Secret Key Steganography with Message Obfuscation by Pseudo-random Number Generators

Descripción del Articulo

Steganography is the art of concealing information within different types of media objects such as images or audio files. Its counterpart, Steganalysis, is the study of methods that uncover information in a suspicious file, which has being altered for stego purposes. Its techniques rely on the inspe...

Descripción completa

Detalles Bibliográficos
Autor: Gutiérrez Cárdenas, Juan M.
Formato: objeto de conferencia
Fecha de Publicación:2014
Institución:Universidad San Ignacio de Loyola
Repositorio:USIL-Institucional
Lenguaje:inglés
OAI Identifier:oai:repositorio.usil.edu.pe:20.500.14005/1663
Enlace del recurso:http://dx.doi.org/10.1109/COMPSACW.2014.31
https://hdl.handle.net/20.500.14005/1663
Nivel de acceso:acceso embargado
Materia:Seguridad en computadores
Criptografía
Steganography
Steganalysis
id USIL_36d016717a3b834a29fc1ea77464ce00
oai_identifier_str oai:repositorio.usil.edu.pe:20.500.14005/1663
network_acronym_str USIL
network_name_str USIL-Institucional
repository_id_str 3128
spelling ea1878b3-7bff-4c47-9ee6-f0fae9678b74-1Gutiérrez Cárdenas, Juan M.2016-03-14T15:03:33Z2016-03-14T15:03:33Z2014-07-25Steganography is the art of concealing information within different types of media objects such as images or audio files. Its counterpart, Steganalysis, is the study of methods that uncover information in a suspicious file, which has being altered for stego purposes. Its techniques rely on the inspection of changes at the pixel information level. In this paper, we propose a method for Secret-key Steganography that uses a picture to conceal a message with unaltered pixel information, so it would be secure against Steganalysis inspection techniques. This is possible using a technique derived from code obfuscation using random numbers. In summary, we will modify the stego-key transmitted during the communication process, which maps the information in the unaltered cover image. So the original message will be reconstructed by the receiver using the seeds of Pseudo-Random Number Generators, included in the stego-key. The proposed technique is secure against classical steganalysis attacks because it leaves the original and generated stego images unchanged.application/pdfGutiérrez-Cárdenas, J. M. (2014, Julio). Secret Key Steganography with Message Obfuscation by Pseudo-random Number Generators. En Computer Software and Applications Conference Workshops (COMPSACW), 2014 IEEE 38th International (pp. 164-168).http://dx.doi.org/10.1109/COMPSACW.2014.31https://hdl.handle.net/20.500.14005/1663000352787700028engInstitute of Electrical and Electronics EngineersComputer Software and Applications Conference Workshops (COMPSACW), 2014 IEEE; 38th InternationalComputer Software and Applications Conference Workshops (COMPSACW), 2014 IEEE; 38th Internationalinfo:eu-repo/semantics/embargoedAccessUniversidad San Ignacio de LoyolaRepositorio Institucional - USILreponame:USIL-Institucionalinstname:Universidad San Ignacio de Loyolainstacron:USILSeguridad en computadoresCriptografíaSteganographySteganalysisSecret Key Steganography with Message Obfuscation by Pseudo-random Number Generatorsinfo:eu-repo/semantics/conferenceObjectPublicationORIGINAL2014_Gutierrez_Secret-Key-Steganography-with-Message-Obfuscation-by-Pseudo-random.pdf2014_Gutierrez_Secret-Key-Steganography-with-Message-Obfuscation-by-Pseudo-random.pdfapplication/pdf305528https://repositorio.usil.edu.pe/bitstreams/781902f4-1f28-4f16-bf14-31623bf314cd/downloadd616d65e18819aa46daf15cb2ce971b5MD53TEXT2014_Gutierrez_Secret-Key-Steganography-with-Message-Obfuscation-by-Pseudo-random.pdf.txt2014_Gutierrez_Secret-Key-Steganography-with-Message-Obfuscation-by-Pseudo-random.pdf.txtExtracted texttext/plain21953https://repositorio.usil.edu.pe/bitstreams/74cd4058-28b0-4d4a-99bb-da8d649e05f4/download94b95daf41a63d5638ec32a40e083712MD54THUMBNAIL2014_Gutierrez_Secret-Key-Steganography-with-Message-Obfuscation-by-Pseudo-random.pdf.jpg2014_Gutierrez_Secret-Key-Steganography-with-Message-Obfuscation-by-Pseudo-random.pdf.jpgGenerated Thumbnailimage/jpeg15895https://repositorio.usil.edu.pe/bitstreams/ed94719f-d50b-489b-a679-ab10700a9c91/download5fe2926c567015b633265a36119ce83cMD5520.500.14005/1663oai:repositorio.usil.edu.pe:20.500.14005/16632023-04-17 09:56:44.532https://repositorio.usil.edu.peRepositorio institucional de la Universidad San Ignacio de Loyolarepositorio.institucional@usil.edu.pe
dc.title.en.fl_str_mv Secret Key Steganography with Message Obfuscation by Pseudo-random Number Generators
title Secret Key Steganography with Message Obfuscation by Pseudo-random Number Generators
spellingShingle Secret Key Steganography with Message Obfuscation by Pseudo-random Number Generators
Gutiérrez Cárdenas, Juan M.
Seguridad en computadores
Criptografía
Steganography
Steganalysis
title_short Secret Key Steganography with Message Obfuscation by Pseudo-random Number Generators
