Skip to main content

Steganographic Scheme Using a Block Cipher

  • Conference paper
Digital Watermarking (IWDW 2004)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3304))

Included in the following conference series:

  • 464 Accesses

Abstract

Westfeld[1] detected the stegoed–image by measuring the frequencies of PoVs(pairs of values) in the suspicious images. Fridrich[4] proposed another detection method, so-called RS steganalysis. In this paper we propose a steganographic scheme using a block cipher, which minimizes the embedding changes of a cover object utilizing not only the LSBs of the cover object’s strings but also the whole bits of the cover object. The proposed scheme is a kind of the coding scheme which minimizes changed bits for message embedding without sharing the secret code–book. The experimental result shows that the proposed scheme efficiently evades the χ 2–statistical test and RS steganalysis.

This work was supported (in part) by the Ministry of Information and Communications, Korea, under the Information Technology Research Center (ITRC) Support Program.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Westfeld, A., Pfitzmann, A.: Attacks on Steganographic Systems. Information Hiding 21, 61–76 (1999)

    Google Scholar 

  2. Cachin, C.: An Information-Theoretic Model for Steganography. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 306–318. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  3. Kahn, D.: The Codebreakers-The Story of Secret Writing. Scribner, New York (1996); Proceedings of CRYPTO 1983, pp. 51–67. Plenum Press, New York (1984)

    Google Scholar 

  4. Fridrich, J., Goljan, M., Du, R.: Detecting LSB steganography in color and grayscale image. Magazine of IEEE Multimedia, 22–28 (2001)

    Google Scholar 

  5. Provos, N.: Defending Against Statistical Steganalysis. In: Proceedings of the 10th USENIX Security Symposium, pp. 323–335 (2001)

    Google Scholar 

  6. http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Yu, J.J., Jung, Ch., Yoon, SK., Lee, S. (2005). Steganographic Scheme Using a Block Cipher. In: Cox, I.J., Kalker, T., Lee, HK. (eds) Digital Watermarking. IWDW 2004. Lecture Notes in Computer Science, vol 3304. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-31805-7_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-31805-7_14

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-24839-2

  • Online ISBN: 978-3-540-31805-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics