Record Details

Edge Based Steganographic Techniques for Covert Communication Through Overt Channels

KrishiKosh

View Archive Info
 
 
Field Value
 
Title Edge Based Steganographic Techniques for Covert Communication Through Overt Channels
 
Creator Fernandes, Aisha Cyra Furtado
 
Contributor Jeberson, Wilson
 
Subject steganography, covert communication, compression, edges, least significant bits, imperceptibility.
 
Description Thesis titled “Edge Based Steganographic Techniques for Covert Communication Through Overt Channels” submitted in partial fulfillment of the requirements for the award of the degree of Doctor of Philosophy in Computer Engineering by Aisha Cyra Furtado Fernandes.
Cross Swords between the good and the bad in the internet ground is getting tougher as more and more refined evolution takes place in this technology driven era. The focus behind data security is to ensure privacy while protecting personal or corporate data. At times, data transmission secrecy is important as more and more people are joining the cyberspace revolution. This demands the need to revamp techniques in the ancient science of steganography. Steganography is the art of concealing data in a manner that its existence itself cannot be detected. Numerous techniques for steganography are known to exist, but very few of them are found to be independent of the file formats, as well as few of them target coloured images. This thesis proposes two steganographic techniques, namely, Arithmetic Division based data embedding (ADDE) and Bit Stream based data embedding (BSDE), bearing in mind the important characteristics of an embedding algorithm: capacity, imperceptibility and robustness. Both the techniques use the least significant bits of the red, green and blue components of a 24- bit coloured image as the carrier medium and the secret data can either be in the form of text or an image. To ensure imperceptibility, the secret data is stored within the edges of the cover image. If the secret data is an image, it is compressed using a wavelet compression algorithm, before being embedded. In the ADDE method, we perform an arithmetic division operation on the secret binary data, so as to reduce its magnitude and further apply a mapping logic by analyzing the sizes of all the bytes of quotient data. In the BSDE method, we use a stream of continuous bits to store the secret data. In order to optimize the data storage, the amount of bits used by each byte of data is mapped to a value set in a flag array. The proposed methods were tested on 200 real time camera clicked digital images and on various other image databases. Various performance metrics were used to evaluate the quality of the stego image, as well as the extracted secret data. Experimental results indicate that the proposed techniques produce stego images that are highly imperceptible, as well as resist some of the most common visual and statistical attacks. The results obtained were compared with similar works done by other researchers and our results seemed to be more promising.
 
Date 2017-01-16T14:43:09Z
2017-01-16T14:43:09Z
2016
 
Type Thesis
 
Identifier http://krishikosh.egranth.ac.in/handle/1/96493
 
Language en
 
Format application/pdf
 
Publisher Sam Higginbottom Institute of Agriculture, Technology & Sciences (SHIATS)