title_full Secret Key Steganography with Message Obfuscation by Pseudo-random Number Generators
title_fullStr Secret Key Steganography with Message Obfuscation by Pseudo-random Number Generators
title_full_unstemmed Secret Key Steganography with Message Obfuscation by Pseudo-random Number Generators
title_sort Secret Key Steganography with Message Obfuscation by Pseudo-random Number Generators
author Gutiérrez Cárdenas, Juan M.
author_facet Gutiérrez Cárdenas, Juan M.
author_role author
dc.contributor.author.fl_str_mv Gutiérrez Cárdenas, Juan M.
dc.subject.en.fl_str_mv Seguridad en computadores
Criptografía
topic Seguridad en computadores
Criptografía
Steganography
Steganalysis
dc.subject.none.fl_str_mv Steganography
dc.subject.es.fl_str_mv Steganalysis
description Steganography is the art of concealing information within different types of media objects such as images or audio files. Its counterpart, Steganalysis, is the study of methods that uncover information in a suspicious file, which has being altered for stego purposes. Its techniques rely on the inspection of changes at the pixel information level. In this paper, we propose a method for Secret-key Steganography that uses a picture to conceal a message with unaltered pixel information, so it would be secure against Steganalysis inspection techniques. This is possible using a technique derived from code obfuscation using random numbers. In summary, we will modify the stego-key transmitted during the communication process, which maps the information in the unaltered cover image. So the original message will be reconstructed by the receiver using the seeds of Pseudo-Random Number Generators, included in the stego-key. The proposed technique is secure against classical steganalysis attacks because it leaves the original and generated stego images unchanged.
publishDate 2014
dc.date.accessioned.none.fl_str_mv 2016-03-14T15:03:33Z
dc.date.available.none.fl_str_mv 2016-03-14T15:03:33Z
dc.date.issued.fl_str_mv 2014-07-25
dc.type.none.fl_str_mv info:eu-repo/semantics/conferenceObject
format conferenceObject
dc.identifier.citation.es.fl_str_mv Gutiérrez-Cárdenas, J. M. (2014, Julio). Secret Key Steganography with Message Obfuscation by Pseudo-random Number Generators. En Computer Software and Applications Conference Workshops (COMPSACW), 2014 IEEE 38th International (pp. 164-168).
dc.identifier.uri.none.fl_str_mv http://dx.doi.org/10.1109/COMPSACW.2014.31
https://hdl.handle.net/20.500.14005/1663
dc.identifier.wos.none.fl_str_mv 000352787700028
identifier_str_mv Gutiérrez-Cárdenas, J. M. (2014, Julio). Secret Key Steganography with Message Obfuscation by Pseudo-random Number Generators. En Computer Software and Applications Conference Workshops (COMPSACW), 2014 IEEE 38th International (pp. 164-168).
000352787700028
url http://dx.doi.org/10.1109/COMPSACW.2014.31
https://hdl.handle.net/20.500.14005/1663
dc.language.iso.none.fl_str_mv eng
language eng
dc.relation.en.fl_str_mv Computer Software and Applications Conference Workshops (COMPSACW), 2014 IEEE; 38th International
dc.relation.ispartof.en.fl_str_mv Computer Software and Applications Conference Workshops (COMPSACW), 2014 IEEE; 38th International
dc.rights.none.fl_str_mv info:eu-repo/semantics/embargoedAccess
eu_rights_str_mv embargoedAccess
dc.format.none.fl_str_mv application/pdf
dc.publisher.none.fl_str_mv Institute of Electrical and Electronics Engineers
publisher.none.fl_str_mv Institute of Electrical and Electronics Engineers
dc.source.es_ES.fl_str_mv Universidad San Ignacio de Loyola
Repositorio Institucional - USIL
dc.source.none.fl_str_mv reponame:USIL-Institucional
instname:Universidad San Ignacio de Loyola
instacron:USIL
instname_str Universidad San Ignacio de Loyola
instacron_str USIL
institution USIL
reponame_str USIL-Institucional
collection USIL-Institucional
bitstream.url.fl_str_mv https://repositorio.usil.edu.pe/bitstreams/781902f4-1f28-4f16-bf14-31623bf314cd/download
https://repositorio.usil.edu.pe/bitstreams/74cd4058-28b0-4d4a-99bb-da8d649e05f4/download
https://repositorio.usil.edu.pe/bitstreams/ed94719f-d50b-489b-a679-ab10700a9c91/download
bitstream.checksum.fl_str_mv d616d65e18819aa46daf15cb2ce971b5
94b95daf41a63d5638ec32a40e083712
5fe2926c567015b633265a36119ce83c
bitstream.checksumAlgorithm.fl_str_mv MD5
MD5
MD5
repository.name.fl_str_mv Repositorio institucional de la Universidad San Ignacio de Loyola
repository.mail.fl_str_mv repositorio.institucional@usil.edu.pe
_version_ 1847610756787339264
score 13.130007
Nota importante:
La información contenida en este registro es de entera responsabilidad de la institución que gestiona el repositorio institucional donde esta contenido este documento o set de datos. El CONCYTEC no se hace responsable por los contenidos (publicaciones y/o datos) accesibles a través del Repositorio Nacional Digital de Ciencia, Tecnología e Innovación de Acceso Abierto (ALICIA).