Message Security over Image Communication

  IJCOT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© - Issue 2012 by IJCTT Journal
Volume-3 Issue-3                           
Year of Publication : 2012
Authors :Dinesh Goyal, Vishal Srivastava

MLA

Dinesh Goyal, Vishal Srivastava "Message Security over Image Communication"International Journal of Computer Trends and Technology (IJCTT),V3(3):1011-1016 Issue 2012 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract: -Previous work of us was to generate a secure Steganographic System with a password authentication, which is good enough for the host machine. But when the Steganographed image is communicated over the channel the security is quite low and interpretation of Steganography and the message is quite possible. In this paper an authentication system for Steganographed image is proposed in which a authentication watermark is used for the Steganographed image while being transmitted over the communication channel. They key distribution for the secure communication is generated using Kerberos.

References-

[1] Katzenbeisser, S., Petitcolas, F.A.P., Information hiding techniques for Steganography and digital watermarking, Artech House Publishers, 2000.
[2] Gnanaguruparan, M., “Recursive secret sharing in visual cryptography”, MS thesis, Louisiana State University.
[3] Shoemaker, C., “Hidden bits: A survey of techniques for digital watermarking”, Independent study, EER 290, spring 2002.
[4] Johnson, N.F., Jajodia, S., and Duric, Z., Information hiding: Steganography and watermarking attacks and countermeasures, Kluwer academic Publishers, 2000.
[5] Wang, Y., Doherty, J.F., and Van Dyck, R.E., “A watermarking algorithm for fingerprinting Intelligence images”, Conference on Information Science and Systems, The John Hopkins University, March 21-23, 2001.
[6] Kutter, M., and Hartung, F., Introduction to watermarking techniques – Information technology for steganography and digital watermarking, Artec House, 2000.
[7] I. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, “A secure, robust watermark for multimedia,” in Information Hiding: First Int. Workshop Proc. (R. Anderson, ed.), vol. 1174 of Lecture Notes in Computer Science, pp. 185–206, Springer-Verlag, 1996.
[8] W. Bender, D. Gruhl, N. Morimoto, and A. Lu, “Techniques for data hiding,” IBM Systems Journal, vol. 35, no. 3/4, pp. 313–336, 1996.
[9] Fabien A. P. Petitcolas, Ross J. Anderson, and Markus G. Kuhn. Attacks on copyright marking systems. In Second workshop on information hiding, pages 218-238, 1998.
[10] Brassil, J. Low, S. Maxemchu, N., and O’Gorman, L., “Electronic marking and identification techniques to discourage document copying”. Proceedings of IEEE INFOCOM’94, 1994 3, pp.1278-1287
[11] Matt L. Miller, Ingemar J. Cox, Jean-Paul M.G. Linnartz, Ton Kalker, A review of watermarking principles“. Published in “Digital Signal Processing in Multimedia Systems”, Ed. K. K. Parhi and T. Nishitani, Marcell Dekker Inc., 461-485, (1999)
[12] http://www.digimarc.com

Keywords: Steganography, Kerberos, RDA Algorithm