False and multi-secret steganography in digital images

Verfasser / Beitragende:
[Marek Ogiela, Katarzyna Koptyra]
Ort, Verlag, Jahr:
2015
Enthalten in:
Soft Computing, 19/11(2015-11-01), 3331-3339
Format:
Artikel (online)
ID: 605470863
LEADER caa a22 4500
001 605470863
003 CHVBK
005 20210128100330.0
007 cr unu---uuuuu
008 210128e20151101xx s 000 0 eng
024 7 0 |a 10.1007/s00500-015-1728-z  |2 doi 
035 |a (NATIONALLICENCE)springer-10.1007/s00500-015-1728-z 
245 0 0 |a False and multi-secret steganography in digital images  |h [Elektronische Daten]  |c [Marek Ogiela, Katarzyna Koptyra] 
520 3 |a This paper presents the new concepts of multi-secret and false digital image steganography. The main idea of such approaches is to embed in a single container (digital image) more than one message. The hidden secrets are called real and false messages, respectively. The first one contains essential data which are intended to be securely transferred between different parties, the latter is a bait for focusing attention on an unimportant message. This false and multi-secret steganography will be broken when existence of the real message is revealed, it does not matter whether the false message is detected. Such concepts may find many different applications, especially in situations where communication channel between a sender and a receiver is closely monitored and the warden suspects that the steganography is used. In that case it is probable that the transmitted data will be analyzed in a very detailed way. The concepts described in this paper can help to overcome this problem by dropping a fabricated message and thereby deceiving the warden. The possibility of sending both real and false information at the same time can be seen as additional benefit. In fact, the presented idea allows to establish a kind of subliminal channel while transferring hidden information using digital images. 
540 |a The Author(s), 2015 
690 7 |a Cryptographic protocols  |2 nationallicence 
690 7 |a Digital image steganography  |2 nationallicence 
690 7 |a Information hiding  |2 nationallicence 
690 7 |a Intelligent information splitting  |2 nationallicence 
690 7 |a Multi-secret steganography  |2 nationallicence 
700 1 |a Ogiela  |D Marek  |u Cryptography and Cognitive Informatics Research Group, AGH University of Science and Technology, Al. Mickiewicza 30, 30-059, Kraków, Poland  |4 aut 
700 1 |a Koptyra  |D Katarzyna  |u Cryptography and Cognitive Informatics Research Group, AGH University of Science and Technology, Al. Mickiewicza 30, 30-059, Kraków, Poland  |4 aut 
773 0 |t Soft Computing  |d Springer Berlin Heidelberg  |g 19/11(2015-11-01), 3331-3339  |x 1432-7643  |q 19:11<3331  |1 2015  |2 19  |o 500 
856 4 0 |u https://doi.org/10.1007/s00500-015-1728-z  |q text/html  |z Onlinezugriff via DOI 
898 |a BK010053  |b XK010053  |c XK010000 
900 7 |a Metadata rights reserved  |b Springer special CC-BY-NC licence  |2 nationallicence 
908 |D 1  |a research-article  |2 jats 
949 |B NATIONALLICENCE  |F NATIONALLICENCE  |b NL-springer 
950 |B NATIONALLICENCE  |P 856  |E 40  |u https://doi.org/10.1007/s00500-015-1728-z  |q text/html  |z Onlinezugriff via DOI 
950 |B NATIONALLICENCE  |P 700  |E 1-  |a Ogiela  |D Marek  |u Cryptography and Cognitive Informatics Research Group, AGH University of Science and Technology, Al. Mickiewicza 30, 30-059, Kraków, Poland  |4 aut 
950 |B NATIONALLICENCE  |P 700  |E 1-  |a Koptyra  |D Katarzyna  |u Cryptography and Cognitive Informatics Research Group, AGH University of Science and Technology, Al. Mickiewicza 30, 30-059, Kraków, Poland  |4 aut 
950 |B NATIONALLICENCE  |P 773  |E 0-  |t Soft Computing  |d Springer Berlin Heidelberg  |g 19/11(2015-11-01), 3331-3339  |x 1432-7643  |q 19:11<3331  |1 2015  |2 19  |o 500