In a standard steganographic framework, Alice sends a secrete message, M, to Bob by embedding her secret message into the cover-signal, S, to obtain the stego-signal, X. However, the warden, Wendy, examines every communication between Alice and Bob, and punishes them if steganographic covert communication is detected. For example, consider two prisoners, Alice and Bob, who want to secretly exchange information regarding their escape plan. Steganography can be modeled as a prisoner’s problem (Simmons, 1984). A statistical dissimilarity measure between the cover and the stego-signal is generally used to measure the security of a given steganographic method (Cachin, 1998 Zollner et al., 1998 Chandramouli & Memon, 2003). The steganographic encoder embeds a message into the cover-signal using a secret key such that perceptual and other distortion constraints are satisfied. Steganography deals with hiding information into a cover (host or original) signal such that no one other than the intended recipient can detect or extract the hidden message. At the same time, however, advances in these technologies have also made covert-communication drag-and-drop easy, which poses new security threats digital steganography is one of these treats. is just a matter of few mouse-clicks, which was impossible few years ago. Today, marketing a new product, sending pictures, sharing videos etc. Advances in digital content generation, manipulation, and distribution technologies have completely changed the way we used to sharing information, do business, market new products, make social networks, etc. The explosive growth of the Web, digital content generation, deployment of ultra high speed networks, and development of P2P technologies to the exchange information has created both tremendous opportunities and new security threats.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |