Secret Key Steganography with Message Obfuscation by Pseudo-random Number Generators
Descripción del Articulo
        Steganography is the art of concealing information within different types of media objects such as images or audio files. Its counterpart, Steganalysis, is the study of methods that uncover information in a suspicious file, which has being altered for stego purposes. Its techniques rely on the inspe...
              
            
    
                        | Autor: | |
|---|---|
| Formato: | objeto de conferencia | 
| Fecha de Publicación: | 2014 | 
| Institución: | Universidad San Ignacio de Loyola | 
| Repositorio: | USIL-Institucional | 
| Lenguaje: | inglés | 
| OAI Identifier: | oai:repositorio.usil.edu.pe:20.500.14005/1663 | 
| Enlace del recurso: | http://dx.doi.org/10.1109/COMPSACW.2014.31 https://hdl.handle.net/20.500.14005/1663  | 
| Nivel de acceso: | acceso embargado | 
| Materia: | Seguridad en computadores Criptografía Steganography Steganalysis  | 
| id | 
                  USIL_36d016717a3b834a29fc1ea77464ce00 | 
    
|---|---|
| oai_identifier_str | 
                  oai:repositorio.usil.edu.pe:20.500.14005/1663 | 
    
| network_acronym_str | 
                  USIL | 
    
| network_name_str | 
                  USIL-Institucional | 
    
| repository_id_str | 
                  3128 | 
    
| spelling | 
                  ea1878b3-7bff-4c47-9ee6-f0fae9678b74-1Gutiérrez Cárdenas, Juan M.2016-03-14T15:03:33Z2016-03-14T15:03:33Z2014-07-25Steganography is the art of concealing information within different types of media objects such as images or audio files. Its counterpart, Steganalysis, is the study of methods that uncover information in a suspicious file, which has being altered for stego purposes. Its techniques rely on the inspection of changes at the pixel information level. In this paper, we propose a method for Secret-key Steganography that uses a picture to conceal a message with unaltered pixel information, so it would be secure against Steganalysis inspection techniques. This is possible using a technique derived from code obfuscation using random numbers. In summary, we will modify the stego-key transmitted during the communication process, which maps the information in the unaltered cover image. So the original message will be reconstructed by the receiver using the seeds of Pseudo-Random Number Generators, included in the stego-key. The proposed technique is secure against classical steganalysis attacks because it leaves the original and generated stego images unchanged.application/pdfGutiérrez-Cárdenas, J. M. (2014, Julio). Secret Key Steganography with Message Obfuscation by Pseudo-random Number Generators. En Computer Software and Applications Conference Workshops (COMPSACW), 2014 IEEE 38th International (pp. 164-168).http://dx.doi.org/10.1109/COMPSACW.2014.31https://hdl.handle.net/20.500.14005/1663000352787700028engInstitute of Electrical and Electronics EngineersComputer Software and Applications Conference Workshops (COMPSACW), 2014 IEEE; 38th InternationalComputer Software and Applications Conference Workshops (COMPSACW), 2014 IEEE; 38th Internationalinfo:eu-repo/semantics/embargoedAccessUniversidad San Ignacio de LoyolaRepositorio Institucional - USILreponame:USIL-Institucionalinstname:Universidad San Ignacio de Loyolainstacron:USILSeguridad en computadoresCriptografíaSteganographySteganalysisSecret Key Steganography with Message Obfuscation by Pseudo-random Number Generatorsinfo:eu-repo/semantics/conferenceObjectPublicationORIGINAL2014_Gutierrez_Secret-Key-Steganography-with-Message-Obfuscation-by-Pseudo-random.pdf2014_Gutierrez_Secret-Key-Steganography-with-Message-Obfuscation-by-Pseudo-random.pdfapplication/pdf305528https://repositorio.usil.edu.pe/bitstreams/781902f4-1f28-4f16-bf14-31623bf314cd/downloadd616d65e18819aa46daf15cb2ce971b5MD53TEXT2014_Gutierrez_Secret-Key-Steganography-with-Message-Obfuscation-by-Pseudo-random.pdf.txt2014_Gutierrez_Secret-Key-Steganography-with-Message-Obfuscation-by-Pseudo-random.pdf.txtExtracted texttext/plain21953https://repositorio.usil.edu.pe/bitstreams/74cd4058-28b0-4d4a-99bb-da8d649e05f4/download94b95daf41a63d5638ec32a40e083712MD54THUMBNAIL2014_Gutierrez_Secret-Key-Steganography-with-Message-Obfuscation-by-Pseudo-random.pdf.jpg2014_Gutierrez_Secret-Key-Steganography-with-Message-Obfuscation-by-Pseudo-random.pdf.jpgGenerated Thumbnailimage/jpeg15895https://repositorio.usil.edu.pe/bitstreams/ed94719f-d50b-489b-a679-ab10700a9c91/download5fe2926c567015b633265a36119ce83cMD5520.500.14005/1663oai:repositorio.usil.edu.pe:20.500.14005/16632023-04-17 09:56:44.532https://repositorio.usil.edu.peRepositorio institucional de la Universidad San Ignacio de Loyolarepositorio.institucional@usil.edu.pe | 
    
