Edge Based Steganographic Techniques for Covert Communication Through Overt Channels
KrishiKosh
View Archive InfoField | Value | |
Title |
Edge Based Steganographic Techniques for Covert Communication Through Overt Channels
|
|
Creator |
Fernandes, Aisha Cyra Furtado
|
|
Contributor |
Jeberson, Wilson
|
|
Subject |
steganography, covert communication, compression, edges, least significant bits, imperceptibility.
|
|
Description |
Thesis titled “Edge Based Steganographic Techniques for Covert Communication Through Overt Channels” submitted in partial fulfillment of the requirements for the award of the degree of Doctor of Philosophy in Computer Engineering by Aisha Cyra Furtado Fernandes.
Cross Swords between the good and the bad in the internet ground is getting tougher as more and more refined evolution takes place in this technology driven era. The focus behind data security is to ensure privacy while protecting personal or corporate data. At times, data transmission secrecy is important as more and more people are joining the cyberspace revolution. This demands the need to revamp techniques in the ancient science of steganography. Steganography is the art of concealing data in a manner that its existence itself cannot be detected. Numerous techniques for steganography are known to exist, but very few of them are found to be independent of the file formats, as well as few of them target coloured images. This thesis proposes two steganographic techniques, namely, Arithmetic Division based data embedding (ADDE) and Bit Stream based data embedding (BSDE), bearing in mind the important characteristics of an embedding algorithm: capacity, imperceptibility and robustness. Both the techniques use the least significant bits of the red, green and blue components of a 24- bit coloured image as the carrier medium and the secret data can either be in the form of text or an image. To ensure imperceptibility, the secret data is stored within the edges of the cover image. If the secret data is an image, it is compressed using a wavelet compression algorithm, before being embedded. In the ADDE method, we perform an arithmetic division operation on the secret binary data, so as to reduce its magnitude and further apply a mapping logic by analyzing the sizes of all the bytes of quotient data. In the BSDE method, we use a stream of continuous bits to store the secret data. In order to optimize the data storage, the amount of bits used by each byte of data is mapped to a value set in a flag array. The proposed methods were tested on 200 real time camera clicked digital images and on various other image databases. Various performance metrics were used to evaluate the quality of the stego image, as well as the extracted secret data. Experimental results indicate that the proposed techniques produce stego images that are highly imperceptible, as well as resist some of the most common visual and statistical attacks. The results obtained were compared with similar works done by other researchers and our results seemed to be more promising. |
|
Date |
2017-01-16T14:43:09Z
2017-01-16T14:43:09Z 2016 |
|
Type |
Thesis
|
|
Identifier |
http://krishikosh.egranth.ac.in/handle/1/96493
|
|
Language |
en
|
|
Format |
application/pdf
|
|
Publisher |
Sam Higginbottom Institute of Agriculture, Technology & Sciences (SHIATS)
|
|