IJISA Vol. 9, No. 8, 8 Aug. 2017
Cover page and Table of Contents: PDF (size: 663KB)
Full Text (PDF, 663KB), PP.34-40
Views: 0 Downloads: 0
Multimedia Data Protection, Steganography
The proposed method of graphical data protection is a combined crypto-steganographic method. It is based on a bit values transformation according to both a certain Boolean function and a specific scheme of correspondence between MSB and LSB. The scheme of correspondence is considered as a secret key. The proposed method should be used for protection of large amounts of secret graphical data.
Zhengbing Hu, Ivan Dychka, Yevgeniya Sulema, Yevhen Radchenko, "Graphical Data Steganographic Protection Method Based on Bits Correspondence Scheme", International Journal of Intelligent Systems and Applications(IJISA), Vol.9, No.8, pp.34-40, 2017. DOI:10.5815/ijisa.2017.08.04
[1]Internet and cloud services – statistics on the use by individuals, http://ec.europa.eu/eurostat/statistics-explained/index.php/Internet_and_ cloud_services_-_statistics_on_the_use_by_individuals.
[2]T. Morkel, J.H.P. Eloff, M.S. Olivier, An Overview of Image Steganography, Proceedings of the ISSA 2005 New Knowledge Today Conference, 2005, Pretoria, South Africa.
[3]P. S. L. M. Barreto, H. Y. Kim, and V. Rijmen. Toward a secure public-key blockwise fragile authentication watermarking. In ICIP 2001, pages 494–497, Thessaloniki, Greece, October 2001.
[4]B. Chen and G. W. Wornell. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding. IEEE Trans. on Information Theory., 47:1423–1443, May 2001.
[5]J. J. Eggers, R. Bäuml, and B. Girod. A communications approach to image steganography. In Proceedings of SPIE: Electronic Imaging 2002, Security and Watermarking of Multimedia Contents IV, volume 4675, pages 26–37, San Jose, CA, USA, January 2002.
[6]P. Guillon, T. Furon, and P. Duhamel. Applied public-key steganography. In Proceedings of SPIE 2002, volume 4675, San Jose, CA, USA, January 2002.
[7]A. Cheddad, J. Condell, K. Curran, P. Mc Kevitt, Digital Image Steganography: Survey and Analysis of Current Methods, in Signal Processing, 2010, Volume 90, Issue 3, pp. 727-752.
[8]S. Bhattacharyya, I. Banerjee, G. Sanyal, A Survey of Steganography and Steganalysis Technique in Image, Text, Audio and Video as Cover Carrier, in Journal of Global Research in Computer Science, 2011, Volume 2, No. 4, pp. 1-16.
[9]C. C. Chang, T. S. Chen, L. Z. Chung, A steganographic method based upon JPEG and quantization table modification, Information Sciences 141(1–2)(2002)123–138.
[10]A. M. Fard, M. Akbarzadeh-T, F. Varasteh-A, A new genetic algorithm approach for secure JPEG steganography, in:Proceedings of IEEE International Conference on Engineering of Intelligent Systems, 22–23 April 2006, pp.1–6.
[11]A .I. Hashad, A. S. Madani, A. E. M. A. Wahdan, A robust steganography technique using discrete cosine transforminsertion, in:Proceedings of IEEE / ITI Third International Conference on Information and Communications Technology, Enabling Technologies for the New Knowledge Society, 5–6 December 2005, pp.255–264.
[12]S. K. Bandyopadhyay, I. K. Maitra, An Application of Palette Based Steganography, in International Journal of Computer Applications, Volume 6, No.4, 2010, pp. 24-27.
[13]Danny Pascale, A Review of RGB Color Spaces ...from xyY to R’G’B’, 2003, BabelColor, Canada.
[14]N. A. Ibraheem, M. M. Hasan, R. Z. Khan, P. K. Mishra, Understanding Color Models: A Review, in ARPN Journal of Science and Technology, Vol. 2, No. 3, 2012, pp. 265-275.
[15]Dychka, I. A.; Shyrochyn, S. S.; Sulema, Ye. S. Analysis of Parallel Computations Efficiency for User's Private Multimedia Data Protection in Clouds // Naukovi visti NTUU-KPI, 2016, Issue 1, p. 40-46.
[16]Sulema E.S., Shyrochyn S.S., “Method of image steganography fragmentation and division stehodanyh private key”, Scientific and Technical Collection "Legal, regulatory and metrological support of information security in Ukraine”, 2012, Issue 1 (22), P. 64-68.
[17]Sulema E.S., Shyrochyn S.S., “Image steganography method based on complementary image”, Journal "Information Security". 2013, Issue 4, p. 345-353.
[18]Sulema E.S., Shyrochyn S.S., “Steganographic method of protecting data in audio files from complementary image”, Vestnik NTUU "KPI". Informatics, Management and Computer Science: Coll. Science. pr. 2014. Vol. 61, P. 85-92.
[19]Hummert, K. “The PPP Triple-DES Encryption Protocol (3DESE)”, 1998.
[20]Yevgeniya Sulema, “Image Protection Method Based on Binary Operations”, in Proceedings of the 23rd IEEE International Conference on Systems, Signals and Image Processing IWSSIP2016, Bratislava, Slovakia, 2016, pp. 295-298.
[21]Sulema Yevgeniya, Radchenko Yevhen, Method of graphical data steganographic protection based on bits difference transformation // Proceedings of the 8th Scientific Conference for Students and Postgraduates “Applied mathematics and computing (PMK-2016), 2016, p. 254-258.
[22]M. Kharrazi, H. T. Sencar, N. Memon, Performance study of common image steganography and steganalysis techniques, in Journal of Electronic Imaging, 2006, No. 15 (4), pp. 1-16.