Open Access Open Access  Restricted Access Subscription or Fee Access

Executable File Hiding: An LSBMR Perspective

P. Mohan Kumar, Dr.K.L. Shunmuganathan

Abstract


Steganography is the approach for hiding any secret message in a variety of multimedia carriers like images, audio or video files. Whenever we are hiding a data, it is very important to make it invisible, so that it could be protected. A number of steganographic algorithms have been proposed based on this property of a steganographic system. This paper concentrates on integrating Tri way pixel value differencing approach and LSB matching revisited. The secret data embedded in images were images, text and audio signals so far. The proposed scheme has also come with the executable file as secret data. Also, the experimentation results show that, the important properties of a steganographic system such as imperceptibility, capacity of the carrier image and also resistance against the various steganalytic tools have also been achieved with this stego-system.

Keywords


Spatial Domain, Executable File, TPVD, LSBMR, Steganalysis.

Full Text:

PDF

References


N. Provos and P. Honeyman, ―Hide and seek: An introduction to steganography,‖ IEEE security and Privacy Mag., vol. 1, no. 3, pp. 32–44, 2003.

J. Fridrich, ―Applications of Data Hiding in Digital Images,‖ Tutorial for the ISSPA, pp. 22-25, Aug. 1999

F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, ―Information hiding—A survey,‖ Proc. IEEE, vol. 87, no. 7, pp. 1062–1078, Jul.1999.

W. Bender, D. Gruhl, N. Morimoto, and A. Lu, ―Techniques for data hiding,‖ IBM Syst. J., vol. 35, no. 3–4, pp. 313–336, 1996.

M. Swanson, M. Kobayashi, and A. Tewfik, ―Multimedia data embedding and watermarking technologies,‖ IEEE Proceedings, vol. 86, No. 6, pp 1064-1087, June 1998.

I. Cox, J. Kilian, T. Leighton, and T. Shamoon, ―Secure spread spectrum watermarking for multimedia,‖ Proc. First Int. Workshop Information Hiding, R. Anderson, Ed., Cambridge, U. K.: Springer-Verlag, May/June 1996, pp. 183-206.

I.J. Cox, M.L. Miller, and J.A. Bloom, Digital Watermarking. Morgan Kaufmann, 2002.

Tomáˇs Pevný and Jessica Fridrich, Multiclass Detector of Current Steganographic Methods for JPEG Format, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 3, NO. 4, DECEMBER 2008, 635-650.

G. Simmons,‖ The prisoner’s problem and the subliminal channel, CRYPTO, pp: 51-67, 1983.

J. Zollner, H. Federrath, ―Modelling the security of steganographic systems‖, 2nd information hiding workshop, pp: 345-355, 1998.

N.J. Hopper, J. Langford, L. Von Ahn, ―Provably secure steganography‖, Advances in cryptology: CRYPTO 2002.

A high capacity Steganography scheme for JPEG 2000 Baseline system, Liang Zhang, Haili wang, Renbiao Wu, IEEE transactions on image processing, 18(8), 2009.

T. Morkel 1, J.H.P. Eloff 2, M.S. Olivier , AN OVERVIEW OF IMAGE STEGANOGRAPHY http://mo.co.za/open/stegoverview.pdf

Johnson, N.F. & Jajodia, S., ―Steganalysis of Images Created Using Current Steganography Software‖,Proceedings of the 2nd Information Hiding Workshop, April 1998

F. Huang, B. Li, and J. Huang, ―Attack LSB matching steganography by counting alteration rate of the number of neighbourhood gray levels,‖ in Proc. IEEE Int. Conf. Image Processing, Oct. 16–19, 2007, vol. 1, pp. 401–404.

J. Harmsen and W. Pearlman, ―Steganalysis of additive-noise modelable information hiding,‖ Proc. SPIE Electronic Imaging, vol. 5020, pp. 131–142, 2003.

A. D. Ker, ―Steganalysis of LSB matching in grayscale images,‖ IEEE Signal Process. Lett., vol. 12, no. 6, pp. 441–444, Jun. 2005.

J. Mielikainen, ―LSB matching revisited,‖ IEEE Signal Process. Lett., vol. 13, no. 5, pp. 285–287, May 2006.

K. Hempstalk, ―Hiding behind corners: Using edges in images for better steganography,‖ in Proc. Computing Women’s Congress, Hamilton, New Zealand, 2006.

D. Wu and W. Tsai, ―A steganographic method for images by pixelvalue differencing,‖ Pattern Recognit. Lett., vol. 24, pp. 1613–1626, 2003.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.