Skip to main content
Log in

Abstract

It is well known that encryption provides secure channels for communicating entities. However, due to lack of covertness on these channels, an eavesdropper can identify encrypted streams through statistical tests and capture them for further cryptanalysis. Hence, the communicating entities can use steganography to achieve covertness. In this paper we propose a new form of multimedia steganography called data masking. Instead of embedding a secret message into a multimedia object, as in traditional multimedia steganography, we process the entire secret message to make it appear statistically similar to a multimedia object itself. Thereby we foil an eavesdropper who is primarily applying statistical tests to detect encrypted communication channels. We show that our approach can potentially give a covert channel capacity which is an order of magnitude higher than traditional steganography. Our experiments also show that steganalyzers trained with stego objects of known steganographic have a low detection accuracy for datamasked multimedia objects.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. G.J Simmons, Prisoner's Problem and the Subliminal Channel (The), CRYPTO83—Advances in Cryptology, Aug. 1984, pp. 51–67.

  2. N.F Johnson and S. Katzenbeisser, “A Survey of Steganographic Techniques,” in Information Hiding S. Katzenbeisser and F. Petitcoals (Eds.), Artech House, Norwood, MA, 2000, pp. 43–78.

    Google Scholar 

  3. N.F. Johnson and S. Jajodia, “Steganalysis of Images Created Using Current Steganography Software,” in Information Hiding, David Aucsmith (Ed.), LNCS 1525, Springer-Verlag Berlin Heidelberg, 1998, pp. 32–47.

    Google Scholar 

  4. A. Westfield and A. Pfitzmann, “Attacks on Steganographic Systems,” in Information Hiding, LNCS 1768, Springer-Verlag Heidelberg, 1999, pp. 61–76.

    Google Scholar 

  5. J. Fridrich, M. Goljan, and R. Du, “Reliable Detection of LSB Steganography in Color and Grayscale Images,” in Proc. of the ACM Workshop on Multimedia and Security, Ottawa, CA, Oct., 2001, pp. 27–30.

  6. I. Avcibas, N. Memon, and B. Sankur, “Steganalysis Using Image Quality Metrics,” Security and Watermarking of Multimedia Contents, SPIE, San Jose, 2001.

    Google Scholar 

  7. Advanced Encryption Standard, FIPS 197, 2001.

  8. ISO/IEC 14495-1, ITU Recommendation T.87, “Information technology—Lossless and Near-Lossless Compression of Continuous-Tone Still Images,” 1999.

  9. H. Zer, I. Avcibas, B. Sankur, and N. Memon, “Steganalysis of Audio Based on Audio Quality Metrics,” submitted to SPIE 2004.

  10. Elke Franz et al., Steganography Preserving Statistical Properties, Fifth International Workshop on Information Hiding, 2002.

  11. S. Lyu and H. Farid, Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines, Fifth International Workshop on Information Hiding, 2002.

  12. S. Dumitrescu, X. Wu, and Z. Wang, “Detection of LSB Steganography via Sample Pair Analysis,” IEEE Transactions on Signal Processing, 2003, pp. 1995–2007.

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

About this article

Cite this article

Radhakrishnan, R., Kharrazi, M. & Memon, N. Data Masking: A New Approach for Steganography?. J VLSI Sign Process Syst Sign Image Video Technol 41, 293–303 (2005). https://doi.org/10.1007/s11265-005-4153-1

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11265-005-4153-1

Keywords

Navigation