Serveur d'exploration Cyberinfrastructure

Attention, ce site est en cours de développement !
Attention, site généré par des moyens informatiques à partir de corpus bruts.
Les informations ne sont donc pas validées.

A novel steganographic algorithm using animations as cover

Identifieur interne : 000E88 ( Main/Exploration ); précédent : 000E87; suivant : 000E89

A novel steganographic algorithm using animations as cover

Auteurs : Gopalakrishna Reddy Tadiparthi [États-Unis] ; Toshiyuki Sueyoshi [États-Unis, Taïwan]

Source :

RBID : Pascal:08-0519685

Descripteurs français

English descriptors

Abstract

Information security is gaining widespread importance in distributed decision support systems [T.S. Raghu, and H. Chen, Cyberinfrastructure for homeland security: Advances in information sharing, data mining, and collaboration systems. Decision Support Systems 43 (2007)1321-1323]. Conventional steganographic models available in the literature on information hiding use the knowledge of cover-object and stego-object to extract embedded data. Embedding algorithms have been predominantly used in steganography for hiding data whereas encoding algorithms have been used for data compression. This research study proposes a modified model for steganographic system that incorporates encoding algorithms based upon the information theoretic model documented in Cachin [C. Cachin, An Information-Theoretic Model for Steganography, Information and Computation 192 (1) (2004) 41-56.]. The differences between the conventional model and the proposed model are analyzed in this study. We further implement the proposed model by designing a novel steganographic algorithm that utilizes animations as cover-objects. The proposed approach is then compared with an encoding algorithm for gif animations and a modified embedding algorithm with animations as the cover. Gifshuffle is a steganographic software that hides data in gif animations. Digital Invisible Ink Toolkit (DIIT) is a software that uses embedding algorithm to conceal data into images. DIIT is remodeled to hide data within animated images in this study. Experiments reveal that the encoding algorithms are suitable for information hiding using animations. The study finds that the proposed encoding framework with animations provides a practical framework for analysis and has a better security performance than Gifshuffle and DIIT. Although the proposed model achieves more hiding rate, Gifshuffle is computationally faster than other techniques.


Affiliations:


Links toward previous steps (curation, corpus...)


