DOI QR코드

DOI QR Code

LSB 기법 기반 최적의 이미지 스테가노그래피의 연구

A Study of Optimal Image Steganography based on LSB Techniques

  • 지선수 (강릉원주대학교 정보기술공학과)
  • 투고 : 2015.03.30
  • 심사 : 2015.06.09
  • 발행 : 2015.06.30

초록

스테가노그래피는 은닉되어 전송되는 비밀 메시지의 존재 자체를 숨기는 기술이다. 일반적으로 은닉 자료의 지각 투명성, 수용 능력, 견고성 등을 기반으로 하는 새롭고 정교한 스테가노그래피 기법을 개발하는 것이 주목적 이다. 이 논문에서는 이미지 스테가노그래피 기법의 장점과 단점을 분석하고, 효과적인 적용방법을 제시한다. 결과적으로 재배열키를 적용하고, 보안성이 좋은 ELSB와 DCT를 기반으로 하는 이미지 스테가노그래피 기법이 효과적이다.

Steganography is the technique of hiding the existence of a secret message that is communicated hiddenly. Generally, the main objectives of this paper is to develop newer and more sophisticated steganographic techniques based on perceptual transparency, robustness and capacity of the hidden data. This paper analyzes the advantages and disadvantages of image steganography techniques and proposes an effective method. As a result, the images steganography technique based on good ELSB and DCT which applies the rearranged key is secure and effective.

키워드

참고문헌

  1. S. S. Ji, "Advanced LSB Technique for Hiding Messages in Audio Steganography", KIISC, Vol 17, No. 5, pp. 37-42, 2014. (journal)
  2. Ruchi Jain, "An Extensive Survey on Image Steganography", International Journal of Emerging Technology and Advanced Engineering, Vol 4, Issue 3, pp. 674-679, 2014. (journal)
  3. Kanzariya Nitin K. and Nimavat Ashish V., "Comparison of Various Images Steganography Techniques", International Journal of Computer Science and Management Research, Vol 2, Issue 1, pp. 1213-1217, 2013. (journal)
  4. S. Sharda and S. Budhiraja, "Image Steganography : A Review", International Journal of Emerging Technology and Advanced Engineering, Vol 3, Issue 1, pp. 707-710, 2013. (journal)
  5. Sandeep Singh and Aman Singh. "A Review on the Various Recent Steganography Techniques", International Journal of Computer Science and Network, Vol 2, Issue 6, pp. 142-156, 2013. (journal)
  6. Suvarna Patil and Gajendra Singh Chandel, "Literature Survey on DWT Based Image Steganography", International Journal of Computer Science and Mobile Computing, Vol 3, Issue 2, pp. 904-909, 2014. (journal)
  7. Mehdi Hussain and Mureed Hussain, "A Survey of Image Steganography Techniques", International Journal of Advanced Science and Technology, Vol 54, pp.113-123, 2013. (journal)
  8. Stuti Goel, Arun Rana and Manpreet Kaur, "A Review of Comparison Techniques of Image Steganography", Journal of Electrical and Electronics Engineering, Vol 6, Issue 1, pp. 41-48, 2013. (journal)
  9. K. N. BrahmaTeja, G. L. Madhumati and K. R. Koteswara Rao, "Data Hiding Using EDGE Based Steganography", International Journal of Emerging Technology and Advanced Engineering, Vol 2, Issue 11, pp. 285-290, 2012. (journal)
  10. Hossein Sheisi, Jafar Mesgarian, and Mostafa Rahmani, "Steganography: Dct Coefficient Replacement Method and Compare With JSteg Algorithm", International Journal of Computer and Electrical Engineering, Vol 4, No. 4, pp. 458-462, 2012. (journal)
  11. J. R. Smith and B.O. Comisky. Modulation and information hiding in images. In R. Anderson, editor, Information Hiding, First International Workshop, volume 1174 of Lecture notes in Computer Science, pp. 207-226. Springer-Verlag, Berlin, 1996.