Mathematical Modeling of Image Steganographic System

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2012, Vol 2, Issue 5

Abstract

 Image based steganography is a dangerous technique of hiding secret messages in the image in such a way that no one apart from the sender and intended recipient suspects the existence of the message. It is based on invisible communication and this technique strives to hide the very presence of the message itself from the observer. As a result it becomes the most preferred tool to be used by Intelligence Agencies, Terrorist Networks and criminal organizations for securely broadcasting, dead-dropping and communicating information over the internet by hiding secret information in the images. In this paper a mathematical model is designed for representing any such image based steganographic system. This mathematical model of any stego system can be used for determining vulnerabilities in the stego system as well as for steganalysing the stego images using same vulnerabilities. Based on these mathematical foundations three steganographic systems are evaluated for their strengths and vulnerabilities using MATLAB ©Image Processing Tool Box.

Authors and Affiliations

Kaustubh Choudhary

Keywords

Related Articles

 An Automated Model to Detect Fake Profiles and botnets inOnline Social Networks Using Steganography Technique

 Abstract: At the present time, hundreds of millions of active users all around the world are using online socialnetwork, such as Facebook, Twitter, Tumblr and LinkedIn. This service turned out to be one of the most...

 Analysis on Data Integrity in Cloud Environment

Abstract: Cloud Computing privileges convenient, easy on-demand access to a collection of configurable resources and services. The services and resources on the cloud can be robustly deployed with low maintenance cost, e...

 Analyzing and Surveying Trust In Cloud ComputingEnvironment

 Abstract: Cloud computing is the most discussed research area now-a-days which helps to provide elasticityand flexibility in using the computing resources and services to fulfill the requirement of current business...

 A survey on context aware system & intelligent Middleware’s

 Context aware system or Sentient system is the most profound concept in the ubiquitous computing. In the cloud system or in distributed computing building a context aware system is difficult task and programmer...

 Secure Personal Health Records access in Cloud Computing

 Abstract: Patient Health Record (PHR) is a complete Patient related health data, which is getting stored in cloud computing to gain cost benefit and better access control. In maintaining PHR, cloud computing plays...

Download PDF file
  • EP ID EP104072
  • DOI -
  • Views 94
  • Downloads 0

How To Cite

Kaustubh Choudhary (2012).  Mathematical Modeling of Image Steganographic System. IOSR Journals (IOSR Journal of Computer Engineering), 2(5), 1-15. https://europub.co.uk/articles/-A-104072