Data Hiding Application

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 15 Experts worldwide ranked by ideXlab platform

Vinayak Morada - One of the best experts on this subject based on the ideXlab platform.

  • design of a Data Hiding Application using steganography april 2007
    2007
    Co-Authors: Armin Bahramshahry, Hesam Ghasemi, Anish Mitra, Vinayak Morada
    Abstract:

    This paper discusses the design of a Data Hiding Application using steganography. Steganography is the term used to describe the Hiding of Data in images to avoid detection by attackers. Steganalysis is the method used by attackers to determine if images have hidden Data and to recover that Data. The Application discussed in this paper ranks images in a users library based on their suitability as cover objects for some Data. By matching Data to an image, there is less chance of an attacker being able to use steganalysis to recover the Data. Before Hiding the Data in an image the Application first encrypts it. The Application was built to adhere to the secure system development principles of defense in depth, open design, and psychological acceptability. The authors believe that the steganography method proposed in this paper and illustrated by the Application is superior to that used by current steganography tools.

Armin Bahramshahry - One of the best experts on this subject based on the ideXlab platform.

  • design of a Data Hiding Application using steganography april 2007
    2007
    Co-Authors: Armin Bahramshahry, Hesam Ghasemi, Anish Mitra, Vinayak Morada
    Abstract:

    This paper discusses the design of a Data Hiding Application using steganography. Steganography is the term used to describe the Hiding of Data in images to avoid detection by attackers. Steganalysis is the method used by attackers to determine if images have hidden Data and to recover that Data. The Application discussed in this paper ranks images in a users library based on their suitability as cover objects for some Data. By matching Data to an image, there is less chance of an attacker being able to use steganalysis to recover the Data. Before Hiding the Data in an image the Application first encrypts it. The Application was built to adhere to the secure system development principles of defense in depth, open design, and psychological acceptability. The authors believe that the steganography method proposed in this paper and illustrated by the Application is superior to that used by current steganography tools.

Hesam Ghasemi - One of the best experts on this subject based on the ideXlab platform.

  • design of a Data Hiding Application using steganography april 2007
    2007
    Co-Authors: Armin Bahramshahry, Hesam Ghasemi, Anish Mitra, Vinayak Morada
    Abstract:

    This paper discusses the design of a Data Hiding Application using steganography. Steganography is the term used to describe the Hiding of Data in images to avoid detection by attackers. Steganalysis is the method used by attackers to determine if images have hidden Data and to recover that Data. The Application discussed in this paper ranks images in a users library based on their suitability as cover objects for some Data. By matching Data to an image, there is less chance of an attacker being able to use steganalysis to recover the Data. Before Hiding the Data in an image the Application first encrypts it. The Application was built to adhere to the secure system development principles of defense in depth, open design, and psychological acceptability. The authors believe that the steganography method proposed in this paper and illustrated by the Application is superior to that used by current steganography tools.

Anish Mitra - One of the best experts on this subject based on the ideXlab platform.

  • design of a Data Hiding Application using steganography april 2007
    2007
    Co-Authors: Armin Bahramshahry, Hesam Ghasemi, Anish Mitra, Vinayak Morada
    Abstract:

    This paper discusses the design of a Data Hiding Application using steganography. Steganography is the term used to describe the Hiding of Data in images to avoid detection by attackers. Steganalysis is the method used by attackers to determine if images have hidden Data and to recover that Data. The Application discussed in this paper ranks images in a users library based on their suitability as cover objects for some Data. By matching Data to an image, there is less chance of an attacker being able to use steganalysis to recover the Data. Before Hiding the Data in an image the Application first encrypts it. The Application was built to adhere to the secure system development principles of defense in depth, open design, and psychological acceptability. The authors believe that the steganography method proposed in this paper and illustrated by the Application is superior to that used by current steganography tools.

Ton Kalker - One of the best experts on this subject based on the ideXlab platform.

  • chapter 12 steganography
    Digital Watermarking and Steganography (Second Edition), 2008
    Co-Authors: Ingemar J Cox, Matthew L Miller, Jeffrey A Bloom, Jessica Fridrich, Ton Kalker
    Abstract:

    Publisher Summary This chapter focuses on a specific Data-Hiding Applicationsteganography. As opposed to digital watermarking, the main property of steganography is statistical undetectability of embedded Data. The payload is usually unrelated to the cover Work, which only serves as a decoy. The information-theoretic definition of steganographic security (Cachin's definition) is the most widely used definition in practice. It is usually applied in a simplified form by accepting a model for the cover Work. Secure steganographic schemes must take into account steganalytic methods. One possibility is to replace the embedding operation of LSB flipping (F5) to avoid introducing easily detectable artifacts. Another possibility is to mask the embedding distortion as a naturally occurring phenomenon, such as during image acquisition (stochastic modulation). Alternatively, one can design schemes that preserve some vital statistical characteristics of the cover image (OutGuess) or a model of the cover that is recoverable from the stego Work (model-based steganography). In a typical steganographic scheme, the placement of embedding changes (the selection rule) is shared between the sender and the recipient. However, there are many situations when this information cannot be shared, such as in adaptive steganography, selection rules determined from side information, or in public-key steganography. The problem of nonshared selection rules is equivalent to writing in memory with defective cells and can be efficiently approached using sparse linear codes, known as LT codes.