Share Email Print

Proceedings Paper

Secure steganography designed for mobile platforms
Format Member Price Non-Member Price
PDF $17.00 $21.00

Paper Abstract

Adaptive steganography, an intelligent approach to message hiding, integrated with matrix encoding and pn-sequences serves as a promising resolution to recent security assurance concerns. Incorporating the above data hiding concepts with established cryptographic protocols in wireless communication would greatly increase the security and privacy of transmitting sensitive information. We present an algorithm which will address the following problems: 1) low embedding capacity in mobile devices due to fixed image dimensions and memory constraints, 2) compatibility between mobile and land based desktop computers, and 3) detection of stego images by widely available steganalysis software [1-3]. Consistent with the smaller available memory, processor capabilities, and limited resolution associated with mobile devices, we propose a more magnified approach to steganography by focusing adaptive efforts at the pixel level. This deeper method, in comparison to the block processing techniques commonly found in existing adaptive methods, allows an increase in capacity while still offering a desired level of security. Based on computer simulations using high resolution, natural imagery and mobile device captured images, comparisons show that the proposed method securely allows an increased amount of embedding capacity but still avoids detection by varying steganalysis techniques.

Paper Details

Date Published: 2 May 2006
PDF: 10 pages
Proc. SPIE 6250, Mobile Multimedia/Image Processing for Military and Security Applications, 62500E (2 May 2006); doi: 10.1117/12.662245
Show Author Affiliations
Sos S. Agaian, Univ. of Texas at San Antonio (United States)
Ravindranath Cherukuri, Univ. of Texas at San Antonio (United States)
Ronnie R. Sifuentes, Univ. of Texas at San Antonio (United States)

Published in SPIE Proceedings Vol. 6250:
Mobile Multimedia/Image Processing for Military and Security Applications
Sos S. Agaian; Sabah A. Jassim, Editor(s)

© SPIE. Terms of Use
Back to Top
Sign in to read the full article
Create a free SPIE account to get access to
premium articles and original research
Forgot your username?