Volume-2 ~ Issue-5
- Citation
- Abstract
- Reference
- Full PDF
| Paper Type | : | Research Paper |
| Title | : | Mathematical Modeling of Image Steganographic System |
| Country | : | India |
| Authors | : | Kaustubh Choudhary |
| : | 10.9790/0661-0250115 ![]() |
|
Abstract: Image based steganography is a dangerous technique of hiding secret messages in the image in such a way that no one apart from the sender and intended recipient suspects the existence of the message. It is based on invisible communication and this technique strives to hide the very presence of the message itself from the observer. As a result it becomes the most preferred tool to be used by Intelligence Agencies, Terrorist Networks and criminal organizations for securely broadcasting, dead-dropping and communicating information over the internet by hiding secret information in the images. In this paper a mathematical model is designed for representing any such image based steganographic system. This mathematical model of any stego system can be used for determining vulnerabilities in the stego system as well as for steganalysing the stego images using same vulnerabilities. Based on these mathematical foundations three steganographic systems are evaluated for their strengths and vulnerabilities using MATLAB ©Image Processing Tool Box.
Key Words: Cyber Crime, Global Terrorism, Image Steganography, LSB Insertion, Mathematical Model of Image Steganographic System
Key Words: Cyber Crime, Global Terrorism, Image Steganography, LSB Insertion, Mathematical Model of Image Steganographic System
[1] Kaustubh Choudhary "Image Steganography and Global Terrorism" IOSR Journal of Computer Engineering, Volum 1 Issue 2 , pp 34-48.
[2] C.Cachin, "An information-theoretic model for steganography" Proc. 2nd International Workshop Information Hiding" LNCS 1525, pp. 306–318, 1998.
[3]. J. Zollner, H. Federrath, H. Klimant, A. Pfitzman, R. Piotraschke, A. Westfeld, G. Wicke, and G. Wolf,"Modeling the security of steganographic systems," Prof. 2nd Information Hiding Workshop , pp. 345–355,April 1998.
[4] C. E. Shannon, "Communication theory of secrecy systems," Bell System Technical Journal, vol. 28, pp. 656–715, Oct. 1949.
[5] Steganography Capacity: A Steganalysis Perspective R. Chandramouli and N.D. Memon
[6]. A Mathematical Approach to Steganalysis R. Chandramouli Multimedia Systems, Networking and Communications (MSyNC) Lab Department of Electrical and Computer Engineering Stevens Institute of Technology
[2] C.Cachin, "An information-theoretic model for steganography" Proc. 2nd International Workshop Information Hiding" LNCS 1525, pp. 306–318, 1998.
[3]. J. Zollner, H. Federrath, H. Klimant, A. Pfitzman, R. Piotraschke, A. Westfeld, G. Wicke, and G. Wolf,"Modeling the security of steganographic systems," Prof. 2nd Information Hiding Workshop , pp. 345–355,April 1998.
[4] C. E. Shannon, "Communication theory of secrecy systems," Bell System Technical Journal, vol. 28, pp. 656–715, Oct. 1949.
[5] Steganography Capacity: A Steganalysis Perspective R. Chandramouli and N.D. Memon
[6]. A Mathematical Approach to Steganalysis R. Chandramouli Multimedia Systems, Networking and Communications (MSyNC) Lab Department of Electrical and Computer Engineering Stevens Institute of Technology
- Citation
- Abstract
- Reference
- Full PDF
| Paper Type | : | Research Paper |
| Title | : | Novel Approach to Image Steganalysis (A Step against Cyber Terrorism) |
| Country | : | India |
| Authors | : | Kaustubh Choudhary |
| : | 10.9790/0661-0251628 ![]() |
|
Abstract: Steganography is a technique of hiding secret messages in the image in such a way that no one apart from the sender and intended recipient suspects the existence of the message. Image Steganography is frequently used by Terrorist Networks for securely broadcasting, dead-dropping and communicating the secret information over the internet by hiding the secret information in the Images. As a result it becomes the most preferred tool to be used by Terrorists and criminal organizations for achieving secure CIA (Confidentiality, Integrity and Availability) compliant communication network capable of penetrating deep inside the civilian population. Steganalysis of Image (Identification of Images containing Hidden Information) is a challenging task due to lack of Efficient Algorithms, High rates of False Alarms and above all the High Computation Costs of Analyzing the Images. In this paper a Novel Technique of Image Steganalysis is devised which is not only Fast and Efficient but also Foolproof. The results shown in the paper are obtained using programs written in MATLAB© Image Processing Tool Box.
