2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing 2008
DOI: 10.1109/iih-msp.2008.174
|View full text |Cite
|
Sign up to set email alerts
|

Implementation of Covert Communication Based on Steganography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2009
2009
2022
2022

Publication Types

Select...
6
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 34 publications
(11 citation statements)
references
References 8 publications
0
8
0
Order By: Relevance
“…More recently, a lot of research efforts turn to improving steganographic transparency and security (undetectability) of LSB approaches. For example, trading the embedding capacity for the steganographic transparency by introducing LSB matching steganography [12]; improving the embedding security via dynamically choosing multiple bits based on the VoIP vector value, dynamically changing embedding intervals and modifying neighbor bits to offset the distortion [13]; enhancing the security and transparency by choosing lower embedding bit rates in the flat blocks and higher embedding bit rates in the sharp blocks [14] and adopting the least-significant-digits rather than independent LSBs to conceal secret messages [15].…”
Section: Lsb Steganographymentioning
confidence: 99%
“…More recently, a lot of research efforts turn to improving steganographic transparency and security (undetectability) of LSB approaches. For example, trading the embedding capacity for the steganographic transparency by introducing LSB matching steganography [12]; improving the embedding security via dynamically choosing multiple bits based on the VoIP vector value, dynamically changing embedding intervals and modifying neighbor bits to offset the distortion [13]; enhancing the security and transparency by choosing lower embedding bit rates in the flat blocks and higher embedding bit rates in the sharp blocks [14] and adopting the least-significant-digits rather than independent LSBs to conceal secret messages [15].…”
Section: Lsb Steganographymentioning
confidence: 99%
“…In [10] a secret data communication system was presented, it employs RSA with asymmetric keys and AES with symmetric key to encrypt the data, after that the encrypted data is embedded into the cover image using smart LSB pixel mapping and data rearrangement method. In [11] and [12] two secure communication systems were proposed to be used for voice over IP (VOIP) applications. LSB based steganography was employed to hide the information over an audio cover signal.…”
Section: Related Workmentioning
confidence: 99%
“…However, we argue that the transparency of the given steganography method can be improved by proper encoding. In this paper, we proposed three encoding strategies used to enhance the Huang et al [9] first introduced LSB matching method to enhance transparency. In their method, a pseudo random sequence (PRS) is used to guide embedding.…”
Section: Transparency-orientated Strategy (Tos)mentioning
confidence: 99%
“…Here, DF = 0 indicates that strategy 1 is adopted, and DF = 1 indicates that strategy 2 is adopted. We compare our strategies with the traditional LSBs method and the LSB matching method in [9]. We employ m sequences as the PRSs used in our strategy 1 and the LSB matching method.…”
Section: Implementation and Testmentioning
confidence: 99%
See 1 more Smart Citation