Evaluation of Pixel-based Steganography and Stegodetection Methods

Research output: Contribution to journalArticle

Abstract

Steganography is a process that involves hiding a message in an appropriate carrier for example an image or an audio file. The carrier can then be sent to a receiver without anyone else knowing that it contains a hidden message. This is a process, which can be used for example by civil rights organisations in repressive states to communicate their message to the outside world without their own government being aware of it. Less virtuously it can be used by terrorists to communicate with one another without anyone else’s knowledge. In both cases the objective is not to make it difficult to read the message as cryptography does, it is to hide the existence of the message in the first place possibly to protect the courier. The aim of this study was to investigate, implement and evaluate a number of common methods of pixel based steganography. The strengths and weaknesses of the chosen methods were be analysed. To provide a common frame of reference all of the steganography methods implemented and analysed used GIF images. Eight steganography methods were implemented. The methods were chosen for their different strengths in terms of resistance to different types of steganalysis or their ability to maximise the size of the message they could store. All of the methods used were based on the manipulation of the least significant bits of pixel values or the rearrangement of colours to create least significant bit(s) or parity patterns, which correspond to the message being hidden.
LanguageEnglish
Pages131-150
JournalImaging Science Journal
Volume52
Issue number3
Publication statusPublished - 1 Sep 2004

Fingerprint

Steganography
Pixels
Cryptography
Color

Cite this

@article{0dbc25e60a394d739afe284910f1d5c9,
title = "Evaluation of Pixel-based Steganography and Stegodetection Methods",
abstract = "Steganography is a process that involves hiding a message in an appropriate carrier for example an image or an audio file. The carrier can then be sent to a receiver without anyone else knowing that it contains a hidden message. This is a process, which can be used for example by civil rights organisations in repressive states to communicate their message to the outside world without their own government being aware of it. Less virtuously it can be used by terrorists to communicate with one another without anyone else’s knowledge. In both cases the objective is not to make it difficult to read the message as cryptography does, it is to hide the existence of the message in the first place possibly to protect the courier. The aim of this study was to investigate, implement and evaluate a number of common methods of pixel based steganography. The strengths and weaknesses of the chosen methods were be analysed. To provide a common frame of reference all of the steganography methods implemented and analysed used GIF images. Eight steganography methods were implemented. The methods were chosen for their different strengths in terms of resistance to different types of steganalysis or their ability to maximise the size of the message they could store. All of the methods used were based on the manipulation of the least significant bits of pixel values or the rearrangement of colours to create least significant bit(s) or parity patterns, which correspond to the message being hidden.",
author = "K Bailey and K Curran and Joan Condell",
year = "2004",
month = "9",
day = "1",
language = "English",
volume = "52",
pages = "131--150",
journal = "Imaging Science Journal",
issn = "1368-2199",
number = "3",

}

Evaluation of Pixel-based Steganography and Stegodetection Methods. / Bailey, K; Curran, K; Condell, Joan.

In: Imaging Science Journal, Vol. 52, No. 3, 01.09.2004, p. 131-150.

Research output: Contribution to journalArticle

TY - JOUR

T1 - Evaluation of Pixel-based Steganography and Stegodetection Methods

AU - Bailey, K

AU - Curran, K

AU - Condell, Joan

PY - 2004/9/1

Y1 - 2004/9/1

N2 - Steganography is a process that involves hiding a message in an appropriate carrier for example an image or an audio file. The carrier can then be sent to a receiver without anyone else knowing that it contains a hidden message. This is a process, which can be used for example by civil rights organisations in repressive states to communicate their message to the outside world without their own government being aware of it. Less virtuously it can be used by terrorists to communicate with one another without anyone else’s knowledge. In both cases the objective is not to make it difficult to read the message as cryptography does, it is to hide the existence of the message in the first place possibly to protect the courier. The aim of this study was to investigate, implement and evaluate a number of common methods of pixel based steganography. The strengths and weaknesses of the chosen methods were be analysed. To provide a common frame of reference all of the steganography methods implemented and analysed used GIF images. Eight steganography methods were implemented. The methods were chosen for their different strengths in terms of resistance to different types of steganalysis or their ability to maximise the size of the message they could store. All of the methods used were based on the manipulation of the least significant bits of pixel values or the rearrangement of colours to create least significant bit(s) or parity patterns, which correspond to the message being hidden.

AB - Steganography is a process that involves hiding a message in an appropriate carrier for example an image or an audio file. The carrier can then be sent to a receiver without anyone else knowing that it contains a hidden message. This is a process, which can be used for example by civil rights organisations in repressive states to communicate their message to the outside world without their own government being aware of it. Less virtuously it can be used by terrorists to communicate with one another without anyone else’s knowledge. In both cases the objective is not to make it difficult to read the message as cryptography does, it is to hide the existence of the message in the first place possibly to protect the courier. The aim of this study was to investigate, implement and evaluate a number of common methods of pixel based steganography. The strengths and weaknesses of the chosen methods were be analysed. To provide a common frame of reference all of the steganography methods implemented and analysed used GIF images. Eight steganography methods were implemented. The methods were chosen for their different strengths in terms of resistance to different types of steganalysis or their ability to maximise the size of the message they could store. All of the methods used were based on the manipulation of the least significant bits of pixel values or the rearrangement of colours to create least significant bit(s) or parity patterns, which correspond to the message being hidden.

M3 - Article

VL - 52

SP - 131

EP - 150

JO - Imaging Science Journal

T2 - Imaging Science Journal

JF - Imaging Science Journal

SN - 1368-2199

IS - 3

ER -