Open Access Open Access  Restricted Access Subscription or Fee Access

A Novel Low Distortion Image Steganography for Executable Files

P. Mohan Kumar, Dr.K.L. Shunmuganathan

Abstract


Steganography is the process of embedding a ―secret‖ digital data in another cover data. Not like general digital watermarking applications, steganography tries to form secret communication between the sender and receiver and thus causes the requirement of hiding the presence of the embedded message. This paper proposes a new steganography method for hiding executable files where palette images are considered as cover images. In this paper, a new algorithm has been proposed for hiding executable files and the experiment results show that the proposed technique provides a high load steganography arrangement in the pixel domain. Also the proposed approach provides a new idea by which the secret bit assignment with the embedding regions of the cover image. Since the image is divided into several regions and the embedding region is identified as it will generate lower distortion rate, this approach could be considered very secure one against steganalytic attacks.

Keywords


Steganography, Watermarking, Steganalysis, PE file.

Full Text:

PDF

References


J. Giles and B. Hajek, ―An information-theoretic and game-theoretic study of timing channels,‖ IEEE Trans. Inf. Theory, vol. 48, no. 9, pp. 2455–2477, Sep. 2003.

G. J. Simmons, ―The prisoner’s problem and the subliminal channel,‖ in Proc. CRYPTO’83, 1984, pp. 51–67.

C. Cachin, ―An information-theoretic model for steganography,‖ Inf. and Comput., vol. 192, no. 1, pp. 41–56, Jul. 2004.

N. F. Johnson and S. Katzenbeisser, ―A survey of steganographic techniques,‖ in Information Hiding, S. Katzenbeisser and F. Petitcolas, Eds. Norwood, MA: Artech House, 2000, pp. 43–78.

M.-Y. Wu, Y.-K. Ho, and J.-H. Lee, ―An iterative method of palette-based image steganography,‖ Pattern Recognit. Lett., vol. 25, pp. 301–309, 2004.

N. F. Johnson, Z. Duric, and S. Jajodia, Information Hiding: Steganography and Watermarking-Attacks and Countermeasures. Boston, MA: Kluwer Academic, 2000.

I. J. Cox, M. L. Miller, and J. A. Bloom, Digital Watermarking. San Francisco, CA: Morgan-Kaufmann, 2002.

P. Moulin and R. Köetter, ―Data-hiding codes,‖ Proc. IEEE, vol. 93, no. 12, pp. 2083–2126, Dec. 2005.

R. J. Anderson and F. A. P. Petitcolas, ―On the limits of steganography,‖ IEEE J. Select. Areas Commun., vol. 16, no. 4, pp. 474–481, May 1998.

N. F. Johnson and S. Jajodia, ―Exploring steganography: Seeing the unseen,‖ IEEE Computer, vol. 31, no. 2, pp. 26–34, Feb. 1998.

N. Provos and P. Honeyman, ―Hide and seek: An introduction to steganography,‖ IEEE Security and Privacy Mag., vol. 1, no. 3, pp.32–44, May/Jun. 2003.

Ying Wang, Pierre Moulin ―Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions‖ IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 6, JUNE 2008

Xinpeng Zhang, Shuozhong Wang, and Zhenyu Zhou.‖ Multiple bit Assignment Steganography in Palette Images‖ IEEE SIGNAL PROCESSING LETTERS, VOL. 15, 2008.

J. Fridrich, ―A new steganographic method for palette-based images,‖ in Proc. IS&T PICS Conf., Savannah, GA, Apr. 1998, pp. 285–289.

J. Fridrich and R. Du, ―Secure steganographic methods for palette images,‖ in The 3rd Information HidingWorkshop, Lecture Notes in Computer Science, 2000, vol. 1768, pp. 47–60.

X. Zhang and S. Wang, ―Analysis of parity assignment steganography in palette images,‖ in Knowledge-Based Intelligent Information and Engineering Systems, Lecture Notes in Artificial Intelligence, 2005, vol. 3683, pp. 1025–1031

http://en.wikipedia.org/wiki/Portable_Executable

M. L. Miller, G. J. Doerr, and I. J. Cox, "Applying informed coding and embedding to design a robust high-capacity watermark," IEEE Trans. Image Processing, vol. 13, no. 6, pp. 792-807, 2004.

N. Damera-Venkata, T.-D. Kite, W.-S. Geisler, B.-L. Evans, and A.- C. Bovik, "Image quality assessment based on a degradation model," IEEE Trans. on Image Processing, vol. 9, no. 4, pp. 636-650, 2000.

Y.-T. Wu and F. Y. Shih, "Genetic algorithm based methodology for breaking the steganalytic systems," IEEE Trans. on Systems, Man, and Cybernetics-Part B, vol. 36, no. 1, pp. 25-3 1, 2006.

D. Levicky and P. Foris, "Human visual system models in digital image watermarking," Radioengineering, vol. 13, no. 4, pp. 38-43, Dec. 2004.

C.-Y. Lin and S.-F. Chang, "Watermarking capacity of digital images based on domain-specific masking effects," Proc. Int'l Conf on Information Technology: Coding and Computing, pp. 90-94, 2001.

K. Solanki, K. Sullivan, U. Madhow, B.S. Manjunath, and S.Chandrasekaran, "Statistical restoration for robust and secure steganography," IEEE Int'l Conf on Image Process., Vol.2, pp.11-14, 2005.

J.A. O’Sullivan, P. Moulin, and J.M. Ettinger, ―Information Theoretic Analysis of Steganography,‖ Proc. IEEE Int’l Symp.Information Theory (ISIT ’98), p. 297, Aug. 1998.

J. Zo¨ llner, H. Federrath, H. Klimant, A. Pfitzmann, R. Piotraschke, A. Westfeld, G. Wicke, and G. Wolf, ―Modeling the Security of Steganographic Systems,‖ Proc. Second Int’l Workshop Information Hiding (IH ’98), pp. 344-354, 1998.

R.J. Anderson, ―Stretching the Limits of Steganography,‖ Proc. First Int’l Workshop Information Hiding (IH ’96), pp. 39-48, 1996. IEEE J. Selected Areas in Comm., vol. 16, no. 4, pp. 474-481, May 1998.

T. Mittelholzer, ―An Information-Theoretic Approach to Steganography and Watermarking,‖ Proc. Third Int’l Workshop Information Hiding (IH ’99), A. Pfitzmann, ed., pp. 1-16, 1999.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.