Mathematical Modeling of Image Steganographic System

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2012, Vol 2, Issue 5

Abstract

 Image based steganography is a dangerous technique of hiding secret messages in the image in such a way that no one apart from the sender and intended recipient suspects the existence of the message. It is based on invisible communication and this technique strives to hide the very presence of the message itself from the observer. As a result it becomes the most preferred tool to be used by Intelligence Agencies, Terrorist Networks and criminal organizations for securely broadcasting, dead-dropping and communicating information over the internet by hiding secret information in the images. In this paper a mathematical model is designed for representing any such image based steganographic system. This mathematical model of any stego system can be used for determining vulnerabilities in the stego system as well as for steganalysing the stego images using same vulnerabilities. Based on these mathematical foundations three steganographic systems are evaluated for their strengths and vulnerabilities using MATLAB ©Image Processing Tool Box.

Authors and Affiliations

Kaustubh Choudhary

Keywords

Related Articles

 A Technique To Hide Information Within Image File For Secure Transmission

 In today’s world lots of data are being corrupted so, for a secure message transfer we need Steganography .It is the method of hiding information in other information. Other file formats such as of audio or video f...

 Performance Evaluation of Soft RoCE over 1 Gigabit Ethernet

 Ethernet is most influential & widely used technology in the world. With the growing demand of low latency & high throughput technologies like InfiniBand and RoCE have evolved with unique features viz. RD...

 Improvement of QoS Contained by AODV Routing Protocol On the Basis of Varying Queue Length and Dynamic TTL Value in MANET

 A Mobile ad-hoc network (MANET) is a network, self-configuring, proficient of self-directed functioning, quickly deployable and operates without infrastructure. MANET operates without any centralized administrati...

 Study of P2P Botnet

 Abstract: Today, centralized botnets are still widely used. In a centralized botnet, bots are connected to several servers (called C&C servers) to obtain commands. This architecture is easy to construct and eff...

 Intrusion Detection system: A Review of the state of the art

 Intrusion detection system is a software which is used to monitor network for anyintrusion .There are various types of IDS which are stated as Anomaly based, Host based, Network based and Signature based. In this...

Download PDF file
  • EP ID EP104072
  • DOI -
  • Views 124
  • Downloads 0

How To Cite

Kaustubh Choudhary (2012).  Mathematical Modeling of Image Steganographic System. IOSR Journals (IOSR Journal of Computer Engineering), 2(5), 1-15. https://europub.co.uk/articles/-A-104072