| dc.title.en.fl_str_mv | 
                  Secret Key Steganography with Message Obfuscation by Pseudo-random Number Generators | 
    
| title | 
                  Secret Key Steganography with Message Obfuscation by Pseudo-random Number Generators | 
    
| spellingShingle | 
                  Secret Key Steganography with Message Obfuscation by Pseudo-random Number Generators Gutiérrez Cárdenas, Juan M. Seguridad en computadores Criptografía Steganography Steganalysis  | 
    
| title_short | 
                  Secret Key Steganography with Message Obfuscation by Pseudo-random Number Generators | 
    
| title_full | 
                  Secret Key Steganography with Message Obfuscation by Pseudo-random Number Generators | 
    
| title_fullStr | 
                  Secret Key Steganography with Message Obfuscation by Pseudo-random Number Generators | 
    
| title_full_unstemmed | 
                  Secret Key Steganography with Message Obfuscation by Pseudo-random Number Generators | 
    
| title_sort | 
                  Secret Key Steganography with Message Obfuscation by Pseudo-random Number Generators | 
    
| author | 
                  Gutiérrez Cárdenas, Juan M. | 
    
| author_facet | 
                  Gutiérrez Cárdenas, Juan M. | 
    
| author_role | 
                  author | 
    
| dc.contributor.author.fl_str_mv | 
                  Gutiérrez Cárdenas, Juan M. | 
    
| dc.subject.en.fl_str_mv | 
                  Seguridad en computadores Criptografía  | 
    
| topic | 
                  Seguridad en computadores Criptografía Steganography Steganalysis  | 
    
| dc.subject.none.fl_str_mv | 
                  Steganography | 
    
| dc.subject.es.fl_str_mv | 
                  Steganalysis | 
    
| description | 
                  Steganography is the art of concealing information within different types of media objects such as images or audio files. Its counterpart, Steganalysis, is the study of methods that uncover information in a suspicious file, which has being altered for stego purposes. Its techniques rely on the inspection of changes at the pixel information level. In this paper, we propose a method for Secret-key Steganography that uses a picture to conceal a message with unaltered pixel information, so it would be secure against Steganalysis inspection techniques. This is possible using a technique derived from code obfuscation using random numbers. In summary, we will modify the stego-key transmitted during the communication process, which maps the information in the unaltered cover image. So the original message will be reconstructed by the receiver using the seeds of Pseudo-Random Number Generators, included in the stego-key. The proposed technique is secure against classical steganalysis attacks because it leaves the original and generated stego images unchanged. | 
    
| publishDate | 
                  2014 | 
    
| dc.date.accessioned.none.fl_str_mv | 
                  2016-03-14T15:03:33Z | 
    
| dc.date.available.none.fl_str_mv | 
                  2016-03-14T15:03:33Z | 
    
| dc.date.issued.fl_str_mv | 
                  2014-07-25 | 
    
| dc.type.none.fl_str_mv | 
                  info:eu-repo/semantics/conferenceObject | 
    
| format | 
                  conferenceObject | 
    
| dc.identifier.citation.es.fl_str_mv | 
                  Gutiérrez-Cárdenas, J. M. (2014, Julio). Secret Key Steganography with Message Obfuscation by Pseudo-random Number Generators. En Computer Software and Applications Conference Workshops (COMPSACW), 2014 IEEE 38th International (pp. 164-168). | 
    
