 工业设计介绍
- 入团模拟考试题目及答案解析(2025版)
- 2025年农业综合行政执法理论考试题库(含答案)
- 安装门头施工方案怎么写
- 2023年-0036 楼宇自动化系统(BAS)
- 新人教版一年级上册数学测试试卷-第4单元综合检测卷(含答案)应用解答题试卷
- 冷库操作安全培训内容课件
- 《组织行为学》课件-第12章 组织文化
- 健康管理职业导论教学课件
- DB22∕T 3340-2022 关玉竹生产技术规程
评论
0/150
提交评论