Secret key steganography with message obfuscation by pseudo-random number generators

Research output: Contribution to conferencePaper (Contribution to a conference)

3 Scopus citations

Abstract

© 2014 IEEE. Steganography is the art of concealing information within different types of media objects such as images or audio files. Its counterpart, Steganalysis, is the study of methods that uncover information in a suspicious file, which has being altered for stego purposes. Its techniques rely on the inspection of changes at the pixel information level. In this paper, we propose a method for Secret-key Steganography that uses a picture to conceal a message with unaltered pixel information, so it would be secure against Steganalysis inspection techniques. This is possible using a technique derived from code obfuscation using random numbers. In summary, we will modify the stego-key transmitted during the communication process, which maps the information in the unaltered cover image. So the original message will be reconstructed by the receiver using the seeds of Pseudo-Random Number Generators, included in the stego-key. The proposed technique is secure against classical steganalysis attacks because it leaves the original and generated stego images unchanged.
Original languageAmerican English
Pages164-168
Number of pages5
DOIs
StatePublished - 18 Sep 2014
Externally publishedYes
EventProceedings - IEEE 38th Annual International Computers, Software and Applications Conference Workshops, COMPSACW 2014 -
Duration: 18 Sep 2014 → …

Conference

ConferenceProceedings - IEEE 38th Annual International Computers, Software and Applications Conference Workshops, COMPSACW 2014
Period18/09/14 → …

Fingerprint Dive into the research topics of 'Secret key steganography with message obfuscation by pseudo-random number generators'. Together they form a unique fingerprint.

  • Cite this

    Gutiérrez-Cárdenas, J. M. (2014). Secret key steganography with message obfuscation by pseudo-random number generators. 164-168. Paper presented at Proceedings - IEEE 38th Annual International Computers, Software and Applications Conference Workshops, COMPSACW 2014, . https://doi.org/10.1109/COMPSACW.2014.31