Mathematical Modeling of Image Steganographic System
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2012, Vol 2, Issue 5
Abstract
Image based steganography is a dangerous technique of hiding secret messages in the image in such a way that no one apart from the sender and intended recipient suspects the existence of the message. It is based on invisible communication and this technique strives to hide the very presence of the message itself from the observer. As a result it becomes the most preferred tool to be used by Intelligence Agencies, Terrorist Networks and criminal organizations for securely broadcasting, dead-dropping and communicating information over the internet by hiding secret information in the images. In this paper a mathematical model is designed for representing any such image based steganographic system. This mathematical model of any stego system can be used for determining vulnerabilities in the stego system as well as for steganalysing the stego images using same vulnerabilities. Based on these mathematical foundations three steganographic systems are evaluated for their strengths and vulnerabilities using MATLAB ©Image Processing Tool Box.
Authors and Affiliations
Kaustubh Choudhary
An Efficient Topology Search Mechanism for Unstructured Peer-To-Peer Networks
Unstructured peer-to-peer (P2P) file-sharing networks are popular in the mass market. As the peers participating in unstructured networks interconnect randomly, they rely on flooding query messages to discover obje...
Assessment of Grand Ethiopian Renaissance Damimpacts using Decision Support System
Abstract: Ethiopian government undertakes plans to develop massive hydropower potential with the construction of a large scale Grand Ethiopian Renaissance Dam (GERD) upstream of the Ethiopian-Sudan border in an effort to...
An Efficient implementation of PKI architecture based Digital Signature using RSA and various hash functions (MD5 and SHA variants
Digital Signature technique is widely being used to detect unauthorized modification to data and to authenticate the identity of the signatory. It is essential for secure transaction over unsecure/ open networks....
Corporate Policy Governance in Secure MD5 DataChanges and Multi Hand Administration
Abstract: Policy based management is an administrative approach that simplify the management of a givenendeavor by establishing policies to deal with situation that are likely to occur. Most of the social network andmobi...
Secured Source Anonymous Message Authentication UsingWireless Sensor Network
Abstract: The secured exchange of message was the main concern. To overcome this, message authenticationschemes were developed, to maintain the privacy of message. Message authentication schemes are based onsymmetric key...