Back to Search Start Over

Short Paper: Application of Noisy Attacks on Image Steganography

Authors :
Tahar Kechadi
Ayidh Alharbi
Source :
Networked Systems ISBN: 9783030055288, NETYS
Publication Year :
2019
Publisher :
Springer International Publishing, 2019.

Abstract

The data hiding techniques have attracted a lot of attention in recent years and mainly with the intensive growth of multimedia and its possibility for covert communication. Steganography is one of the information hiding methods to confirm the ability of a multimedia carrier to exchange secret information between two end-points so that it is imperceptible, thus avoiding the detection of hidden information. The secret information can be embedded in several multimedia carriers, such as image or audio or video files. It works by embedding the message in a source cover which may make the observer feel it is the source cover itself. The type of multimedia carrier here is an image. However, this technique suffers from the problem of the carrier distortion. In this paper, we investigate the impact of some distortion types on the carrier images and discuss the possibility of using distraction images in steganography to protect the stego-image. Furthermore, we highlight the current challenges of image steganography. The experimentations show very interesting results.

Details

ISBN :
978-3-030-05528-8
ISBNs :
9783030055288
Database :
OpenAIRE
Journal :
Networked Systems ISBN: 9783030055288, NETYS
Accession number :
edsair.doi...........a7a3104b52ef6119a026a1f53e4a7dcd