Le document en format XML

<record>
<TEI>
<teiHeader>
<fileDesc>
<titleStmt>
<title xml:lang="en" level="a">A novel steganographic algorithm using animations as cover</title>
<author>
<name sortKey="Reddy Tadiparthi, Gopalakrishna" sort="Reddy Tadiparthi, Gopalakrishna" uniqKey="Reddy Tadiparthi G" first="Gopalakrishna" last="Reddy Tadiparthi">Gopalakrishna Reddy Tadiparthi</name>
<affiliation wicri:level="2">
<inist:fA14 i1="01">
<s1>Department of Computer Science, New Mexico Institute of Mining and Technology</s1>
<s2>Socorro, NM 87801</s2>
<s3>USA</s3>
<sZ>1 aut.</sZ>
</inist:fA14>
<country>États-Unis</country>
<placeName>
<region type="state">Nouveau-Mexique</region>
</placeName>
</affiliation>
</author>
<author>
<name sortKey="Sueyoshi, Toshiyuki" sort="Sueyoshi, Toshiyuki" uniqKey="Sueyoshi T" first="Toshiyuki" last="Sueyoshi">Toshiyuki Sueyoshi</name>
<affiliation wicri:level="1">
<inist:fA14 i1="02">
<s1>Department of Management, New Mexico Institute of Mining and Technology</s1>
<s2>Socorro. NM 87801</s2>
<s3>USA</s3>
<sZ>2 aut.</sZ>
</inist:fA14>
<country>États-Unis</country>
<wicri:noRegion>Socorro. NM 87801</wicri:noRegion>
</affiliation>
<affiliation wicri:level="1">
<inist:fA14 i1="03">
<s1>National Cheng Kung University, Department of Industrial and Information Management</s1>
<s2>Tainan</s2>
<s3>TWN</s3>
<sZ>2 aut.</sZ>
</inist:fA14>
<country>Taïwan</country>
<wicri:noRegion>Tainan</wicri:noRegion>
</affiliation>
</author>
</titleStmt>
<publicationStmt>
<idno type="wicri:source">INIST</idno>
<idno type="inist">08-0519685</idno>
<date when="2008">2008</date>
<idno type="stanalyst">PASCAL 08-0519685 INIST</idno>
<idno type="RBID">Pascal:08-0519685</idno>
<idno type="wicri:Area/PascalFrancis/Corpus">000217</idno>
<idno type="wicri:Area/PascalFrancis/Curation">000035</idno>
<idno type="wicri:Area/PascalFrancis/Checkpoint">000210</idno>
<idno type="wicri:doubleKey">0167-9236:2008:Reddy Tadiparthi G:a:novel:steganographic</idno>
<idno type="wicri:Area/Main/Merge">000E95</idno>
<idno type="wicri:Area/Main/Curation">000E88</idno>
<idno type="wicri:Area/Main/Exploration">000E88</idno>
</publicationStmt>
<sourceDesc>
<biblStruct>
<analytic>
<title xml:lang="en" level="a">A novel steganographic algorithm using animations as cover</title>
<author>
<name sortKey="Reddy Tadiparthi, Gopalakrishna" sort="Reddy Tadiparthi, Gopalakrishna" uniqKey="Reddy Tadiparthi G" first="Gopalakrishna" last="Reddy Tadiparthi">Gopalakrishna Reddy Tadiparthi</name>
<affiliation wicri:level="2">
<inist:fA14 i1="01">
<s1>Department of Computer Science, New Mexico Institute of Mining and Technology</s1>
<s2>Socorro, NM 87801</s2>
<s3>USA</s3>
<sZ>1 aut.</sZ>
</inist:fA14>
<country>États-Unis</country>
<placeName>
<region type="state">Nouveau-Mexique</region>
</placeName>
</affiliation>
</author>
<author>
<name sortKey="Sueyoshi, Toshiyuki" sort="Sueyoshi, Toshiyuki" uniqKey="Sueyoshi T" first="Toshiyuki" last="Sueyoshi">Toshiyuki Sueyoshi</name>
<affiliation wicri:level="1">
<inist:fA14 i1="02">
<s1>Department of Management, New Mexico Institute of Mining and Technology</s1>
<s2>Socorro. NM 87801</s2>
<s3>USA</s3>
<sZ>2 aut.</sZ>
</inist:fA14>
<country>États-Unis</country>
<wicri:noRegion>Socorro. NM 87801</wicri:noRegion>
</affiliation>
<affiliation wicri:level="1">
<inist:fA14 i1="03">
<s1>National Cheng Kung University, Department of Industrial and Information Management</s1>
<s2>Tainan</s2>
<s3>TWN</s3>
<sZ>2 aut.</sZ>
</inist:fA14>
<country>Taïwan</country>
<wicri:noRegion>Tainan</wicri:noRegion>
</affiliation>
</author>
</analytic>
<series>
<title level="j" type="main">Decision support systems</title>
<title level="j" type="abbreviated">Decis. support syst.</title>
<idno type="ISSN">0167-9236</idno>
<imprint>
<date when="2008">2008</date>
</imprint>
</series>
</biblStruct>
</sourceDesc>
<seriesStmt>
<title level="j" type="main">Decision support systems</title>
<title level="j" type="abbreviated">Decis. support syst.</title>
<idno type="ISSN">0167-9236</idno>
</seriesStmt>
</fileDesc>
<profileDesc>
<textClass>
<keywords scheme="KwdEn" xml:lang="en">
<term>Animal</term>
<term>Coding</term>
<term>Computer animation</term>
<term>Computer security</term>
<term>Data compression</term>
<term>Data processing</term>
<term>Decision support system</term>
<term>Distributed system</term>
<term>Document structure</term>
<term>Embedding</term>
<term>Information system</term>
