Abstract
The content of our paper presents the ways of hiding information with the usage of a digital pictures. A branch of science that deals with hiding messages in the wider media is called steganography. Encrypting files with sensitive data usually do not hide the existence and transmission of data. It seems therefore that a significant complement or alternative for cryptographic methods is the use of steganographic methods. Due to the rapid expansion of Internet and the associated increase in data exchange appears to be a subject of interest in this field. In the paper we present our own algorithms of hiding data in pictures, their implementations and analysis. In this paper we emphasize high quality, undetectability of the methods used. We define perfect steganography and we propose solutions to achieve this goal. The proposed solution can be used to transmit secret information and to find use in business, diplomacy, and other areas of human activity.
This is a preview of subscription content, log in via an institution.
References
Fridrich, J.: Steganography in Digital Media: Principles, Algorithms, and Applications. Cambridge University Press, Cambridge (2016)
Katzenbeisser, S., Petitcolas, F.A.P.: Information Hiding Techniques for Steganography and Digital Watermarking. Artech House, Boston (2000)
Cox, I., Miller M., Bloom, J., Fridrich, J., Kalker, T., Digital watermarking and steganography, Morgan Kaufmann, Burlington (2008)
Cheddad, A., Condell, J., Curran, K., Mc Kevitt, P.: Digital image steganography: survey and analysis of current methods. Signal Process. 90, 727–752 (2010)
Provos, N., Honeyman, P.: Detecting steganographic content on the internet. In: Network and Distributed System Security Symposium 2002 (2002)
Dyja, R., Jakubski, A.: A picture that is something more than just a picture. Scientific Issues Jan Dlugosz University in Czestochowa. Mathematics, vol. XVI, pp. 111–116 (2011)
Dyja, R., Jakubski, A.: Steganography in Digital Multimedia., IT Tools in Management and Education. Selected Problems, Wydawnictwo Politechniki Czestochowskiej, pp. 146–154 (2011)
Jakubski, A., Latasiewicz, M., Rog, P., Ruczkowski, P.: Steganograficzna metoda rozproszenia hasla, Technologie informacyjne w funkcjonowaniu organizacji. Zarządzanie z wykorzystaniem multimediów (red.) Kieltyka Leszek, Dom Organizatora, Towarzystwo Naukowe Organizacji i Kierownictwa, pp. 135–141 (2013)
Cachin, C.: An information-theoretic model for steganography. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 306–318. Springer, Heidelberg (1998)
Ryabko, B.Y., Ryabko, D.B.: Asymptotically optimal perfect steganographic systems. Probl. Inf. Transm. 45(2), 184–190 (2009)
Ryabko, B.Y., Ryabko, D.B.: Constructing perfect steganographic systems. Probl. Inf. Comput. 209(9), 1223–1230 (2011)
Cachin, C.: An information-theoretic model for steganography. Inf. Comput. 192(1), 41–56 (2004)
Cover, T.M., Thomas, J.: A Elements of Information Theory. Wiley, New York (2012)
Kot, S.M., Jakubowski, J., Sokolowski, A.: Statystyka, Wyd. Difin, Warszawa (2007)
Bobulski, J.: Hidden Markov models for two-dimensional data. In: Burduk, R., Jackowski, K., Kurzyński, M., Woźniak, M., Żołnierek, A. (eds.) CORES 2013. AISC, pp. 141–149. Springer, Heidelberg (2013)
Ding, C., Pei, D., Salomaa, A.: Chinese Remainder Theorem: Applications in Computing, Coding, Cryptography. World Scientific Publishing, Singapore (1996)
Jakubski, A.: Selected application of the Chinese remainder theorem in multiparty computation. J. Appl. Math. Comput. Mech. 15(1), 39–47 (2016)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
Jakubski, A., Bobulski, J. (2018). On the Way to Perfect Steganography. In: Choraś, M., Choraś, R. (eds) Image Processing and Communications Challenges 9. IP&C 2017. Advances in Intelligent Systems and Computing, vol 681. Springer, Cham. https://doi.org/10.1007/978-3-319-68720-9_7
Download citation
DOI: https://doi.org/10.1007/978-3-319-68720-9_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-68719-3
Online ISBN: 978-3-319-68720-9
eBook Packages: EngineeringEngineering (R0)