Abstract
There has been many hidden communication techniques proposed in the last few years. The focus was given to steganography to build such techniques. Utilizing stego-key(s) to hide secret messages into images strengthen the security of these techniques. However, adopting one of the available key-agreement protocols, to distribute stego-key(s) between the communicating parties, will destroy the infrastructure of the entire communication. The reason is that, these protocols perform their transactions on sight, while the desirable communications need to be completely hidden. In this paper, a key-generation unit is proposed to be added to the steganography general model. This unit utilizes a new key-agreement protocol, stego-KA, to help support the entire class of hidden communication techniques to exchange the sego-key(s) covertly. The proposed stego-KA protocol is based on Diffie-Hellman key establishment protocol and has significant advantages that support hidden communications.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Simmons, G.: The Prisoners’ Problem and the Subliminal Channel. In: CRYPTO 1983 - Advances in Cryptology, August 22-24, pp. 51–67 (1984)
Kundur, D., Hatzinakos, D.: Digital watermarking using multiresolution wavelet decomposition. In: IEEE ICASSP 1998, Seattle, May 1998, vol. 5, pp. 2659–2662 (1998)
Qi, H., Snyder, W., Sander, W.: Blind Consistency Based Steganography For Information Hiding In Digital Media. In: Proceedings IEEE International Conference on Multimedia and Expo, 2002. ICME 2002, August 2002, vol. 1, pp. 585–588 (2002)
Sharp, T.: An implementation of key-based digital signal steganography. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 13–26. Springer, Heidelberg (2001)
Licks, V., Hordan, R.: On digital image watermarking robust to geometric transformations. In: International Conference on Image Processing, September 2000, vol. 3, pp. 690–693 (2000)
Liu, H., Liu, J., Huang, J., Huang, D., Shi, Y.: A robust DWT-based blind data hiding algorithm. In: IEEE International Symposium on Circuits and Systems, ISCAS 2002, May 2002, vol. 2, pp. II-672–II-675 (2002)
Elmasry, G., Shi, Y.: 2-D Interleaving for Enhancing the Robustness of Watermark Signals Embedded in Still Images. In: IEEE International Conference on Multimedia and Expo (II), pp. 731–734 (2000)
Marvel, M., Retter, C., Boncelet, C.: A methodology for data hiding using images. In: IEEE Proceedings on Military Communications Conference, MILCOM 1998, October 1998, vol. 3, pp. 1044–1047 (1998)
Pan, G., Wu, Z., Pan, Y.: A data hiding method for few-color images. In: Proceedings IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2002), May 2002, vol. 4, pp. 3469–3472 (2002)
Tseng, Y., Chen, Y., Pan, H.: A secure data hiding scheme for binary images. IEEE Transactions on Communications 50(8), 1227–1231 (2002)
Alturki, F., Mersereau, R.: A novel approach for increasing security and data embedding capacity in images for data hiding applications. In: International Conference on Information Technology: Coding and Computing, April 2001, pp. 228–233 (2001)
Rao, R., Bopardikar, A.: Wavelet Transforms. Addison Wesley Longman Inc., Reading (1998)
Zierler, N.: Linear Recurring Sequences. Journal of the Society for Industrial and Applied Mathematics 7(1), 31–48 (1959)
Gonzalez, G., Woods, R.: Digital Image Processing. Addison Wesly Publication Company, London (1992)
Pfitzmann, B.: Information Hiding Terminology. In: Miclet, L., de la Higuera, C. (eds.) ICGI 1996. LNCS, vol. 1147. Springer, Berlin (1996)
Ouda, A.: Digital Watermarking Techniques for Image Security and Hidden Communica-tions., Ph.D. Dissertation, Computer Science Department, University of Western Ontario, Canada (2004)
Diffie, W., Hellman, M.: New directions in cryptography. IEEE Transactions on Information Theory, IT-22, 644–654 (1976)
Menezes, A., Oorchot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Florida (1997)
Law, L., Menezes, A., Qu, M., Vanstone, S.: An Efficient Protocol for Authenticated Key Agreement. Technical Report CORR 98-05, Department of C&O, University of Waterloo (1998)
National Institute of Standards and Technology NIST, “Secure hash standard”, Federal In-formation Processing Standards Publication FIPS, 180-1
Wilson, S., Johnson, D., Menezes, A.: Key agreement protocols and their security analysis. In: Darnell, M.J. (ed.) Cryptography and Coding 1997. LNCS, vol. 1355, pp. 30–45. Springer, Heidelberg (1997)
Menezes, A.: Evaluation of security level of cryptography: The elliptic curve discrete logarithm problem. CRYPTREC Report, December 14 (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ouda, A.H., El-Sakka, M.R. (2005). A Step Towards Practical Steganography Systems. In: Kamel, M., Campilho, A. (eds) Image Analysis and Recognition. ICIAR 2005. Lecture Notes in Computer Science, vol 3656. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11559573_140
Download citation
DOI: https://doi.org/10.1007/11559573_140
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-29069-8
Online ISBN: 978-3-540-31938-2
eBook Packages: Computer ScienceComputer Science (R0)