Notification: Our email services are now fully restored after a brief, temporary outage caused by a denial-of-service (DoS) attack. If you sent an email on Dec 6 and haven't received a response, please resend your email.
CFP last date
20 December 2024
Reseach Article

Steganography with Projection aided Payload Dimension Reduction and Reconstruction for Military Covert Communication

by Ratnakirti Roy, Suvamoy Changder
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 139 - Number 3
Year of Publication: 2016
Authors: Ratnakirti Roy, Suvamoy Changder
10.5120/ijca2016909126

Ratnakirti Roy, Suvamoy Changder . Steganography with Projection aided Payload Dimension Reduction and Reconstruction for Military Covert Communication. International Journal of Computer Applications. 139, 3 ( April 2016), 32-37. DOI=10.5120/ijca2016909126

@article{ 10.5120/ijca2016909126,
author = { Ratnakirti Roy, Suvamoy Changder },
title = { Steganography with Projection aided Payload Dimension Reduction and Reconstruction for Military Covert Communication },
journal = { International Journal of Computer Applications },
issue_date = { April 2016 },
volume = { 139 },
number = { 3 },
month = { April },
year = { 2016 },
issn = { 0975-8887 },
pages = { 32-37 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume139/number3/24472-2016909126/ },
doi = { 10.5120/ijca2016909126 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:39:58.476936+05:30
%A Ratnakirti Roy
%A Suvamoy Changder
%T Steganography with Projection aided Payload Dimension Reduction and Reconstruction for Military Covert Communication
%J International Journal of Computer Applications
%@ 0975-8887
%V 139
%N 3
%P 32-37
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Steganography techniques find importance in military applications because of their ability to communicate covertly. It is evident for any image steganography technique that if the payload can be represented in a smaller dimension than its original form, then the actual embedding requirement can be lessened thereby improving the statistical imperceptibility of the method. This paper presents an image steganography technique specifically aimed to be used for military covert communication which utilizes payload dimension reduction using parallel beam projection of images. Efforts have been given to ensure that the proposed technique conforms to high Imperceptibility and Fidelity which are the primary quality requirements for any image steganography system.

References
  1. Kelly, G. & McKenzie, B. Security, privacy and confidentiality issues on the internet. http://www.ncbi.nlm.nih.gov/pmc/articles/PMC1761937/ [Accessed on 3rd June, 2015].
  2. Morkel, T.; Eloff, J.H.P.; Olivier, M.S. AN OVERVIEW OF IMAGE STEGANOGRAPHY. In Proc. Fifth Annual Information Security South Africa Conference (ISSA2005), 2005.
  3. Koops, Bert-J. Overview per country. Crypto Law Survey.2013. http://www.cryptolaw.org/cls2.htm [Accessed on 20th June, 2015]
  4. What are the Cryptographic Policies of Some Countries? http://www.emc.com/emc-plus/rsa-labs/standards-initiatives/cryptographic-policies-countries.htm [Accessed on 15th June, 2015].
  5. Serdean, C.V.; Tomlinson, M.; Wade, J.; Ambroze, A.M. Protecting Intellectual Rights: Digital Watermarking in the wavelet domain. In Proc. IEEE Int. Workshop Trends and Recent Achievements in IT, 2002, pp. 16-18.
  6. Ahmed, D.E.M.; Khalifa, O.O. Robust and Secure Image Steganography Based on Elliptic Curve Cryptography. In Proc. 2014 International Conference on Computer and Communication Engineering (ICCCE), 2014, pp. 289-291. doi: 10.1109/ICCCE.2014.88
  7. Goel, S.; Kumar, P.; Saraswat, R. High Capacity Image Steganography Method Using LZW, IWT and Modified Pixel Indicator Technique. IJCSIT, 2014, 5(3), 3759-3763, ISSN: 0975-6946.
  8. Thangalatha Legaz, C.; Nivetha, K, Saranya, R., Mathumathi, V. Image Hiding with Payload Reduction using Z-Transform Steganography, IJERT, 2014, 3(4), 866-869, ISSN: 2278-0181.
  9. Tang, M.; Zeng, S.; Chen, X.;Hu, J.;Du, Y. An adaptive image steganography using AMBTC compression and interpolation technique. Optik - International Journal for Light and Electron Optics, 2016, 127(1), 471-477, Elsevier B.V, DOI: doi:10.1016/j.ijleo.2015.09.216.
  10. Guo, J.-M.; Thanh, N.L. Secret Communication Using JPEG Double Compression, IEEE Signal Processing Letters, 2010, 17(10), 879-882, doi: 10.1109/LSP.2010.2066110.
  11. Samima, S.; Roy, R.; Changder, S. Secure Key based Image Realization Steganography. In Proc. IEEE International Conference on Image Information Processing(ICIIP 2013), Shimla, December 2013, pp. 377-382.
  12. Roy, R. & Changder, S. Image Realization Steganography with LCS based Mapping. In Proc. 7th International Conference on Contemporary Computing (IC3 2014), August 2014, pp. 218-223.
  13. Cierniak, R. Reconstruction from Parallel-beam Projections. X-Ray Computed Tomography. In Biomedical Engineering, 2011, Springer London, pp. 83-125.
  14. X-Ray Computed Tomography. http://en.wikipedia.org/wiki/Xray_computed_tomography [Accessed on 7th January, 2015].
  15. Image Projections and the Radon Transform. https://www.clear.rice.edu/elec431/projects96/DSP/bpanalysis.html [Accessed on 14th December, 2014].
  16. Smith, Steven W. Special Imaging Techniques. Digital Signal Processing: A Practical Guide for Engineers and Scientists, 1st Edition, 2002, Newnes, Chapter 25.
  17. Megherbi, N.; Breckon, T.P.; Flitton, G.T.; Mouton, A. Radon Transform based Metal Artefacts Generation in 3D Threat Image Projection. In Proc. SPIE Optics and Photonics for Counterterrorism, Crime Fighting and Defence, 2013, pp.1-7.
  18. Tomographic Reconstruction. http://en.wikipedia.org/wiki/Tomographic_reconstruction [Accessed on 8th January 2015].
  19. Crandall, R. Some Notes on Steganography. Steganography Mailing List, 1998. http://www.dia.unisa.it/~ads/corso-security/www/CORSO-0203/steganografia/LINKS%20LOCALI/matrix-encoding.pdf [Accessed on 19th December, 2014]
  20. Shepp, L. & Logan, B.F. The Fourier Reconstruction of a Head Section. IEEE Transactions on Nuclear Science, 1974, 21(3), 21-43.
  21. Szudzik, M., An Elegant Pairing Function. http://szudzik.com/ElegantPairing.pdf [Accessed on 22nd June, 2015]
  22. Cantor, G., A Contribution to the Theory of Manifolds, Journal of Pure and Applied Mathematics, 1878, 84, 242-258 (German).
  23. Provos, N. & Honeyman, P. Hide and Seek: An Introduction to Steganography. IEEE Security and Privacy, 2003, 1(3), 32-44.
Index Terms

Computer Science
Information Sciences

Keywords

Steganography Image Steganography Parallel Beam Projection Radon transform Image Reconstruction.