Detection of LSB Steganography via Sample Pair Analysis
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
Data Masking: A New Approach for Steganography?
Journal of VLSI Signal Processing Systems
The NIST Cryptographic Workshop on Hash Functions
IEEE Security and Privacy
Steganographic Schemes for File System and B-Tree
IEEE Transactions on Knowledge and Data Engineering
A note on the limits of collusion-resistant watermarks
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
IEEE Transactions on Information Theory
Information-theoretic analysis of information hiding
IEEE Transactions on Information Theory
A framework for evaluating the data-hiding capacity of image sources
IEEE Transactions on Image Processing
Hi-index | 0.00 |
The paper presents an image/legal-document authentication and secures message transmission technique by embedding message/image/message-digest into color images. Image authentication is done by embedding message/image within the image pixels of source image. Legal document authentication is done by embedding the authenticating image and self generated message digest (generated from signed document part) into the image part of the legal document. The position of insertion is chosen within each byte of source image using XOR operation between upper three bits of each source byte and k where k is any number from 0 to 7. Three bits of authenticating message/image/message-digest are embedded in each byte of source image. Fabrication process starts with the dimension of authenticating image followed by message digest (MD) and ends by embedding the content of authenticating message/image. To enhance the security further a layer has also been fabricated by XOR operation of the embedded image with another self generated MD key obtained from the source image. The decoding is done by applying the reverse algorithm. Experimental results are tested with the aid of Histogram analysis, noise analysis, standard deviation computation and PSNR, IF, MSE analysis of the source and embedded image and has been compared with popular existing steganographic algorithms like S-Tools where the proposed ATILD is capable to hide large volume of data than S-Tools and shows better performance. The proposed ATILD technique also shows high amount of sustainability against various attacks.