STEGANOGRAPHY EFFECTS IN VARIOUS FORMATS OF IMAGES. A PRELIMINARY STUDY

Authors

  • Giuseppe Mastronardi
  • Marcello Castellano
  • Francescomaria Marino

DOI:

https://doi.org/10.47839/ijc.1.1.68

Keywords:

Data hiding, steganography, cryptography, encryption, decryption

Abstract

In this paper the effects of steganography in different image formats (BMP, GIF, JPEG and DWTcoded) are studied. With respect to these formats, we try to give an answer to the following questions: 'how many bits of noise (i.e. the textual secret message) can be injected without perceptually deteriorating the quality of the image?' and 'how and where to inject these bits in order to achieve the best tradeoff in terms of length of the textual message and preserved quality of the image?'

References

W. Bender, D. Gruhl, N. Morimoto, A. Lu. Techniques for Data Hiding. I.B.M. Systems Jour­nal, vol. 35, no. 3­4, 1996, p. 313-­336.

N.F. Johnson, Sushil Jajodia. Exploring Steganography: Seeing the Unseen. Computer Sci­ence, vol. 31, no. 2, February 1998, p. 26-­34.

N.F. Johnson, Sushil Jajodia. Steganalysis: The Investigation of Hidden Infor­mation. Proceedings of the IEEE Information Technology Confer­ence, Syracuse, New York, USA, September 1998, p. 113-­116.

F.A.P. Petitcolas, R.J. Anderson, M.G. Kuhn. Informa­tion Hiding – A Survey. Proceed­ings of the IEEE (USA), vol. 87, no. 7, July 1999, p. 1062-­1078.

J.K. Wallace. The JPEG Still Picture Compression Stan­dard. Communications of the ACM, vol. 34, no. 4, 1991. p. 31-44.

A.B. Watson. Image Compression using the Discrete Cosine Transform. Mathematica Journal, vol. 4, no. 1, 1994. p. 81-­88.

F. Marino, T. Acharya, L. J. Karam. Wave­let ­Based Perceptually Lossless Coding of R­G­B Images. Journal of Integrated Computer­ Aided Engineering, Special Issue on Industrial Applica­tions of the Wavelet Transforms, vol. 7, no. 2 (2000). p. 117-­134.

A. Said, W. A. Pearlman, “A New Fast and Efficient Image Codec Based on Set Partitioning into Hierarchical Trees,” IEEE Transactions on Circuits Systems Video Technology, vol. 6, June 1996, pp.243-­250.

D.E. Knuth. The Art of Computer Pro­gramming ­ Vol. 2, Seminumerical Algorithms. Addison­ Wesley. Reading, MA, 1969.

H.S. Bright, R.L. Enison. Quasi­Random Number Sequences from a Long­Period TLP Gen­erator with Remarks on Application to Cryptogra­phy. ACM Computing Surveys vol. 11, no. 4, 1979, pp. 357-­370.

P. Bratley, B.L. Fox, L.E. Schage. Uniform Random Numbers. in A Guide to Simulation. Springer Verlag, 1995, pp. 180-­213.

G. Mastronardi. A Combination of Pseudo­random Number Generators Appl ied to the Stegano­graphy. in Abstracts of SIMAI’2000 Con­gress, Ischia (Italy). June 2000, p. 756-­757.

Downloads

Published

2002-10-31

How to Cite

Mastronardi, G., Castellano, M., & Marino, F. (2002). STEGANOGRAPHY EFFECTS IN VARIOUS FORMATS OF IMAGES. A PRELIMINARY STUDY. International Journal of Computing, 1(1), 18-22. https://doi.org/10.47839/ijc.1.1.68

Issue

Section

Articles