BibTex RIS Cite

A HYBRID STEGANOGRAPHIC APPROACH VIA WEB ADRESSES

Year 2013, Volume: 2 Issue: 3, 53 - 60, 01.09.2013

Abstract

With the rapid growth of information technology and internet, security has become a critical issue. Therefore, data hiding gained importance for delivering secret messages. Data hiding techniques hide messages such as images, videos, texts, etc. A data hiding technique is different from cryptology. A cryptographic scheme encrypts the message and then the message is sent, which is more secure and unpredictable, to the receiver’s side. Since the message has a meaningless and uncommon content, the communication makes the observer aware of the exchange, so there is always a threat from a malicious attacker.Steganography is the art of writing secret data in such a way that no one except the intended receiver knows about the existence of secret data. Successful steganography depends on the carrier medium not to raise attention. In this study, a steganographic scheme that employs URL of web pages, has been proposed. Images have been used as the carriers. LZW coding and DES cryption algorithms have been used to increase the security. Experimental results showed that the proposed method is feasible for any communication between two parties. Since the communication is performed via only a web address, it does not raise suspicion in case of an observation.

References

  • Huang, H. C., and Fang, W. C., (2010). Techniques and applications of intelligent multimedia data hiding, Telecommunication Systems, 44(3-4):241-251.
  • Weng, C. Y., Tso, H. K., Wang, S. J., (2012). Steganographic data hiding in image processing using predictive differencing, Opto-Electronics Review, 20(2):126-133. Swain, G., and Lenka, S. K., (2013). Steganography using two sided, three sided, and four sided side match methods, CSI Transactions on ICT, 1(2):127-133.
  • Cheddad, A., Condell, J., Curran, K., McKevitt, P., (2010). Digital image steganography: Survey and analysis of current methods, Signal Processing, 90(3):727-752.
  • Satir, E., and Isik, H., (2012). A compression-based text steganography method, Journal of Systems and Software, 85(10): 2385-2394.
  • Ioannidou, A., Halkidis, S., T., Stephanides, G., (2012). A novel technique for image steganography based on a high payload method and edge detection, Expert Systems with Applications, 39(14): 11517–11524.
  • Bailey, K., and Curran, K., (2006). An evaluation of image based steganography methods using visual inspection and automated detection techniques, Multimedia Tools and Applications, 31(3):327.
  • Fu, Y., Zhang, R., Ma, S., Qu, Z., Nıu, X., Yang, Y., (2009). Fast coding in digital steganography, The Journal of China Universities of Posts and Telecommunications, 16(6):92-96. http://www.tr.lipsum.com/feed/html, (Last Accessed: 28.11.2013).

A HYBRID STEGANOGRAPHIC APPROACH VIA WEB ADRESSES

Year 2013, Volume: 2 Issue: 3, 53 - 60, 01.09.2013

Abstract

References

  • Huang, H. C., and Fang, W. C., (2010). Techniques and applications of intelligent multimedia data hiding, Telecommunication Systems, 44(3-4):241-251.
  • Weng, C. Y., Tso, H. K., Wang, S. J., (2012). Steganographic data hiding in image processing using predictive differencing, Opto-Electronics Review, 20(2):126-133. Swain, G., and Lenka, S. K., (2013). Steganography using two sided, three sided, and four sided side match methods, CSI Transactions on ICT, 1(2):127-133.
  • Cheddad, A., Condell, J., Curran, K., McKevitt, P., (2010). Digital image steganography: Survey and analysis of current methods, Signal Processing, 90(3):727-752.
  • Satir, E., and Isik, H., (2012). A compression-based text steganography method, Journal of Systems and Software, 85(10): 2385-2394.
  • Ioannidou, A., Halkidis, S., T., Stephanides, G., (2012). A novel technique for image steganography based on a high payload method and edge detection, Expert Systems with Applications, 39(14): 11517–11524.
  • Bailey, K., and Curran, K., (2006). An evaluation of image based steganography methods using visual inspection and automated detection techniques, Multimedia Tools and Applications, 31(3):327.
  • Fu, Y., Zhang, R., Ma, S., Qu, Z., Nıu, X., Yang, Y., (2009). Fast coding in digital steganography, The Journal of China Universities of Posts and Telecommunications, 16(6):92-96. http://www.tr.lipsum.com/feed/html, (Last Accessed: 28.11.2013).
There are 7 citations in total.

Details

Primary Language Turkish
Journal Section Articles
Authors

Esra Şatır This is me

Oğuzhan Kendirli This is me

Publication Date September 1, 2013
Published in Issue Year 2013 Volume: 2 Issue: 3

Cite

APA Şatır, E., & Kendirli, O. (2013). A HYBRID STEGANOGRAPHIC APPROACH VIA WEB ADRESSES. İleri Teknoloji Bilimleri Dergisi, 2(3), 53-60.
AMA Şatır E, Kendirli O. A HYBRID STEGANOGRAPHIC APPROACH VIA WEB ADRESSES. İleri Teknoloji Bilimleri Dergisi. September 2013;2(3):53-60.
Chicago Şatır, Esra, and Oğuzhan Kendirli. “A HYBRID STEGANOGRAPHIC APPROACH VIA WEB ADRESSES”. İleri Teknoloji Bilimleri Dergisi 2, no. 3 (September 2013): 53-60.
EndNote Şatır E, Kendirli O (September 1, 2013) A HYBRID STEGANOGRAPHIC APPROACH VIA WEB ADRESSES. İleri Teknoloji Bilimleri Dergisi 2 3 53–60.
IEEE E. Şatır and O. Kendirli, “A HYBRID STEGANOGRAPHIC APPROACH VIA WEB ADRESSES”, İleri Teknoloji Bilimleri Dergisi, vol. 2, no. 3, pp. 53–60, 2013.
ISNAD Şatır, Esra - Kendirli, Oğuzhan. “A HYBRID STEGANOGRAPHIC APPROACH VIA WEB ADRESSES”. İleri Teknoloji Bilimleri Dergisi 2/3 (September 2013), 53-60.
JAMA Şatır E, Kendirli O. A HYBRID STEGANOGRAPHIC APPROACH VIA WEB ADRESSES. İleri Teknoloji Bilimleri Dergisi. 2013;2:53–60.
MLA Şatır, Esra and Oğuzhan Kendirli. “A HYBRID STEGANOGRAPHIC APPROACH VIA WEB ADRESSES”. İleri Teknoloji Bilimleri Dergisi, vol. 2, no. 3, 2013, pp. 53-60.
Vancouver Şatır E, Kendirli O. A HYBRID STEGANOGRAPHIC APPROACH VIA WEB ADRESSES. İleri Teknoloji Bilimleri Dergisi. 2013;2(3):53-60.