Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

Steganography with Projection aided Payload Dimension Reduction and Reconstruction for Military Covert Communication

Print
PDF
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2016
Authors:
Ratnakirti Roy, Suvamoy Changder
10.5120/ijca2016909126

Ratnakirti Roy and Suvamoy Changder. Article: Steganography with Projection aided Payload Dimension Reduction and Reconstruction for Military Covert Communication. International Journal of Computer Applications 139(3):32-37, April 2016. Published by Foundation of Computer Science (FCS), NY, USA. BibTeX

@article{key:article,
	author = {Ratnakirti Roy and Suvamoy Changder},
	title = {Article: Steganography with Projection aided Payload Dimension Reduction and Reconstruction for Military Covert Communication},
	journal = {International Journal of Computer Applications},
	year = {2016},
	volume = {139},
	number = {3},
	pages = {32-37},
	month = {April},
	note = {Published by Foundation of Computer Science (FCS), NY, USA}
}

Abstract

Steganography techniques find importance in military applications because of their ability to communicate covertly. It is evident for any image steganography technique that if the payload can be represented in a smaller dimension than its original form, then the actual embedding requirement can be lessened thereby improving the statistical imperceptibility of the method. This paper presents an image steganography technique specifically aimed to be used for military covert communication which utilizes payload dimension reduction using parallel beam projection of images. Efforts have been given to ensure that the proposed technique conforms to high Imperceptibility and Fidelity which are the primary quality requirements for any image steganography system.

References

  1. Kelly, G. & McKenzie, B. Security, privacy and confidentiality issues on the internet. http://www.ncbi.nlm.nih.gov/pmc/articles/PMC1761937/ [Accessed on 3rd June, 2015].
  2. Morkel, T.; Eloff, J.H.P.; Olivier, M.S. AN OVERVIEW OF IMAGE STEGANOGRAPHY. In Proc. Fifth Annual Information Security South Africa Conference (ISSA2005), 2005.
  3. Koops, Bert-J. Overview per country. Crypto Law Survey.2013. http://www.cryptolaw.org/cls2.htm [Accessed on 20th June, 2015]
  4. What are the Cryptographic Policies of Some Countries? http://www.emc.com/emc-plus/rsa-labs/standards-initiatives/cryptographic-policies-countries.htm [Accessed on 15th June, 2015].
  5. Serdean, C.V.; Tomlinson, M.; Wade, J.; Ambroze, A.M. Protecting Intellectual Rights: Digital Watermarking in the wavelet domain. In Proc. IEEE Int. Workshop Trends and Recent Achievements in IT, 2002, pp. 16-18.
  6. Ahmed, D.E.M.; Khalifa, O.O. Robust and Secure Image Steganography Based on Elliptic Curve Cryptography. In Proc. 2014 International Conference on Computer and Communication Engineering (ICCCE), 2014, pp. 289-291. doi: 10.1109/ICCCE.2014.88
  7. Goel, S.; Kumar, P.; Saraswat, R. High Capacity Image Steganography Method Using LZW, IWT and Modified Pixel Indicator Technique. IJCSIT, 2014, 5(3), 3759-3763, ISSN: 0975-6946.
  8. Thangalatha Legaz, C.; Nivetha, K, Saranya, R., Mathumathi, V. Image Hiding with Payload Reduction using Z-Transform Steganography, IJERT, 2014, 3(4), 866-869, ISSN: 2278-0181.
  9. Tang, M.; Zeng, S.; Chen, X.;Hu, J.;Du, Y. An adaptive image steganography using AMBTC compression and interpolation technique. Optik - International Journal for Light and Electron Optics, 2016, 127(1), 471-477, Elsevier B.V, DOI: doi:10.1016/j.ijleo.2015.09.216.
  10. Guo, J.-M.; Thanh, N.L. Secret Communication Using JPEG Double Compression, IEEE Signal Processing Letters, 2010, 17(10), 879-882, doi: 10.1109/LSP.2010.2066110.
  11. Samima, S.; Roy, R.; Changder, S. Secure Key based Image Realization Steganography. In Proc. IEEE International Conference on Image Information Processing(ICIIP 2013), Shimla, December 2013, pp. 377-382.
  12. Roy, R. & Changder, S. Image Realization Steganography with LCS based Mapping. In Proc. 7th International Conference on Contemporary Computing (IC3 2014), August 2014, pp. 218-223.
  13. Cierniak, R. Reconstruction from Parallel-beam Projections. X-Ray Computed Tomography. In Biomedical Engineering, 2011, Springer London, pp. 83-125.
  14. X-Ray Computed Tomography. http://en.wikipedia.org/wiki/Xray_computed_tomography [Accessed on 7th January, 2015].
  15. Image Projections and the Radon Transform. https://www.clear.rice.edu/elec431/projects96/DSP/bpanalysis.html [Accessed on 14th December, 2014].
  16. Smith, Steven W. Special Imaging Techniques. Digital Signal Processing: A Practical Guide for Engineers and Scientists, 1st Edition, 2002, Newnes, Chapter 25.
  17. Megherbi, N.; Breckon, T.P.; Flitton, G.T.; Mouton, A. Radon Transform based Metal Artefacts Generation in 3D Threat Image Projection. In Proc. SPIE Optics and Photonics for Counterterrorism, Crime Fighting and Defence, 2013, pp.1-7.
  18. Tomographic Reconstruction. http://en.wikipedia.org/wiki/Tomographic_reconstruction [Accessed on 8th January 2015].
  19. Crandall, R. Some Notes on Steganography. Steganography Mailing List, 1998. http://www.dia.unisa.it/~ads/corso-security/www/CORSO-0203/steganografia/LINKS%20LOCALI/matrix-encoding.pdf [Accessed on 19th December, 2014]
  20. Shepp, L. & Logan, B.F. The Fourier Reconstruction of a Head Section. IEEE Transactions on Nuclear Science, 1974, 21(3), 21-43.
  21. Szudzik, M., An Elegant Pairing Function. http://szudzik.com/ElegantPairing.pdf [Accessed on 22nd June, 2015]
  22. Cantor, G., A Contribution to the Theory of Manifolds, Journal of Pure and Applied Mathematics, 1878, 84, 242-258 (German).
  23. Provos, N. & Honeyman, P. Hide and Seek: An Introduction to Steganography. IEEE Security and Privacy, 2003, 1(3), 32-44.

Keywords

Steganography, Image Steganography, Parallel Beam Projection, Radon transform, Image Reconstruction.