HYSA: hybrid steganographic approach using multiple steganography methods

H Sajedi, M Jamzad - Security and Communication Networks, 2011 - Wiley Online Library
Security and Communication Networks, 2011Wiley Online Library
The aim of image steganography is to hide data in an image with visual and statistical
invisibility. There have been a number of steganography techniques proposed over the past
few years. In sequence, the development of these methods has led to an increased interest
in steganalysis techniques. Most of the steganalysis methods attempt to estimate cover
image statistics. One way to provide a secure steganography method is to disturb the
estimation of steganalyzers. The main concern of this paper is to resist against steganalysis …
Abstract
The aim of image steganography is to hide data in an image with visual and statistical invisibility. There have been a number of steganography techniques proposed over the past few years. In sequence, the development of these methods has led to an increased interest in steganalysis techniques. Most of the steganalysis methods attempt to estimate cover image statistics. One way to provide a secure steganography method is to disturb the estimation of steganalyzers. The main concern of this paper is to resist against steganalysis methods and utilize a mechanism to securely embed more secret data into an image. We present HYbrid steganographic approach (HYSA), which embeds secret data with randomized embedding algorithms in randomized regions of the cover image. HYSA embeds secret data in only some regions of the image not all over the image. In addition, HYSA can employ more than one steganography method for embedding secret data in the image. Random selection of embedding regions and steganography methods leaves a combination of several types of distortion on the image, which are difficult to be recognized by the steganalysis methods. Experimental results by applying some well‐known and efficient steganalysis methods illustrate that the proposed steganographic approach is more undetectable than some popular steganography methods. Copyright © 2010 John Wiley & Sons, Ltd.
Wiley Online Library
Showing the best result for this search. See all results