Abstract

This paper presents the new concepts of multi-secret and false digital image steganography. The main idea of such approaches is to embed in a single container (digital image) more than one message. The hidden secrets are called real and false messages, respectively. The first one contains essential data which are intended to be securely transferred between different parties, the latter is a bait for focusing attention on an unimportant message. This false and multi-secret steganography will be broken when existence of the real message is revealed, it does not matter whether the false message is detected. Such concepts may find many different applications, especially in situations where communication channel between a sender and a receiver is closely monitored and the warden suspects that the steganography is used. In that case it is probable that the transmitted data will be analyzed in a very detailed way. The concepts described in this paper can help to overcome this problem by dropping a fabricated message and thereby deceiving the warden. The possibility of sending both real and false information at the same time can be seen as additional benefit. In fact, the presented idea allows to establish a kind of subliminal channel while transferring hidden information using digital images.

Highlights

  • Steganography is a technique of hiding information in a way that prevents detection of secret data by unintended recipients (Bailey and Curran 2005; Cheddad 2009; Cox et al 2008; Subhedar and Mankar 2014)

  • The actions taken by warden to find hidden information are called steganalysis and in many cases are based on statistical distribution, e.g., (Budhia et al 2006; Cheddad 2009; Fridrich et al 2003)

  • The concept of false steganography presented in this article may find application in many specific situations

Read more

Summary

Introduction

Steganography is a technique of hiding information in a way that prevents detection of secret data by unintended recipients (Bailey and Curran 2005; Cheddad 2009; Cox et al 2008; Subhedar and Mankar 2014). The usage of steganography is successful when existence of the secret message is not revealed; in the other case it is broken. In the popular form of digital steganography, called container modification, the carrier is altered in embedding process and sent to the receiver who extracts data from it. The problem is that every modification of the container changes slightly its statistics (e.g., histogram). If adversary (warden) gets access to carrier, he will try to check it for existence of the secret message. The actions taken by warden to find hidden information are called steganalysis and in many cases are based on statistical distribution, e.g., (Budhia et al 2006; Cheddad 2009; Fridrich et al 2003). The length of embedded data affects number of changes made to container and, as a result, the likelihood of detection. From a wide variety of digital containers, the most common are images, network packets, text, video and

Multi-secret and false steganography
Examples of application
Features of different approaches for multi-secret steganography
False LSB steganography
False JPEG steganography
Multi-level F5 steganography
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call