Skip to main content

On the Way to Perfect Steganography

  • Conference paper
  • First Online:

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 681))

Abstract

The content of our paper presents the ways of hiding information with the usage of a digital pictures. A branch of science that deals with hiding messages in the wider media is called steganography. Encrypting files with sensitive data usually do not hide the existence and transmission of data. It seems therefore that a significant complement or alternative for cryptographic methods is the use of steganographic methods. Due to the rapid expansion of Internet and the associated increase in data exchange appears to be a subject of interest in this field. In the paper we present our own algorithms of hiding data in pictures, their implementations and analysis. In this paper we emphasize high quality, undetectability of the methods used. We define perfect steganography and we propose solutions to achieve this goal. The proposed solution can be used to transmit secret information and to find use in business, diplomacy, and other areas of human activity.

This is a preview of subscription content, log in via an institution.

References

  1. Fridrich, J.: Steganography in Digital Media: Principles, Algorithms, and Applications. Cambridge University Press, Cambridge (2016)

    MATH  Google Scholar 

  2. Katzenbeisser, S., Petitcolas, F.A.P.: Information Hiding Techniques for Steganography and Digital Watermarking. Artech House, Boston (2000)

    Google Scholar 

  3. Cox, I., Miller M., Bloom, J., Fridrich, J., Kalker, T., Digital watermarking and steganography, Morgan Kaufmann, Burlington (2008)

    Google Scholar 

  4. Cheddad, A., Condell, J., Curran, K., Mc Kevitt, P.: Digital image steganography: survey and analysis of current methods. Signal Process. 90, 727–752 (2010)

    Article  MATH  Google Scholar 

  5. Provos, N., Honeyman, P.: Detecting steganographic content on the internet. In: Network and Distributed System Security Symposium 2002 (2002)

    Google Scholar 

  6. Dyja, R., Jakubski, A.: A picture that is something more than just a picture. Scientific Issues Jan Dlugosz University in Czestochowa. Mathematics, vol. XVI, pp. 111–116 (2011)

    Google Scholar 

  7. Dyja, R., Jakubski, A.: Steganography in Digital Multimedia., IT Tools in Management and Education. Selected Problems, Wydawnictwo Politechniki Czestochowskiej, pp. 146–154 (2011)

    Google Scholar 

  8. Jakubski, A., Latasiewicz, M., Rog, P., Ruczkowski, P.: Steganograficzna metoda rozproszenia hasla, Technologie informacyjne w funkcjonowaniu organizacji. Zarządzanie z wykorzystaniem multimediów (red.) Kieltyka Leszek, Dom Organizatora, Towarzystwo Naukowe Organizacji i Kierownictwa, pp. 135–141 (2013)

    Google Scholar 

  9. Cachin, C.: An information-theoretic model for steganography. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 306–318. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  10. Ryabko, B.Y., Ryabko, D.B.: Asymptotically optimal perfect steganographic systems. Probl. Inf. Transm. 45(2), 184–190 (2009)

    Article  MathSciNet  MATH  Google Scholar 

  11. Ryabko, B.Y., Ryabko, D.B.: Constructing perfect steganographic systems. Probl. Inf. Comput. 209(9), 1223–1230 (2011)

    Article  MathSciNet  MATH  Google Scholar 

  12. Cachin, C.: An information-theoretic model for steganography. Inf. Comput. 192(1), 41–56 (2004)

    Article  MathSciNet  MATH  Google Scholar 

  13. Cover, T.M., Thomas, J.: A Elements of Information Theory. Wiley, New York (2012)

    Google Scholar 

  14. Kot, S.M., Jakubowski, J., Sokolowski, A.: Statystyka, Wyd. Difin, Warszawa (2007)

    Google Scholar 

  15. Bobulski, J.: Hidden Markov models for two-dimensional data. In: Burduk, R., Jackowski, K., Kurzyński, M., Woźniak, M., Żołnierek, A. (eds.) CORES 2013. AISC, pp. 141–149. Springer, Heidelberg (2013)

    Google Scholar 

  16. Ding, C., Pei, D., Salomaa, A.: Chinese Remainder Theorem: Applications in Computing, Coding, Cryptography. World Scientific Publishing, Singapore (1996)

    Book  MATH  Google Scholar 

  17. Jakubski, A.: Selected application of the Chinese remainder theorem in multiparty computation. J. Appl. Math. Comput. Mech. 15(1), 39–47 (2016)

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Artur Jakubski .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Cite this paper

Jakubski, A., Bobulski, J. (2018). On the Way to Perfect Steganography. In: Choraś, M., Choraś, R. (eds) Image Processing and Communications Challenges 9. IP&C 2017. Advances in Intelligent Systems and Computing, vol 681. Springer, Cham. https://doi.org/10.1007/978-3-319-68720-9_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-68720-9_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-68719-3

  • Online ISBN: 978-3-319-68720-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics