Steganographic Secure Data Communication – A Hardware Approach

Authors

  • A. N. Naik Lecturer SIT, Polytechnic College, Poongodu Arcot, Trichy - 632 503, Tamil Nadu, India
  • R.T. Patil Associate Professor, R.I.T Sakhrale, Ghaziabad - 201 010, Uttar Pradesh, India
  • N.B. Naik Lecturer SIT, Polytechnic College, Poongodu Arcot, Trichy - 632 503, Tamil Nadu, India

DOI:

https://doi.org/10.51983/ajes-2013.2.1.1856

Keywords:

Steganography, Data Communication,, Hardware Approach

Abstract

Steganography is a science dealing with writing hidden messages in a particular way that only the sender & the intended recipient are able to decipher so as to provide security in open environment like internet. Steganography attempts to hide the very existence of the message and make communication undetectable. Important domains, besides classic computing, where steganography can be applied are domains using mobile and embedded devices. This paper focuses on the implementation of a steganographic algorithm on embedded devices – microcontrollers. Furthermore, this article presents experimental results obtained from testing a steganographic algorithm on embedded devices. The main purpose of implementing such an algorithm on a microcontroller is to provide security on low and medium cost mobile and other dedicated devices [1].

References

Daniela Stanescu, Valentin Stangaciu, Ioana Ghergulescu, Mircea Stratulat, “Steganography on embedded devices” 5th International Symposium on Applied Computational Intelligence and Informatics Timişoara, Romania [2] Neil F. Johnson, Sushil Jajodia, “Exploring Steganography: Seeing the Unseen”, IEEE COMPUTER, vol. 31, pp. 26-34, 1998.

József Lenti, “Steganographic methods”, Department of Control Engineering and Information Technology, Budapest University of Technology and Economics, H-1521, Budapest, Hungary, pp. 249- 258, June 2000.

J. Brassil, S. Low, N. Maxemchuk, and L. O’Gorman, “Electronic marking and identification techniques to discourage document copying,” Selected Areas in Communications, IEEE Journal on Vol. 13, pp. 1495-1504, 1995.

D. Gruhl, W. Bender, A. Lu, “Echo hiding”, in Information hiding: First International Workshop, R.J. Anderson, Ed. Vol.1174 of Lecture Votes in Computer Science, Isaac Newton Institute, Cambridge, England, pp. 295 – 315, May 1996 [6] D. Stanescu, M. Stratulat, B. Ciubotaru, D. Chiciudean, R. Cioarga, and D. Borca, “Digital Watermarking using Karhunen- Loeve transform,” Applied Computational Intelligence and Informatics, 2007. SACI ‘07. 4th International Symposium on, pp. 187-190, 2007.

D. Stanescu, M. Stratulat, V. Groza, I. Ghergulescu, D. Borca, “Steganography in YUV color space”, Robotic and Sensors Environments, 2007. ROSE 2007. International Workshop on Vol.12- 13 Oct. 2007

Taras Holotyak, Jessica Fridrich, Sviatoslav Voloshynovskiy, “Blind Statistical Steganalysis of Additive Steganography Using Wavelet Higher Order Statistics”, Communications and Multimedia Security, Vol. 3677/2005, ISB” 978-3-540-28791-9, pp. 273-274, 2005.

H.A. Farouk and M. Saeb, “Design and implementation of a secret key steganographic micro-architecture employing FPGA,” Proceedings of the 2004 conference on Asia South Pacific design automation: electronic design and solution fair, Yokohama, Japan: IEEE Press, pp. 577-578, 2004.

P.D.Khandait, “LSB Technique for Secure Data Communication”

Eric Cole ,”Hiding in Plain Sight: Steganography andthe Art of Covert Communication”

Karen Bailey & Kevin Curran Steganography

Gregory Kipper, “Investigator’s Guide to Steganography “.

Stefan Katzenbeisser and Fabien, A.P. Petitcolas, “Information Hiding Techniques for Steganography and Digital Watermarking”.

Hiding secrets in computer files: steganography is the new invisible ink, as codes stow away on images-An article from: The Futurist by Patrick Tucker

R.J. Anderson and F.A.P. Petitcolas, “On the Limits of Steganography,” IEEE Journal of Selected Areas in Comm., Vol. 16, No. 4, pp.474-481, 1998.

Ismail Avcıbas¸, Member, IEEE, Nasir Memon, Member, IEEE, and Bülent Sankur, Member, “Steganalysis Using Image Quality Metrics,” IEEE Transactions on Image Processing, Vol. 12, No. 2, February 2003.

Neil F. Johnson and Sushil Jajodia, “Exploring Steganography: Seeing the Unseen”, IEEE, 1998.

Niels Provos and Peter Honeyman, University of Michigan, “Hide and Seek: An Introduction to Steganography” IEEE Computer Society IEEE Security & Privacy.

R. Chandramouli and Nasir Memon, “Analysis of LSB Based Image Steganography Techniques”, IEEE 2001.

Downloads

Published

05-05-2013

How to Cite

Naik, A. N., Patil, R. ., & Naik, N. . (2013). Steganographic Secure Data Communication – A Hardware Approach. Asian Journal of Electrical Sciences, 2(1), 5–8. https://doi.org/10.51983/ajes-2013.2.1.1856