Abstract
It is well known that encryption provides secure channels for communicating entities. However, due to lack of covertness on these channels, an eavesdropper can identify encrypted streams through statistical tests and capture them for further cryptanalysis. Hence, the communicating entities can use steganography to achieve covertness. In this paper we propose a new form of multimedia steganography called data masking. Instead of embedding a secret message into a multimedia object, as in traditional multimedia steganography, we process the entire secret message to make it appear statistically similar to a multimedia object itself. Thereby we foil an eavesdropper who is primarily applying statistical tests to detect encrypted communication channels. We show that our approach can potentially give a covert channel capacity which is an order of magnitude higher than traditional steganography. Our experiments also show that steganalyzers trained with stego objects of known steganographic have a low detection accuracy for datamasked multimedia objects.
Similar content being viewed by others
References
G.J Simmons, Prisoner's Problem and the Subliminal Channel (The), CRYPTO83—Advances in Cryptology, Aug. 1984, pp. 51–67.
N.F Johnson and S. Katzenbeisser, “A Survey of Steganographic Techniques,” in Information Hiding S. Katzenbeisser and F. Petitcoals (Eds.), Artech House, Norwood, MA, 2000, pp. 43–78.
N.F. Johnson and S. Jajodia, “Steganalysis of Images Created Using Current Steganography Software,” in Information Hiding, David Aucsmith (Ed.), LNCS 1525, Springer-Verlag Berlin Heidelberg, 1998, pp. 32–47.
A. Westfield and A. Pfitzmann, “Attacks on Steganographic Systems,” in Information Hiding, LNCS 1768, Springer-Verlag Heidelberg, 1999, pp. 61–76.
J. Fridrich, M. Goljan, and R. Du, “Reliable Detection of LSB Steganography in Color and Grayscale Images,” in Proc. of the ACM Workshop on Multimedia and Security, Ottawa, CA, Oct., 2001, pp. 27–30.
I. Avcibas, N. Memon, and B. Sankur, “Steganalysis Using Image Quality Metrics,” Security and Watermarking of Multimedia Contents, SPIE, San Jose, 2001.
Advanced Encryption Standard, FIPS 197, 2001.
ISO/IEC 14495-1, ITU Recommendation T.87, “Information technology—Lossless and Near-Lossless Compression of Continuous-Tone Still Images,” 1999.
H. Zer, I. Avcibas, B. Sankur, and N. Memon, “Steganalysis of Audio Based on Audio Quality Metrics,” submitted to SPIE 2004.
Elke Franz et al., Steganography Preserving Statistical Properties, Fifth International Workshop on Information Hiding, 2002.
S. Lyu and H. Farid, Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines, Fifth International Workshop on Information Hiding, 2002.
S. Dumitrescu, X. Wu, and Z. Wang, “Detection of LSB Steganography via Sample Pair Analysis,” IEEE Transactions on Signal Processing, 2003, pp. 1995–2007.
Author information
Authors and Affiliations
Rights and permissions
About this article
Cite this article
Radhakrishnan, R., Kharrazi, M. & Memon, N. Data Masking: A New Approach for Steganography?. J VLSI Sign Process Syst Sign Image Video Technol 41, 293–303 (2005). https://doi.org/10.1007/s11265-005-4153-1
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11265-005-4153-1