Investigation of the influence of a template matrix on the embedding of information in an image
Abstract
Steganography is a modern approach to protect classified data against malicious attacks and misuse. Presented, accordingly, in this paper is a novel method for steganographic embedding of information. A template matrix is used for screening the original message embedded in an image. The efficiency of the steganographic embedding depends on the length of the message. The particular dependency is, therefore, the primary focus of the proposed work. The end results of the experiment were extremely satisfactory with the percentage of successfully retrieved messages being more than 90%, and the size of the processed images with embedded messages being fully acceptable and capable of being used in a communication environment.
References
Grebennikov, V. V. (2019). Steganography. History of cryptography, LitRes, (pp. 66-69). (in Russian)
Gribunin, V. G., Kokov, I. N. &Turintcev I.V. (2009). Digital stenography, Moscow: SOLON-PRESS. (in Russian)
Fridrich, J. (2010). Steganography in Digital Media: Principles, Algorithms, and Applications. Cambridge University Press, ISBN 978- 0521190190
Crossref
Fridrich, J. (2004). Steganography II. In International Multimedia Conference: Proceedings of the 2004 workshop on Multimedia and security, 2004.
Kruus, P., Scace, C., Heyman, M., & Mundy, M. (2003). A survey of steganography techniques for image files. Advanced Security Research Journal. 5(1), 41-52.
Kordov, K. & Stoyanov, B. (2017). Least Significant Bit Steganography using Hitzl-Zele Chaotic Map. International Journal of Electronics and Telecommunications, 63(4), 417-422.
Crossref
Rani, N. & Chaudhary, J. (2013). Text Steganography Techniques: A Review. International Journal of Engineering Trends and Technology (IJETT),4(7).
Neil, F. & Johnson, S. J. (1998). George Mason University, "Exploring Steganography: Seeing the Unseen", IEEE Computers, 26-34.
Crossref
Ross, J., & Petitcolas, F.A.P. (1998). On the limits of steganography. IEEE Journal of Selected Areas in Communications, 16(4),474-481. May 1998. Special Issue on Copyright & Privacy Protection. ISSN 0733-8716.
Crossref
Nain, S. & Kumar, S. (2014) Steganography and Its Various Techniques. International Journal of Enhanced Research in Science Technology & Engineering, 3(6),241-245. ISSN: 2319-7463
Stanev, S. & Szczypiorski, K. (2016). Steganography Training: A Case Study from University of Shumen in Bulgaria. International Journal of Electronics and Telecommunications, 62(3), 315-318.
Crossref
Stanev, S., Zhelezov, S. & Yakimov, I. (2012). An approach for parallel steganalysis based on data compression. In Proceedings of Jubilee International Congress, 40, 360-367.
Stoyanov, B. P., Zhelezov, S. K. & Kordov, K. M. (2016). Least significant bit image steganography algorithm based on chaotic rotation equations. Comptes rendus de l'Academie bulgare des Sciences, 69(7), 845-850.
Lokhande, U. (2014). An Effective Way of using LSB Steganography in images along with Cryptography. International Journal of Computer Applications, 88(12)
Crossref
Zhelezov, S. (2016). Modified Algorithm for Steganalysis. Mathematical and Software Engineering, 1(2), 31-36.
Zhelezov, S. & Paraskevov, H. (2015). Possibilities for steganographic parallel processing with a cluster system. Contemporary Engineering Sciences, 8(20).
Crossref
Total number of hits on abstract = 278 times
Downloads for 2025

This work is licensed under a Creative Commons Attribution 4.0 International License.