Abstract
In this paper, we analyze steganography as one of the branches in the application of secret and secure communication. Starting with an overview of steganographic methods and techniques of concealing information in various data formats, we then introduce a new system of information transfer within Microsoft Word documents via JPEG images previously processed with a steganographic tool StegApp 1.1.0, developed by the authors. This steganographic tool is based on the transformation of the JPEG image with a domain transformation technique with parameters obtained by the discrete cosine transform. In order to check the level of protection and performance of the StegApp 1.1.0 tool, it is qualitatively compared to the commercial SteganPEG tool, which works and encodes data in JPEG images in a similar way.










Similar content being viewed by others
Notes
Secret encoding and decoding key by the application of the symmetric encryption system.
Steganography medium − multimedia file (image) where a secret message is inserted.
Steganography object – formed multimedia file (image) that hides a secret message.
Steganography tool for hiding a message.
Secret message that is distributed.
References
Wayner, P.: Disappearing Cryptography: Information Hiding: Steganography & Watermarking. Morgan Kaufmann, Burlington (2009)
Lui, C.S.: Multimedia Security: Steganography and Digital Watermarking Techniques for Protection of Intellectual Property. Idea Group Inc. (IGI), Hershey (2014)
Fridrich, J.: Steganography in Digital Media: Principles, Algorithms, and Applications. Cambridge University Press, Cambridge (2009)
Kipper, G.: Investigator’s Guide to Steganography. CRC Press, Boca Raton (2003)
Barni, M., Ingemar, C., Ton, K., Hyoung, J.K.: Digital Watermarking. IWDW, Siena (2005)
Andriotis, P., Oikonomou, G., Tryfonas, T.: JPEG steganography detection with Benford’s Law. Dig. Investig. 9, 1742–2876 (2013)
Eason, J.T.L., Rao, N.V.: Metamorphic cryptography—a paradox between cryptography and steganography using dynamic encryption. In IEEE—International Conference on Recent Trends in Information Technology, ICRTIT, pp. 217–222 (2011)
Farid, H.: Detecting hidden messages using higher-order statistics models. In: Proceedings of EEE Int. Conf. Image Processing, pp. 905–908. IEEE, New York (2002)
Mohammad, J.K., Ahmad, R.N.N.: A novel joint secret image sharing and robust steganography method using wavelet. Multimed. Syst. 20(2), 215–226 (2014)
Mehdi, H., Mureed, H.: A survey of image steganography techniques. Int. J. Adv. Sci. Technol. 97, 10–20 (2013)
Zhenjun, T., Xianquan, Z., Shichao, Z.: Robust perceptual image hashing based on ring partition and NMF. IEEE Knowl. Data Eng. 26, 711–724 (2014)
Xiaofeng, Z., Lei, Z., Zi, H.: A sparse embedding and least variance encoding approach to hashing image processing. IEEE Trans. Image Process. 23, 3737–3750 (2014)
Xiaofeng, Z., Zhang, S., Zhi, J., Zili, Z.: Missing value estimation for mixed-attribute data sets. IEEE Trans. Knowl. Data Eng. 23, 110–121 (2011)
Xiaofeng, Z., Huang, H.C.Z., Jiangtao, C., Heng, T.S.: Sparse hashing for fast multimedia search. ACM Trans. Inf. Syst. 31, 9 (2013)
Cole, E.: Hiding in Plain Sight: Steganography and the Art of Covert Communication. Wiley, New York (2003)
Provos, N., Honeyman, P.: Hide and seek: an introduction to steganography. IEEE Secur. Priv. J. 1, 32–44 (2003)
Fridrich J., Goljan M., Hogea D.: Steganalysis of JPEG images: breaking the F5 algorithm. In Proceedings 5th International Workshop on Information Hiding, Noordwijkerhout, pp. 310–323 (2002)
Bhaskaran V., Konstantinides, K.: The JPEG Standard. Image and Video Compression Standards (1995). ISBN: 978-1-4757-2360-1 (Print), 978-1-4757-2358-8 (Online)
Fridrich J., Goljan M., Du R.: Steganalysis based on JPEG compatibility. In Special Session on Theoretical and Practical Issues in Digital Watermarking and Data Hiding. Multimedia Systems and Applications IV, Denver, pp. 275–280 (2001)
Siddhartha B., Bibek R. G., Pratik R.: JPEG steganography and steganalysis—a review. In: Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014. Advances in Intelligent Systems and Computing, Vol. 328 (2015). ISBN: 978-3-319-12011-9 (Print) 978-3-319-12012-6 (Online)
Nimje, S., et al.: Hiding existence of communication using image steganography. Int. J. Comput. Sci. Eng. 3, 2319–7242 (2014)
Swathi, K., Arijit, S.: Steganographic algorithm based on randomization of DCT kerne. Multimed. Tools Appl. 1573–7721(24), 1380–7501 (2014)
Kou, W: JPEG compression standard. In: Digital Image Compression (1995). ISBN: 978-1-4419-5156-4 (Print), 978-1-4757-2361-8 (Online)
Lukás, J., Fridrich, J.: Estimation of primary quantization matrix in double compressed JPEG images. In: Proceedings of DFRWS 2003. Cleveland (2003)
Netravali AN, Haskell BG.: Basic compression techniques. In: Digital Pictures. Springer, Berlin (1995). ISBN: 978-1-4899-6820-3 (Print), 978-1-4899-6950-7 (Online)
Jessica, F., Miroslav, G., David, S.: Perturbed quantization steganography. Multimed. Syst. 11(2), 98–107 (2005)
Sarkar, D., Nag, A., Biswas, S., Sarkar, P.: A novel technique for image steganography based on DWT and Huffman encoding. Int. J. Comput. Sci. Secur. 4, 497–610 (2011)
Hiroshi Y., Hayato F.: An implementation of steganography using construction of Huffman tree. In IEEE (2012). ISBN: 978-1-4673-2521-9 (Print)
Reddy, V.L., Subramanyam, A., Reddy, P.C.: SteganPEG Steganography+ JPEG. Int. J. Comput. Gr. 2(1), 2231–3591 (2011)
Solomon, D., Motta, G.: Image compression. In: Handbook of Data Compression, pp. 443–730 (2010). ISBN: 978-1-84882-902-2 (Print), 978-1-84882-903-9 (Online)
Victor O.W., Audu I., Abraham O.: Steganography and its applications in information dessimilation on the web using images as security embeddment: a wavelet approach. Int. J. Comput. Inf. Technol. (2012)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Uljarević, D., Veinović, M., Kunjadić, G. et al. A new way of covert communication by steganography via JPEG images within a Microsoft Word document. Multimedia Systems 23, 333–341 (2017). https://doi.org/10.1007/s00530-015-0492-3
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00530-015-0492-3