Secret key steganography with message obfuscation by pseudo-random number generators

Juan M. Gutiérrez-Cárdenas

Resultado de la investigación: Capítulo del libro/informe/acta de congresoContribución a la conferenciaInvestigaciónrevisión exhaustiva

3 Citas (Scopus)

Resumen

Steganography is the art of concealing information within different types of media objects such as images or audio files. Its counterpart, Steganalysis, is the study of methods that uncover information in a suspicious file, which has being altered for stego purposes. Its techniques rely on the inspection of changes at the pixel information level. In this paper, we propose a method for Secret-key Steganography that uses a picture to conceal a message with unaltered pixel information, so it would be secure against Steganalysis inspection techniques. This is possible using a technique derived from code obfuscation using random numbers. In summary, we will modify the stego-key transmitted during the communication process, which maps the information in the unaltered cover image. So the original message will be reconstructed by the receiver using the seeds of Pseudo-Random Number Generators, included in the stego-key. The proposed technique is secure against classical steganalysis attacks because it leaves the original and generated stego images unchanged.

Idioma originalInglés
Título de la publicación alojadaProceedings - IEEE 38th Annual International Computers, Software and Applications Conference Workshops, COMPSACW 2014
EditoresCristina Seceleanu, Bruce McMillin, Carl K. Chang, Yan Gao, Kenichi Yoshida, Ali Hurson, Yasuo Okabe, Mihhail Matskin
EditorialInstitute of Electrical and Electronics Engineers Inc.
Páginas164-168
Número de páginas5
ISBN (versión digital)9781479935789
DOI
EstadoPublicada - 18 sep 2014
Evento38th Annual IEEE Computer Software and Applications Conference Workshops, COMPSACW 2014 - Vasteras, Suecia
Duración: 27 jul 201429 jul 2014

Serie de la publicación

NombreProceedings - IEEE 38th Annual International Computers, Software and Applications Conference Workshops, COMPSACW 2014

Conferencia

Conferencia38th Annual IEEE Computer Software and Applications Conference Workshops, COMPSACW 2014
PaísSuecia
CiudadVasteras
Período27/07/1429/07/14

Huella dactilar

Steganography
Inspection
Pixels
Seed
Communication

Citar esto

Gutiérrez-Cárdenas, J. M. (2014). Secret key steganography with message obfuscation by pseudo-random number generators. En C. Seceleanu, B. McMillin, C. K. Chang, Y. Gao, K. Yoshida, A. Hurson, Y. Okabe, ... M. Matskin (Eds.), Proceedings - IEEE 38th Annual International Computers, Software and Applications Conference Workshops, COMPSACW 2014 (pp. 164-168). [6903123] (Proceedings - IEEE 38th Annual International Computers, Software and Applications Conference Workshops, COMPSACW 2014). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/COMPSACW.2014.31
Gutiérrez-Cárdenas, Juan M. / Secret key steganography with message obfuscation by pseudo-random number generators. Proceedings - IEEE 38th Annual International Computers, Software and Applications Conference Workshops, COMPSACW 2014. editor / Cristina Seceleanu ; Bruce McMillin ; Carl K. Chang ; Yan Gao ; Kenichi Yoshida ; Ali Hurson ; Yasuo Okabe ; Mihhail Matskin. Institute of Electrical and Electronics Engineers Inc., 2014. pp. 164-168 (Proceedings - IEEE 38th Annual International Computers, Software and Applications Conference Workshops, COMPSACW 2014).
@inproceedings{85dfed2869a146a0830499ba1458023b,
title = "Secret key steganography with message obfuscation by pseudo-random number generators",
abstract = "Steganography is the art of concealing information within different types of media objects such as images or audio files. Its counterpart, Steganalysis, is the study of methods that uncover information in a suspicious file, which has being altered for stego purposes. Its techniques rely on the inspection of changes at the pixel information level. In this paper, we propose a method for Secret-key Steganography that uses a picture to conceal a message with unaltered pixel information, so it would be secure against Steganalysis inspection techniques. This is possible using a technique derived from code obfuscation using random numbers. In summary, we will modify the stego-key transmitted during the communication process, which maps the information in the unaltered cover image. So the original message will be reconstructed by the receiver using the seeds of Pseudo-Random Number Generators, included in the stego-key. The proposed technique is secure against classical steganalysis attacks because it leaves the original and generated stego images unchanged.",
keywords = "Code Obfuscation, Pseudo-Random Number Generators, Steganalysis, Steganography",
author = "Guti{\'e}rrez-C{\'a}rdenas, {Juan M.}",
year = "2014",
month = "9",
day = "18",
doi = "10.1109/COMPSACW.2014.31",
language = "Ingl{\'e}s",
series = "Proceedings - IEEE 38th Annual International Computers, Software and Applications Conference Workshops, COMPSACW 2014",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
pages = "164--168",
editor = "Cristina Seceleanu and Bruce McMillin and Chang, {Carl K.} and Yan Gao and Kenichi Yoshida and Ali Hurson and Yasuo Okabe and Mihhail Matskin",
booktitle = "Proceedings - IEEE 38th Annual International Computers, Software and Applications Conference Workshops, COMPSACW 2014",