Key Words: Bit Plane Slicing, Cyber Crime, Global Terrorism, Image Steganalysis, LSB Insertion, Pixel Aberration, SDT based Image Steganography.
Key Words: Bit Plane Slicing, Cyber Crime, Global Terrorism, Image Steganalysis, LSB Insertion, Pixel Aberration, SDT based Image Steganography.
[1] Infosecurity Magazine article dated 02 May 2012 reports that Al-Qaeda uses Steganography to hide documents. http://www.infosecurity-magazine.com/view/25524/alqaeda-uses-steganography-documents-hidden-in-porn-videos-found-on-memory-stick
[2] Daily Mail Online, UK article dated 01 May 2012 reported that a Treasure trove of Intelligence was embedded in porn video. http://www.dailymail.co.uk/news/article-2137848/Porn-video-reveals-Al-Qaeda-planns-hijack-cruise-ships-execute-passengers.html#ixzz1uIgxpire
[3]. The New York Times article dated Oct 30, 2001 with title "Veiled Messages of Terror May Lurk in Cyberspace" claims 9/11 attacks planned using Steganography.
[4] Wired article dated 02nd July, 2001 nicknamed Bin Laden as "the Steganography Master" http://www.wired.com/politics/law/news/2001/02/41658?currentPage=all
[5] Kaustubh Choudhary "Image Steganography and Global Terrorism" IOSR Journal of Computer Engineering, Volume 1 Issue 2 , pp 34-48. http://www.iosrjournals.org/journals/iosr-jce/papers/vol1-issue2/14/N0123448.pdf
[6] Jonathan Watkins, Steganography - Messages Hidden in Bits (15th December,2001) http://mms.ecs.soton.ac.uk/mms2002/papers/6.pdf
[7] Steganalysis of LSB Based Image Steganography using Spatial and Frequence Domain Features by Hossein Malekmohamadi and Shahrokh Ghaemmaghami
[8] Kaustubh Choudhary "Mathematical Modeling of Image Steganographic System" IOSR Journal of Computer Engineering, Volume 2 Issue 5, pp 01-15.
[2] Daily Mail Online, UK article dated 01 May 2012 reported that a Treasure trove of Intelligence was embedded in porn video. http://www.dailymail.co.uk/news/article-2137848/Porn-video-reveals-Al-Qaeda-planns-hijack-cruise-ships-execute-passengers.html#ixzz1uIgxpire
[3]. The New York Times article dated Oct 30, 2001 with title "Veiled Messages of Terror May Lurk in Cyberspace" claims 9/11 attacks planned using Steganography.
[4] Wired article dated 02nd July, 2001 nicknamed Bin Laden as "the Steganography Master" http://www.wired.com/politics/law/news/2001/02/41658?currentPage=all
[5] Kaustubh Choudhary "Image Steganography and Global Terrorism" IOSR Journal of Computer Engineering, Volume 1 Issue 2 , pp 34-48. http://www.iosrjournals.org/journals/iosr-jce/papers/vol1-issue2/14/N0123448.pdf
[6] Jonathan Watkins, Steganography - Messages Hidden in Bits (15th December,2001) http://mms.ecs.soton.ac.uk/mms2002/papers/6.pdf
[7] Steganalysis of LSB Based Image Steganography using Spatial and Frequence Domain Features by Hossein Malekmohamadi and Shahrokh Ghaemmaghami
[8] Kaustubh Choudhary "Mathematical Modeling of Image Steganographic System" IOSR Journal of Computer Engineering, Volume 2 Issue 5, pp 01-15.
