24.11.2014 Views

Elektronika 2009-11.pdf - Instytut Systemów Elektronicznych

Elektronika 2009-11.pdf - Instytut Systemów Elektronicznych

Elektronika 2009-11.pdf - Instytut Systemów Elektronicznych

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

conducting wide range of experiments involving different types<br />

of message embedding, diverse attacks (employing image<br />

processing algorithms) and steganalysis with the use of popular<br />

methods. Although the main purpose of VSL is to provide<br />

efficient yet easy tool for scientists and students, it can be<br />

used for learning and extended by everyone. With the help of<br />

VSL, any new steganographic/steganalytic/watermarking<br />

method may be investigated. Thanks to that, people can be<br />

more aware of current information hiding problems, which is<br />

instantly gaining more popularity. It is an important aspect, especially<br />

nowadays, when successive privacy issues are continually<br />

emerging and civil liberties and rights are more and<br />

more often not taken into consideration.<br />

Fig. 4. Example flow of distortion modeling<br />

Rys. 4. Przykład przebiegu modelowania zakłóceń<br />

Fig. 5. Example flow of parallel message embedding with two<br />

methods<br />

Rys. 5. Przykładowy przebieg równoległego osadzania informacji<br />

dwiema metodami<br />

Another scenario is shown in Fig. 4. Cover object is<br />

processed in an iterative manner. In every cycle it is used for<br />

embedding, distorted and stored. Finally, the message is recovered,<br />

so the robustness could be tested. On the right side<br />

the Display module window is presented. The next figure<br />

(Fig. 5) demonstrates a concept of parallel processing in<br />

which many operations on different sets of images can be<br />

done separately at one time for easy and clear further comparison.<br />

Example usage of this kind of processing could be<br />

performing embedding on two different sets of images: e.g.<br />

for training and testing classifier or comparing results of embedding<br />

with same technique but different parameters.<br />

The experiments presented in this section as simplified<br />

flows do not exhaust the possible field of applications of the<br />

VSL. An open architecture of the environment and an idea of<br />

flexible connections gives the possibility to create many more<br />

schemes of processing, employing lots of different modules.<br />

According to the assumption presented in the beginning, the<br />

architecture of VSL allows many extra modules to be attached<br />

to the main application. Thanks to open VSL API and<br />

popular Java programming language one can create his own<br />

steganographic/ steganalysis plugin and profit from the automatic<br />

processing.<br />

Summary<br />

Proposed Virtual Steganographic Laboratory is a novel approach<br />

to steganographic experiments performed on digital<br />

images. It gives scientists and students a powerful tool for<br />

References<br />

[1] Artz, D.: Digital Steganography, Hiding Data within Data. Proc.<br />

IEEE Internet Computing, 5(3), 75-80, 2001.<br />

[2] Chemak, C., Bouhlel, M., Lapayre, J.: A new scheme of robust<br />

image watermarking: ”The double watermarking algorithm”.<br />

Summer Computer Simulation Conference: San Diego/California,<br />

1201-1208, 2007.<br />

[3] Chen, W. Y.: Color image steganography scheme using DFT, SPIHT<br />

codec, and modified differential phase-shift keying techniques. Applied<br />

Mathematics and Computation 196(1), 40-54, 2008.<br />

[4] Cheung, W.: Digital Image Watermarking in Spatial and Transform<br />

Domains. Proc. TENCON, 374-378, 2000.<br />

[5] Fridrich, J., Pevny, T., Kodovsky, J.: Statistically undetectable<br />

jpeg steganography: dead ends challenges, and opportunities.<br />

MM&Sec, 3-14, 2007.<br />

[6] Hetzl, S., Mutzel, P.: A graph-theoretic approach to steganography.<br />

CMS 2005, LNCS 3677, 119-128, 2005.<br />

[7] Johnson, N. F., Jajodia, S.: Steganography: Seeing the Unseen.<br />

IEEE Computer, 26-34, 1998.<br />

[8] Johnson, N., Duric, Z., Jajodia, S.: Information hiding: steganography<br />

and watermarking: attacks and countermeasures Springer.<br />

ISBN 978-0-7923-7204-2, 2001.<br />

[9] Johnson, N.: Steganography Software Website http://www.<br />

jjtc.com/Steganography/tools.html, 2008.<br />

[10] Kaarna, A., Toivanen, P.: Digital Watermarking of Spectral Images<br />

in PCA/Wavelet Transform Domain In: Proc. IGARSS,<br />

3564-3567, 2003<br />

[11] Katzenbeisser, S., Petitcolas, F.: Information hiding techniques<br />

for steganography and digital watermarking, Artech House<br />

Books, 2000.<br />

[12] Kim, Y., Duric, Z., Richards, D.: Modified Matrix Encoding Technique<br />

for Minimal Distortion Steganography. Proceedings of the<br />

8th International Workshop on Information Hiding. LNCS vol.<br />

4437, 314-327, 2006.<br />

[13] Latham, A.: Steganography: Jphide and Jpseek<br />

http://linux01.gwdg.de/alatham/stego.html, 1999.<br />

[14] Lawenda, M., Meyer, N., Rajtar, T., Okoń, M., Stokłosa, D.,<br />

Kaliszan, D., Stroiński, M.: Generalization aspects in the virtual<br />

laboratory system. Remote Engineering and Virtual Instrumentation<br />

Villach, Austria, 28-29 September, 2004.<br />

[15] Lyu, S., Farid, H.: Steganalysis using higher-order image statistics.<br />

IEEE Transactions on Information Forensics and Security,<br />

vol. 1, no. 1, 111-119, 2006.<br />

[16] Milbrandt, E.: Steganography Software Website http://www.stegoarchive.com/,<br />

2008.<br />

[17] Podilchuk, C., Delp, E.: Digital Watermarking Algorithms and Applications.<br />

Proc. IEEE Signal Processing Magazine, 18(4), 33-<br />

46, 2001.<br />

[18] Provos, N.: Defending against statistical steganalysis. 10th<br />

USENIX Security Symposium, Washington, DC, 2001.<br />

[19] Rocha, A., Goldenstein, S.: Steganography and Steganalysis in<br />

Digital Multimedia: Hype or Hallelujah? Journal of Theoretical<br />

and Applied Computing - RITA 15(1), 83-110, 2008.<br />

[20] Sun Microsystems, Inc.: SOAP/TCP v1.0, http://java.sun.com/<br />

webservices /reference/apis-docs /soap-tcp-v1.0.pdf, 2008.<br />

[21] Sun Microsystems, Inc.: Java API for XML Web Services (JAX-WS)<br />

Overview https://jaxws.dev.java.net/nonav/2.1/docs/index.html,<br />

2008.<br />

[22] W3C Recommendation, SOAP Version 1.2 Part 0: Primer (Second<br />

Edition), http://www.w3.org/TR/2007/ REC-soap12-part0-<br />

20070427/, 27 April, 2007.<br />

64 ELEKTRONIKA 11/<strong>2009</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!