Browse > Article

Implementation of StegoWaveK using an Improved Lowbit Encoding Method  

김영실 (대림대학 컴퓨터정보계열)
김영미 ((주)쎄스 암호화연구실)
백두권 (고려대학교 컴퓨터학과)
Abstract
The steganography is one of methods that users can hide data. Some steganography softwares use audio data among multimedia data. However, these commercialized audio steganography softwares have disadvantages that the existence of hidden messages can or easily recognized visually and only certain-sized data can be hidden. To solve these problems, this study suggested, designed and implemented Dynamic Message Embedding (DME) algorithm. Also, to improve the security level of the secret message, the file encryption algorithm has been applied. Through these, StegoWaveK system that performs audio steganography was designed and implemented. Then, the suggested system and the commercialized audio steganography system were compared and analyzed on criteria of the Human Visilable System (HVS), Human Auditory System (HAS), Statistical Analysis (SA), and Audio Measurement (AM).
Keywords
steganography; encryption algorithm; cover-data; secret message; stego-data;
Citations & Related Records
연도 인용수 순위
  • Reference
1 J.Zollner, H.Federrath, H.Klimant, A.Pfitzmann, R.Piotraschke, A.Westfeld, G.Wicke, G.Wolf, 'Modeling the security of steganographic systems.' 2nd Workshop on Information Hiding, Portland, LNCS 1525, pp.345-355, Springer-Cerlag, April 1998
2 Neil F. Johnson, 'Introduction to steganography Hidden Information,' GMU 2001-Computer Crime Symposium, August 13-17, 2001, George Mason University, Fairfax, Virginia
3 Stefan Katzenbeisser, and Fabien A.P.Petitcolas 'Information hiding techniques for steganography and digital watermarking,' Artech House Publishers, 2000
4 S.K. Pal, P.K. Saxena, S.K. Muttoo, 'The Future of Audio Steganography,' STEG'02, July 11-12, 2002
5 김현곤, 원동호 외 12, '지적 재산권 보호를 위한 정보은닉 기술 및 표준화 연구', 한국 전산원. pp.19-41, 2000
6 http://www.steganos.com/./en/
7 Peter Wayner, 'Disappearing cryptography Information Hiding : Steganography & Watermarking,' second edition, chapter 17, Morgan Kauffman, 2002
8 http://www.cbcis.wustl.edu/~adpol/courses/cs502/project/report/nodelhtm
9 http://www.neobytesolutions.com/invsecr/index.html
10 Fabien A.P. Petitcolas, Ross J. Anderson and Markys G.Kuhn, 'Information Hiding-A Survey,' Proceedings of the IEEE, special issue on protec tion of multimedia content, 87(7):1062-1078, July 1999   DOI   ScienceOn
11 Christian Cauchin, 'An Information-Theoretic Model for Steganography,' In Proceeding of 2nd Workshop on Information Hiding, Lecture Notes in Computer Science 1525, pp.306-318, Springer, 1998
12 Djimitri Wiggert, 'Codes for Error Control and Synchronization,' Artech House Inc, 1988
13 Stefan Katzenbeisser and Fabien A.P. Petitcolas, 'Defining Security in Steganographic Systems,' SPIE Vol.4675, Security and Watermarking of Multimedia Contents IV, pp.260-268, 2002   DOI
14 J. Zollner, H. Federath, H. Klimant, and A. Pfitzmann, 'Modeling the security of steganography systems,' In Proceeding of 2nd Workshop on Information Hiding, Lecture Notes in Computer Science 1525, pp.344-354, Springer, 1998
15 RG van Schyndel, AZ Trikel, CF Osborne, 'Digital Watermark,' International Conference on Image Processing, Vol.2, pp.86-90, 1994   DOI
16 Brian Chen and Gregory W. Wome.ll, 'Quantization Index Modulation: A Class of Probably Good Methods for Digital Watermarking and Information Embedding,' IEEE Transaction on Information Theory, Vol.47, NO.4, MAY 2001
17 http://www.rfdh.com/bas_com/2- 10.htm
18 Richard C. Cabot, Bruce Hofer, and Robert Metzler, 'Chapter 13.1 Audio Measurement and Analysis,' 2002
19 Jerry Whitaker, Blair Benson, 'Chapter 13 Standard Handbook of Audio and Radio Engineering,' McGraw Hill Professional, 2002
20 Ross J. Anderson, Fabieb A.P. Petitcolas, 'On The Limits of Steganography,' IEEE Journal of Selected Areas in Communication, 16(4):474-481, May 1998   DOI   ScienceOn
21 BenZamin Arazi, 'A Commonsense Approach to the Theory of Error Correcting Codes,' MIT Press 1986
22 http://members.tripod.com/steganography/stego/software.html
23 http://www.cs.uct.ac.za/courses/CS400W/NIS/papers99/dsellars/stego.html
24 htttp://debut.cis.nctu.edu.tw/~yklee/Reaserch/Steganography/Qalter_Bender/IHW96.pdf
25 RG van Schyndel, AZ Trikel, CF Osborne, 'A Digital Watermark,' International Conference on Image Processing, Vol.2, pp.86 90, 1994   DOI
26 J.D.Gordy and L.T.Bruton IEEE MWSCAS 2000, 'Performance Evaluation of Digital Audio Watermarking Algorithms   DOI
27 http://211.38.132.225/new_b24.htm
28 Ira S. Moskowitz, Garth E. Longdon, and LiWu Chang, 'A New paradigm Hidden Steganography,' New Security Paradigms workshop 2000, September, 19th~21st, 2000, Cork Ireland   DOI
29 GJ Simmoms, 'The Prisoners' Problem and the Subliminal Channel,' in Proceeding o CRYPTO '83, Plenum Press, pp.51 68, 1984
30 http://www ccrma.stanford.edu/CCRMA/Courses/422/projects/WaveFormat