13.07.2015 Views

WWW/Internet - Portal do Software Público Brasileiro

WWW/Internet - Portal do Software Público Brasileiro

WWW/Internet - Portal do Software Público Brasileiro

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

IADIS International Conference <strong>WWW</strong>/<strong>Internet</strong> 2010GENERATING SECRET COVER IMAGE BY USINGRANDOM ART APPROACHRaghad Jawad AhmedComputer Science and Engineering Dept., University Politehnica of Bucharest ,RomaniaABSTRACTWe present an efficient approach to offer a cover image to embed an image within. The cover image has been constructedaccording to the characteristics of the embedded image through applying Ran<strong>do</strong>m Art Approach. It is often uneasy tochoose a suitable image to embed the secret image within. To make it easier and more accurate, the characteristics of thesecret image are considered in a better and more accurate embedding.KEYWORDSSteganography, Information hiding, Ran<strong>do</strong>m Art, Image Processing, Cryptography.1. INTRODUCTIONSteganography is the art and science of hiding information such that its presence cannot be detected.Motivated is growing concern about the protection of intellectual property on the <strong>Internet</strong> and by the threat ofa ban for encryption techniques. The interest in techniques for information hiding has been increasing overthe recent years [1]. Two general directions can be distinguished within information hiding scenarios:protection only against the detection of a message by a passive adversary and hiding a message such that noteven an active adversary can remove it. A survey of current Steganography can be found in [2].Steganography with a passive adversary is perhaps best illustrated by Simmons’ “Prisoners’ problem” [7].Alice and Bob succeed if Alice can send information to Bob such that Eve <strong>do</strong>es not become suspicious,Hiding information from active adversaries is a different problem since the existence of a hidden message ispublicly known, such as in copyright protection schemes. Steganography with active adversaries can bedivided into watermarking and fingerprinting, Watermarking supplies digital objects with an identification oforigin; all objects are marked in the same way [4, 5, 6].In this paper the proposed approach produces a suitable cover image is needed to bury the embeddedimage. The present study a<strong>do</strong>pts ran<strong>do</strong>m image generation method considering embedded image, and theran<strong>do</strong>m image has been constructed according to the properties of the embedded image through applyingRan<strong>do</strong>m Art Approach. By applying the Ran<strong>do</strong>m Art approach on the embedded image by using the ran<strong>do</strong>mimage generation grammar, we can build a suitable cover image that clasps the embedded image in it.2. LITERATURE REVIEWThe technique for secret hiding of messages in an otherwise innocent looking carrier message belongs to thefield of Steganography. The purpose of Steganography is to conceal the very presence of secret information;The field of steganography is very old. The most popular steganographic methods used by spies includeinvisible ink and micro<strong>do</strong>ts [3]. Micro<strong>do</strong>ts are blocks of text or images scaled <strong>do</strong>wn to the size of a regular<strong>do</strong>t in a text. Shifting words and changing spacing between lines in text <strong>do</strong>cuments or in images containingtext can also be used for hiding bits of secret messages. The gaps in human visual and audio systems can beused for information hiding. In the case of images, the human eye is relatively insensitive to high frequencies.This fact has been utilized in many steganographic algorithms, which modify the least significant bits of graylevels in digital images or digital sound tracks. Additional bits of information can also be inserted into355

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!