Analysis and Implementation of Distinct Steganographic Methods

نویسندگان

  • Unal Tatar
  • Tolga Mataracioglu
چکیده

In this paper, different steganographic methods have been analyzed and implementations of those techniques have been performed. Those methods include hiding in text, hiding in audio file, hiding in file system, and hiding in image files.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Steganalysis of embedding in difference of image pixel pairs by neural network

In this paper a steganalysis method is proposed for pixel value differencing method. This steganographic method, which has been immune against conventional attacks, performs the embedding in the difference of the values of pixel pairs. Therefore, the histogram of the differences of an embedded image is di_erent as compared with a cover image. A number of characteristics are identified in the di...

متن کامل

A steganographic method based on tetris games

Although various steganographic methods have been proposed that use distinct cover media, using games to hide data remains a recent development. The study presents a steganographic method based on online Tetris games, in which secret messages are embedded using a generated tetrimino sequence. Each time a person plays an online Tetris game, a new tetrimino sequence should be generated. The propo...

متن کامل

A Comparative Analysis in Hardware Partitioning of a Steganographic based LSB-substitution Algorithm

Steganography is an amalgamation of art and science complimenting each other where the embedding or hiding of information is done in a digital image. This paper presents a logic level design synthesis (RTL) and IC design is done in Synopsys to visualize the implementation of LSB substitution steganographic algorithm based on 8 bit images, using HDL. This paper intends to visualize and compare t...

متن کامل

J2: Refinement of a Topological Image Steganographic Method

Prior work described the baseline version J1 of a spatial domain image steganographic embedding based on manipulation of the frequency domain, and presented a topological approach to the problem. This paper modifies the embedding and extraction processes of J1 to allow for larger payload. The improved steganographic algorithm is called J2, and is more robust to steganographic detection than J1....

متن کامل

SkyDe: a Skype-based Steganographic Method

This paper introduces SkyDe (Skype Hide), a new steganographic method that utilizes Skype encrypted packets with silence to provide the means for clandestine communication. It is possible to reuse packets that do not carry voice signals for steganographic purposes because Skype does not use any silence suppression mechanism. The method’s proof-of-concept implementation and first experimental re...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1108.2153  شماره 

صفحات  -

تاریخ انتشار 2011