Mobile Steganography Embedder
نویسندگان
چکیده
Despite the capabilities of Android mobile phones, compared in specification to personal computers a few years ago, few programs for applied steganography has been written for such devices. Our objective is to produce an application that uses echo steganography to hide a short text message in an audio message recorded by the user, and then share that message. Someone with the same application on their device who receives such a message will be able to extract the hidden data from the audio message. We show our development strategy as well the evaluation process for our application.
منابع مشابه
The Square Root Law in Stegosystems with Imperfect Information
Theoretical results about the capacity of stegosystems typically assume that one or both of the adversaries has perfect knowledge of the cover source. So-called perfect steganography is possible if the embedder has this perfect knowledge, and the Square Root Law of capacity applies when the embedder has imperfect knowledge but the detector has perfect knowledge. The epistemology of stegosystems...
متن کاملAdaptive Image Steganography by Reversible Data Hiding
An adaptive steganographic scheme is proposed in this paper. The adaptive quantization embedder is introduced and employed by block-wised fashion. We also constructed contrast-correlation distortion metric to optimally choose quantization steps for image blocks to guarantee more data being embedded in busy areas. Different form existing methods, our scheme embeds the AQE parameters together wit...
متن کاملSteganographic strategies for a square distortion function
Recent results on the information theory of steganography suggest, and under some conditions prove, that the detectability of payload is proportional to the square of the number of changes caused by the embedding. Assuming that result in general, this paper examines the implications for an embedder when a payload is to be spread amongst multiple cover objects. A number of variants are considere...
متن کاملAdditive non-Gaussian noise attacks on the scalar Costa scheme (SCS)
The additive attack public mutual information game is explicitly solved for one of the simplest quantization based watermarking schemes, the scalar Costa scheme (SCS). It is a zero-sum game played between the embedder and the attacker, and the payoff function is the mutual information. The solution of the game, a subgame perfect nash equilibrium, is found by backward induction. Therefore, the B...
متن کاملDesign and Implementation of Steganography Along with Secured Message Services in Mobile Phones
Design and Implementation of Steganography along with secured message services in Mobile Phones is used to provide security to the data that flows across the mobiles. Two people may communicate securely by encrypting the message sent between them. Now a day, several methods are used for communicating secret messages for defense purpose or in order to ensure the privacy of communication between ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2011