AUTHORS: Nashat Albdour
Download as PDF
ABSTRACT: The method of effective extraction of image cells for realization of steganographic protection of information is proposed in the paper. On the basis of the proposed method, a method for constructing a container is proposed as represented by a graphic file. The main units of the steganographic system are developed on the basis of the proposed method of a graphic container constructing. To increase the number of the extracted cells, noise is added to the image. Noise cells are also used to embed message bits. The schemes and VHDL models of the cell extraction unit are developed.
KEYWORDS: steganography, image, cellular automaton, extraction of isolated cells, image noise, container.
REFERENCES:
[1] Hedieh S. “Recent Advances in Steganography”, InTech; 2012.
[2] Gregory K. “Investigator's Guide to Steganography”, Auerbach; 2003.
[3] Eric C. Hiding in Plain Sight: Steganography and the Art of Covert Communication. Wiley; 2003.
[4] Petitcolas F, Anderson R, Kuhn M. Information Hiding: A survey. Proceedings of the IEEE. 1999; 87 (7): 1062–78.
[5] Fridrich J, Goljan M, Soukal D. Searching for the Stego Key. Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VI. 2004. 5306: 70–82.
[6] Shilpa G, Geeta G, Neha A. Enhanced Least Significant Bit Algorithm for Image Steganography. IJCEM International Journal of Computational Engineering & Management. 2012. 15 (4): 40-42.
[7] Raja K, Chowdary C, Venugopal K, Patnaik L. A Secure Image Steganography using LSB, DCT and Compression Techniques on R aw Images. Proc. IEEE. 2005.
[8] Lokeswara V, Reddy S, Reddy C. Implementation of LSB Steganography and its Evaluation for Various File Formats. Int. J. Advanced Networking and Applications. 2011; 02 (05): 868-872.
[9] Sahoo G, Tiwari R. Designing an Embedded Algorithm for Data Hiding using Steganographic Technique by File Hybridization. International Journal of Computer Science and Network Security. 2008; 8 (1): 228-233.
[10] Saha B, Shuchi S. Steganographic Techniques of Data Hiding using Digital Images. Defense Science Journal. 2012; 62 (1): 11-18.
[11] Wolfram S. Cellular automata. Los Alamos Science. 1983. 9 (1), 1983: 2-21.
[12] Stepan B. Models and hardware implementation of methods of Pre-processing Images based on the Cellular Automata. Advances in Image and Video Processing. 2014; 2 (5): 76-90.
[13] Stepan B. Formation Methods, Models, and Hardware Implementation of Pseudorandom Number Generators: Emerging Research and Opportunities. IGI Global; 2017.
[14] Stepan B, Mykola B, Ruslan M, Andrii B, Sergii B. Designing of the Pseudorandom Number Generators on the Basis on TwoDimensional Cellular Automata. Proceedings of the 1st International 62 Conference on A pplied Physics, System 63 S cience and Computers (APSAC2016). 2016: 137-143.
[15] Stepan B, Mykola B, Sergii B. Research of the method of pseudo-random number generation based on a synchronous cellular automata with several active cells. MATEC Web of Conferences, 2017: 1-6.