<term>Information theory</term>
<term>Information use</term>
<term>Modeling</term>
<term>Shared memory</term>
<term>Social decision</term>
<term>Stéganography</term>
<term>homeland security</term>
</keywords>
<keywords scheme="Pascal" xml:lang="fr">
<term>Sécurité informatique</term>
<term>Système réparti</term>
<term>Décision collective</term>
<term>Système aide décision</term>
<term>Système information</term>
<term>Mémoire partagée</term>
<term>Traitement donnée</term>
<term>Utilisation information</term>
<term>Plongement</term>
<term>Codage</term>
<term>Compression donnée</term>
<term>Théorie information</term>
<term>Stéganographie</term>
<term>Sécurité nationale</term>
<term>Structure document</term>
<term>Animal</term>
<term>Modélisation</term>
<term>Animation par ordinateur</term>
<term>.</term>
</keywords>
<keywords scheme="Wicri" type="topic" xml:lang="fr">
<term>Codage</term>
</keywords>
</textClass>
</profileDesc>
</teiHeader>
<front>
<div type="abstract" xml:lang="en">Information security is gaining widespread importance in distributed decision support systems [T.S. Raghu, and H. Chen, Cyberinfrastructure for homeland security: Advances in information sharing, data mining, and collaboration systems. Decision Support Systems 43 (2007)1321-1323]. Conventional steganographic models available in the literature on information hiding use the knowledge of cover-object and stego-object to extract embedded data. Embedding algorithms have been predominantly used in steganography for hiding data whereas encoding algorithms have been used for data compression. This research study proposes a modified model for steganographic system that incorporates encoding algorithms based upon the information theoretic model documented in Cachin [C. Cachin, An Information-Theoretic Model for Steganography, Information and Computation 192 (1) (2004) 41-56.]. The differences between the conventional model and the proposed model are analyzed in this study. We further implement the proposed model by designing a novel steganographic algorithm that utilizes animations as cover-objects. The proposed approach is then compared with an encoding algorithm for gif animations and a modified embedding algorithm with animations as the cover. Gifshuffle is a steganographic software that hides data in gif animations. Digital Invisible Ink Toolkit (DIIT) is a software that uses embedding algorithm to conceal data into images. DIIT is remodeled to hide data within animated images in this study. Experiments reveal that the encoding algorithms are suitable for information hiding using animations. The study finds that the proposed encoding framework with animations provides a practical framework for analysis and has a better security performance than Gifshuffle and DIIT. Although the proposed model achieves more hiding rate, Gifshuffle is computationally faster than other techniques.</div>
</front>
</TEI>
<affiliations>
<list>
<country>
<li>Taïwan</li>
<li>États-Unis</li>
</country>
<region>
<li>Nouveau-Mexique</li>
</region>
</list>
<tree>
<country name="États-Unis">
<region name="Nouveau-Mexique">
<name sortKey="Reddy Tadiparthi, Gopalakrishna" sort="Reddy Tadiparthi, Gopalakrishna" uniqKey="Reddy Tadiparthi G" first="Gopalakrishna" last="Reddy Tadiparthi">Gopalakrishna Reddy Tadiparthi</name>
</region>
<name sortKey="Sueyoshi, Toshiyuki" sort="Sueyoshi, Toshiyuki" uniqKey="Sueyoshi T" first="Toshiyuki" last="Sueyoshi">Toshiyuki Sueyoshi</name>
</country>
<country name="Taïwan">
<noRegion>
<name sortKey="Sueyoshi, Toshiyuki" sort="Sueyoshi, Toshiyuki" uniqKey="Sueyoshi T" first="Toshiyuki" last="Sueyoshi">Toshiyuki Sueyoshi</name>
</noRegion>
</country>
</tree>
</affiliations>
</record>

Pour manipuler ce document sous Unix (Dilib)

EXPLOR_STEP=$WICRI_ROOT/Ticri/CIDE/explor/CyberinfraV1/Data/Main/Exploration
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 000E88 | SxmlIndent | more

Ou

HfdSelect -h $EXPLOR_AREA/Data/Main/Exploration/biblio.hfd -nk 000E88 | SxmlIndent | more

Pour mettre un lien sur cette page dans le réseau Wicri

{{Explor lien
   |wiki=    Ticri/CIDE
   |area=    CyberinfraV1
   |flux=    Main
   |étape=   Exploration
   |type=    RBID
   |clé=     Pascal:08-0519685
   |texte=   A novel steganographic algorithm using animations as cover
}}

Wicri

This area was generated with Dilib version V0.6.25.
Data generation: Thu Oct 27 09:30:58 2016. Site generation: Sun Mar 10 23:08:40 2024