}

Gutiérrez-Cárdenas, JM 2014, Secret key steganography with message obfuscation by pseudo-random number generators. En C Seceleanu, B McMillin, CK Chang, Y Gao, K Yoshida, A Hurson, Y Okabe & M Matskin (eds.), Proceedings - IEEE 38th Annual International Computers, Software and Applications Conference Workshops, COMPSACW 2014., 6903123, Proceedings - IEEE 38th Annual International Computers, Software and Applications Conference Workshops, COMPSACW 2014, Institute of Electrical and Electronics Engineers Inc., pp. 164-168, Vasteras, Suecia, 27/07/14. https://doi.org/10.1109/COMPSACW.2014.31

Secret key steganography with message obfuscation by pseudo-random number generators. / Gutiérrez-Cárdenas, Juan M.

Proceedings - IEEE 38th Annual International Computers, Software and Applications Conference Workshops, COMPSACW 2014. ed. / Cristina Seceleanu; Bruce McMillin; Carl K. Chang; Yan Gao; Kenichi Yoshida; Ali Hurson; Yasuo Okabe; Mihhail Matskin. Institute of Electrical and Electronics Engineers Inc., 2014. p. 164-168 6903123 (Proceedings - IEEE 38th Annual International Computers, Software and Applications Conference Workshops, COMPSACW 2014).

Resultado de la investigación: Capítulo del libro/informe/acta de congresoContribución a la conferenciaInvestigaciónrevisión exhaustiva

TY - GEN

T1 - Secret key steganography with message obfuscation by pseudo-random number generators

AU - Gutiérrez-Cárdenas, Juan M.

PY - 2014/9/18

Y1 - 2014/9/18

N2 - Steganography is the art of concealing information within different types of media objects such as images or audio files. Its counterpart, Steganalysis, is the study of methods that uncover information in a suspicious file, which has being altered for stego purposes. Its techniques rely on the inspection of changes at the pixel information level. In this paper, we propose a method for Secret-key Steganography that uses a picture to conceal a message with unaltered pixel information, so it would be secure against Steganalysis inspection techniques. This is possible using a technique derived from code obfuscation using random numbers. In summary, we will modify the stego-key transmitted during the communication process, which maps the information in the unaltered cover image. So the original message will be reconstructed by the receiver using the seeds of Pseudo-Random Number Generators, included in the stego-key. The proposed technique is secure against classical steganalysis attacks because it leaves the original and generated stego images unchanged.

AB - Steganography is the art of concealing information within different types of media objects such as images or audio files. Its counterpart, Steganalysis, is the study of methods that uncover information in a suspicious file, which has being altered for stego purposes. Its techniques rely on the inspection of changes at the pixel information level. In this paper, we propose a method for Secret-key Steganography that uses a picture to conceal a message with unaltered pixel information, so it would be secure against Steganalysis inspection techniques. This is possible using a technique derived from code obfuscation using random numbers. In summary, we will modify the stego-key transmitted during the communication process, which maps the information in the unaltered cover image. So the original message will be reconstructed by the receiver using the seeds of Pseudo-Random Number Generators, included in the stego-key. The proposed technique is secure against classical steganalysis attacks because it leaves the original and generated stego images unchanged.

KW - Code Obfuscation

KW - Pseudo-Random Number Generators

KW - Steganalysis

KW - Steganography

UR - http://www.scopus.com/inward/record.url?scp=84931073104&partnerID=8YFLogxK

U2 - 10.1109/COMPSACW.2014.31

DO - 10.1109/COMPSACW.2014.31

M3 - Contribución a la conferencia

T3 - Proceedings - IEEE 38th Annual International Computers, Software and Applications Conference Workshops, COMPSACW 2014

SP - 164

EP - 168

BT - Proceedings - IEEE 38th Annual International Computers, Software and Applications Conference Workshops, COMPSACW 2014

A2 - Seceleanu, Cristina

A2 - McMillin, Bruce

A2 - Chang, Carl K.

A2 - Gao, Yan

A2 - Yoshida, Kenichi

A2 - Hurson, Ali

A2 - Okabe, Yasuo

A2 - Matskin, Mihhail

PB - Institute of Electrical and Electronics Engineers Inc.

ER -

Gutiérrez-Cárdenas JM. Secret key steganography with message obfuscation by pseudo-random number generators. En Seceleanu C, McMillin B, Chang CK, Gao Y, Yoshida K, Hurson A, Okabe Y, Matskin M, editores, Proceedings - IEEE 38th Annual International Computers, Software and Applications Conference Workshops, COMPSACW 2014. Institute of Electrical and Electronics Engineers Inc. 2014. p. 164-168. 6903123. (Proceedings - IEEE 38th Annual International Computers, Software and Applications Conference Workshops, COMPSACW 2014). https://doi.org/10.1109/COMPSACW.2014.31