A comparision between steganography software tools

H. Arif, H. Hajjdiab
{"title":"A comparision between steganography software tools","authors":"H. Arif, H. Hajjdiab","doi":"10.1109/ICIS.2017.7960030","DOIUrl":null,"url":null,"abstract":"The process of hiding data in a medium that is insignificant, ordinary and not a secret is referred to as Steganography. This medium may be an image, text, video, audio, pdf, etc. The main advantage of Steganography is the fact that data is hidden in such a way that attackers find it hard to figure out exactly what the medium that carries the hidden message is. This is because the data is hidden in a medium that is not suspicious. Steganography tools take input images that can embed data like text or images inside of them. These tools then hide the text or image in the input image to create an output image. This image although looks similar to the input image, contains secret text or image information. In this paper, we will compare various tools that offer different algorithms for Steganography. We will input the same images and hide an image in them and see the different output images that are produced by the tools and compare them.","PeriodicalId":301467,"journal":{"name":"2017 IEEE/ACIS 16th International Conference on Computer and Information Science (ICIS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 IEEE/ACIS 16th International Conference on Computer and Information Science (ICIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICIS.2017.7960030","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

Abstract

The process of hiding data in a medium that is insignificant, ordinary and not a secret is referred to as Steganography. This medium may be an image, text, video, audio, pdf, etc. The main advantage of Steganography is the fact that data is hidden in such a way that attackers find it hard to figure out exactly what the medium that carries the hidden message is. This is because the data is hidden in a medium that is not suspicious. Steganography tools take input images that can embed data like text or images inside of them. These tools then hide the text or image in the input image to create an output image. This image although looks similar to the input image, contains secret text or image information. In this paper, we will compare various tools that offer different algorithms for Steganography. We will input the same images and hide an image in them and see the different output images that are produced by the tools and compare them.
隐写软件工具的比较
将数据隐藏在无关紧要的、普通的、非机密的介质中的过程称为隐写术。这种媒体可以是图像、文本、视频、音频、pdf等。隐写术的主要优点是数据以这样一种方式隐藏,攻击者很难准确地找出携带隐藏信息的媒介是什么。这是因为数据隐藏在一个不可疑的媒介中。隐写工具输入图像,可以在其中嵌入文本或图像等数据。然后,这些工具隐藏输入图像中的文本或图像,以创建输出图像。该图像虽然看起来与输入图像相似,但包含秘密文本或图像信息。在本文中,我们将比较提供不同隐写算法的各种工具。我们将输入相同的图像并在其中隐藏图像,并查看由工具产生的不同输出图像并对它们进行比较。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信