{"title":"一种安全有效的基于模式的隐写方法","authors":"Arjit Vatsa, Sanskar Agarwal, M. Ranjani","doi":"10.1109/ViTECoN58111.2023.10157667","DOIUrl":null,"url":null,"abstract":"Information is now widely available thanks to the development of the Internet and communication technologies. By itself, the abundance of knowledge creates a risk. The risk of intentional interference and eavesdropping in electronic communication is rising. In this day and age, privacy and security are top priorities. Two techniques have been developed in this context: cryptography and steganography. Steganography hides the presence of the message, whereas cryptography scrambles it to make it illegible. Steganographic techniques might be frequency-domain or spatial-domain (changing the pixel values to conceal data) (modifying the image's frequency coefficients). The vulnerability of spatial domain techniques to steganalysis is greater than that of frequency-domain methods. In this project, we provide an original pattern-based steganography method with an enhanced Caesar cypher for cryptography. This method chooses four patterns to conceal once the data is first encrypted using the extended Caesar cypher, the message in the picture. An additional degree of protection is added by securing the secret message with an AES-encrypted password. This technique is unnoticeable to visual assaults, histogram attacks, and statistical attacks since the changes it produces are not evident in the final image. This method offers fresh insight into a steganographic process that is more reliable, effective, and adaptable.","PeriodicalId":407488,"journal":{"name":"2023 2nd International Conference on Vision Towards Emerging Trends in Communication and Networking Technologies (ViTECoN)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Steganographic Method Using a Secure and Effective Pattern-Based Approach\",\"authors\":\"Arjit Vatsa, Sanskar Agarwal, M. Ranjani\",\"doi\":\"10.1109/ViTECoN58111.2023.10157667\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Information is now widely available thanks to the development of the Internet and communication technologies. By itself, the abundance of knowledge creates a risk. The risk of intentional interference and eavesdropping in electronic communication is rising. In this day and age, privacy and security are top priorities. Two techniques have been developed in this context: cryptography and steganography. Steganography hides the presence of the message, whereas cryptography scrambles it to make it illegible. Steganographic techniques might be frequency-domain or spatial-domain (changing the pixel values to conceal data) (modifying the image's frequency coefficients). The vulnerability of spatial domain techniques to steganalysis is greater than that of frequency-domain methods. In this project, we provide an original pattern-based steganography method with an enhanced Caesar cypher for cryptography. This method chooses four patterns to conceal once the data is first encrypted using the extended Caesar cypher, the message in the picture. An additional degree of protection is added by securing the secret message with an AES-encrypted password. This technique is unnoticeable to visual assaults, histogram attacks, and statistical attacks since the changes it produces are not evident in the final image. This method offers fresh insight into a steganographic process that is more reliable, effective, and adaptable.\",\"PeriodicalId\":407488,\"journal\":{\"name\":\"2023 2nd International Conference on Vision Towards Emerging Trends in Communication and Networking Technologies (ViTECoN)\",\"volume\":\"13 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-05-05\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 2nd International Conference on Vision Towards Emerging Trends in Communication and Networking Technologies (ViTECoN)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ViTECoN58111.2023.10157667\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 2nd International Conference on Vision Towards Emerging Trends in Communication and Networking Technologies (ViTECoN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ViTECoN58111.2023.10157667","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Steganographic Method Using a Secure and Effective Pattern-Based Approach
Information is now widely available thanks to the development of the Internet and communication technologies. By itself, the abundance of knowledge creates a risk. The risk of intentional interference and eavesdropping in electronic communication is rising. In this day and age, privacy and security are top priorities. Two techniques have been developed in this context: cryptography and steganography. Steganography hides the presence of the message, whereas cryptography scrambles it to make it illegible. Steganographic techniques might be frequency-domain or spatial-domain (changing the pixel values to conceal data) (modifying the image's frequency coefficients). The vulnerability of spatial domain techniques to steganalysis is greater than that of frequency-domain methods. In this project, we provide an original pattern-based steganography method with an enhanced Caesar cypher for cryptography. This method chooses four patterns to conceal once the data is first encrypted using the extended Caesar cypher, the message in the picture. An additional degree of protection is added by securing the secret message with an AES-encrypted password. This technique is unnoticeable to visual assaults, histogram attacks, and statistical attacks since the changes it produces are not evident in the final image. This method offers fresh insight into a steganographic process that is more reliable, effective, and adaptable.