Open Access. Powered by Scholars. Published by Universities.®

Signal Processing Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Signal Processing

A Study On Countermeasures Against Steganography: An Active Warden Approach, Qilin Qi Dec 2013

A Study On Countermeasures Against Steganography: An Active Warden Approach, Qilin Qi

Department of Computer Electronics and Engineering: Dissertations, Theses, and Student Research

Digital steganography is a method used for hiding information in digital images. It can be used for secure communication. There have been many robust digital steganography methods invented in recent decades. The steganographic message can be inserted in multimedia cover signal such as audio, image and video. However, this technique also may be used by malicious users to transmit dangerous information through the Internet beyond the control of security agencies. How to detect and/or block potentially dangerous information transmission on the Internet through billions of multimedia files while not affecting innocent multimedia communications becomes a challenging problem. Existing steganalysis methods …


Application Of Stochastic Diffusion For Hiding High Fidelity Encrypted Images, Jonathan Blackledge, Abdulrahman Al-Rawi Jan 2011

Application Of Stochastic Diffusion For Hiding High Fidelity Encrypted Images, Jonathan Blackledge, Abdulrahman Al-Rawi

Articles

Cryptography coupled with information hiding has received increased attention in recent years and has become a major research theme because of the importance of protecting encrypted information in any Electronic Data Interchange system in a way that is both discrete and covert. One of the essential limitations in any cryptography system is that the encrypted data provides an indication on its importance which arouses suspicion and makes it vulnerable to attack. Information hiding of Steganography provides a potential solution to this issue by making the data imperceptible, the security of the hidden information being a threat only if its existence …