TY - GEN
T1 - Secret key steganography with message obfuscation by pseudo-random number generators
AU - Gutiérrez-Cárdenas, Juan M.
N1 - Publisher Copyright:
© 2014 IEEE.
PY - 2014/9/18
Y1 - 2014/9/18
N2 - Steganography is the art of concealing information within different types of media objects such as images or audio files. Its counterpart, Steganalysis, is the study of methods that uncover information in a suspicious file, which has being altered for stego purposes. Its techniques rely on the inspection of changes at the pixel information level. In this paper, we propose a method for Secret-key Steganography that uses a picture to conceal a message with unaltered pixel information, so it would be secure against Steganalysis inspection techniques. This is possible using a technique derived from code obfuscation using random numbers. In summary, we will modify the stego-key transmitted during the communication process, which maps the information in the unaltered cover image. So the original message will be reconstructed by the receiver using the seeds of Pseudo-Random Number Generators, included in the stego-key. The proposed technique is secure against classical steganalysis attacks because it leaves the original and generated stego images unchanged.
AB - Steganography is the art of concealing information within different types of media objects such as images or audio files. Its counterpart, Steganalysis, is the study of methods that uncover information in a suspicious file, which has being altered for stego purposes. Its techniques rely on the inspection of changes at the pixel information level. In this paper, we propose a method for Secret-key Steganography that uses a picture to conceal a message with unaltered pixel information, so it would be secure against Steganalysis inspection techniques. This is possible using a technique derived from code obfuscation using random numbers. In summary, we will modify the stego-key transmitted during the communication process, which maps the information in the unaltered cover image. So the original message will be reconstructed by the receiver using the seeds of Pseudo-Random Number Generators, included in the stego-key. The proposed technique is secure against classical steganalysis attacks because it leaves the original and generated stego images unchanged.
KW - Code Obfuscation
KW - Pseudo-Random Number Generators
KW - Steganalysis
KW - Steganography
UR - http://www.scopus.com/inward/record.url?scp=84931073104&partnerID=8YFLogxK
U2 - 10.1109/COMPSACW.2014.31
DO - 10.1109/COMPSACW.2014.31
M3 - Contribución a la conferencia
AN - SCOPUS:84931073104
T3 - Proceedings - IEEE 38th Annual International Computers, Software and Applications Conference Workshops, COMPSACW 2014
SP - 164
EP - 168
BT - Proceedings - IEEE 38th Annual International Computers, Software and Applications Conference Workshops, COMPSACW 2014
A2 - Seceleanu, Cristina
A2 - McMillin, Bruce
A2 - Chang, Carl K.
A2 - Gao, Yan
A2 - Yoshida, Kenichi
A2 - Hurson, Ali
A2 - Okabe, Yasuo
A2 - Matskin, Mihhail
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 38th Annual IEEE Computer Software and Applications Conference Workshops, COMPSACW 2014
Y2 - 27 July 2014 through 29 July 2014
ER -