| dc.identifier.uri.none.fl_str_mv | 
                  http://dx.doi.org/10.1109/COMPSACW.2014.31 https://hdl.handle.net/20.500.14005/1663  | 
    
| dc.identifier.wos.none.fl_str_mv | 
                  000352787700028 | 
    
| identifier_str_mv | 
                  Gutiérrez-Cárdenas, J. M. (2014, Julio). Secret Key Steganography with Message Obfuscation by Pseudo-random Number Generators. En Computer Software and Applications Conference Workshops (COMPSACW), 2014 IEEE 38th International (pp. 164-168). 000352787700028  | 
    
| url | 
                  http://dx.doi.org/10.1109/COMPSACW.2014.31 https://hdl.handle.net/20.500.14005/1663  | 
    
| dc.language.iso.none.fl_str_mv | 
                  eng | 
    
| language | 
                  eng | 
    
| dc.relation.en.fl_str_mv | 
                  Computer Software and Applications Conference Workshops (COMPSACW), 2014 IEEE; 38th International | 
    
| dc.relation.ispartof.en.fl_str_mv | 
                  Computer Software and Applications Conference Workshops (COMPSACW), 2014 IEEE; 38th International | 
    
| dc.rights.none.fl_str_mv | 
                  info:eu-repo/semantics/embargoedAccess | 
    
| eu_rights_str_mv | 
                  embargoedAccess | 
    
| dc.format.none.fl_str_mv | 
                  application/pdf | 
    
| dc.publisher.none.fl_str_mv | 
                  Institute of Electrical and Electronics Engineers | 
    
| publisher.none.fl_str_mv | 
                  Institute of Electrical and Electronics Engineers | 
    
| dc.source.es_ES.fl_str_mv | 
                  Universidad San Ignacio de Loyola Repositorio Institucional - USIL  | 
    
| dc.source.none.fl_str_mv | 
                  reponame:USIL-Institucional instname:Universidad San Ignacio de Loyola instacron:USIL  | 
    
| instname_str | 
                  Universidad San Ignacio de Loyola | 
    
| instacron_str | 
                  USIL | 
    
| institution | 
                  USIL | 
    
| reponame_str | 
                  USIL-Institucional | 
    
| collection | 
                  USIL-Institucional | 
    
| bitstream.url.fl_str_mv | 
                  https://repositorio.usil.edu.pe/bitstreams/781902f4-1f28-4f16-bf14-31623bf314cd/download https://repositorio.usil.edu.pe/bitstreams/74cd4058-28b0-4d4a-99bb-da8d649e05f4/download https://repositorio.usil.edu.pe/bitstreams/ed94719f-d50b-489b-a679-ab10700a9c91/download  | 
    
| bitstream.checksum.fl_str_mv | 
                  d616d65e18819aa46daf15cb2ce971b5 94b95daf41a63d5638ec32a40e083712 5fe2926c567015b633265a36119ce83c  | 
    
| bitstream.checksumAlgorithm.fl_str_mv | 
                  MD5 MD5 MD5  | 
    
| repository.name.fl_str_mv | 
                  Repositorio institucional de la Universidad San Ignacio de Loyola | 
    
| repository.mail.fl_str_mv | 
                  repositorio.institucional@usil.edu.pe | 
    
| _version_ | 
                  1847610756787339264 | 
    
| score | 
                  13.130007 | 
    
 Nota importante:
La información contenida en este registro es de entera responsabilidad de la institución que gestiona el repositorio institucional donde esta contenido este documento o set de datos. El CONCYTEC no se hace responsable por los contenidos (publicaciones y/o datos) accesibles a través del Repositorio Nacional Digital de Ciencia, Tecnología e Innovación de Acceso Abierto (ALICIA).
    La información contenida en este registro es de entera responsabilidad de la institución que gestiona el repositorio institucional donde esta contenido este documento o set de datos. El CONCYTEC no se hace responsable por los contenidos (publicaciones y/o datos) accesibles a través del Repositorio Nacional Digital de Ciencia, Tecnología e Innovación de Acceso Abierto (ALICIA).