Abstract

The new conceptions of more than one secret message and false digital image steganography are presented in the current paper. One of the major ideas in these approaches is embodiment of more than one message in one container (digital image). The secrets that are hidden are known as real and false messages. The former one includes basic data that should be transferred between various parties in a secure manner. The second one is a bait for in order to focus attention on a non-important message. When it is discovered that there exists the actual information, this false and multiple data hidden steganography is cracked, regardless of detection of false message. Many various applications can be found for these concepts, particularly in situations that there is close monitoring over the communication channel between a receiver and a sender and there is suspicion of using steganography. In this case, probably the transferred data would be examined in detailed. The concepts that are defined in the current paper would be helpful for overcoming this problem through ignoring an invented message and thus, deception of the warden. It can be perceived as an additional benefit that it is possible to send both false and real data at the same time. The presented idea actually gives the opportunity of the establishment of a subliminal channel during the transfer of hidden information by the use of digital images.

Highlights

  • Steganography is the term used for describing an approach of hiding data so that discovery of secret data by unplanned receivers is prevented (Bailey and Curran, 2005)

  • The multi-level secret steganography concept described in the current work can be applied in many situations

  • When the possibility of examination the transmitted data by warden is very low, there is no need for using false steganography

Read more

Summary

Introduction

Steganography is the term used for describing an approach of hiding data so that discovery of secret data by unplanned receivers is prevented (Bailey and Curran, 2005). For the creation of permutation of pixel in dices, a secret key is utilized This stage intends to spread alterations across the image for avoiding concentration of modifications in one part of the carrier file that can be observed mostly in the case that the secret message’s length is shorter than the capacity of the container. In this situation, embedment of the false secret does not have any impact on the pixel values; it has just an impact on the size of the file. There are characteristics of the most important features of described techniques of multi-secret steganography In this approach, the false message is hidden constantly in LSB of all components. Steganalysis approaches are simple, for instance, verifying file header or replacing comment for the destruction of the message

Method name
Findings
Conclusion and Future Work
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call