- Citation
- Abstract
- Reference
- Full PDF
Abstract :. Researchers have proposed a number of co-ordination functions in literature for improving quality of service. Each one is based on different characteristics and properties. In this paper, we evaluate the performance of wireless network using PCF, DCF & EDCF. We perform simulations using OPNET IT GURU Academic Edition simulator. In the performance evaluation of the co-ordination function, the protocols are tested under the realistic conditions. Tests are performed for various parameters (Delay, Data Dropped, Throughput) in wireless Networks. This OPNET simulation shows the impact of co-ordination function for wireless networks for different parameters.
Keywords - Data Dropped, Delay, DCF, EDCF, PCF, Throughput, Traffic Sent, Traffic Received.
Keywords - Data Dropped, Delay, DCF, EDCF, PCF, Throughput, Traffic Sent, Traffic Received.
[1] Ashwini Dalvi, Pamukumar Swamy, B B Meshram, DCF Improvement for Satisfactory Throughput of 802.11 WLAN, International Journal on Computer Science and Engineering , 2011 Vol: 3 Issue: 7 ,2862-2868
[2] T Madhavi , G Sasi Bhushana Rao , M Rajan Babu , K Sridevi, Analysis of Throughput and Energy Efficiency in the IEEE 802.11 Wireless Local Area Networks using Constant backoff Window Algorithm, International Journal of Computer Applications, 2011,Vol: 26 Issue: 8 ,40-47
[3] Vikram Jain , Sakshi Suhane, Performance Degradation of IEEE 802.11 MANET due to Heavy Increase and Heavy Decrease in Contention Window, International Journal of Computer Applications, 2011,Vol: 20 Issue: 6 ,26-32
[4] Ajay Dureja , Aman Dureja , Meha Khera, IEEE 802.11 Based MAC Improvements for MANET, International Journal of Computer Applications,2011, Issue: 2 ,54-57
[5] Rama Krishna CHALLA, Saswat CHAKRABARTI, Debasish DATTA, An Improved Analytical Model for IEEE 802.11 Distributed Coordination Function under Finite Load, International Journal of Communications, Network and System Sciences, 2009, Vol: 02 Issue: 03 ,237-247
[6] Yutae Lee, Min Young Chung, Tae-Jin Lee, Performance Analysis of IEEE 802.11 DCF under Nonsaturation Condition Mathematical Problems in Engineering, 2008
[7] Sunghyun Choi, Javier del Prado2, Sai Shankar N, Stefan Mangold, IEEE 802.11e Contention-Based Channel Access (EDCF) Performance Evaluation, vol.2, 2003, 1151 – 1156
[2] T Madhavi , G Sasi Bhushana Rao , M Rajan Babu , K Sridevi, Analysis of Throughput and Energy Efficiency in the IEEE 802.11 Wireless Local Area Networks using Constant backoff Window Algorithm, International Journal of Computer Applications, 2011,Vol: 26 Issue: 8 ,40-47
[3] Vikram Jain , Sakshi Suhane, Performance Degradation of IEEE 802.11 MANET due to Heavy Increase and Heavy Decrease in Contention Window, International Journal of Computer Applications, 2011,Vol: 20 Issue: 6 ,26-32
[4] Ajay Dureja , Aman Dureja , Meha Khera, IEEE 802.11 Based MAC Improvements for MANET, International Journal of Computer Applications,2011, Issue: 2 ,54-57
[5] Rama Krishna CHALLA, Saswat CHAKRABARTI, Debasish DATTA, An Improved Analytical Model for IEEE 802.11 Distributed Coordination Function under Finite Load, International Journal of Communications, Network and System Sciences, 2009, Vol: 02 Issue: 03 ,237-247
[6] Yutae Lee, Min Young Chung, Tae-Jin Lee, Performance Analysis of IEEE 802.11 DCF under Nonsaturation Condition Mathematical Problems in Engineering, 2008
[7] Sunghyun Choi, Javier del Prado2, Sai Shankar N, Stefan Mangold, IEEE 802.11e Contention-Based Channel Access (EDCF) Performance Evaluation, vol.2, 2003, 1151 – 1156
