External Hardware Security for Steganography

Suresh D.S*, V. Udayashankara**
*Channabasaveshwara Institute of Technology, Gubbi.TUMKUR-572 216, Karnataka, India.
**S.J.C, Mysore, Karnataka, India.
Periodicity:November - January'2007
DOI : https://doi.org/10.26634/jfet.2.2.874

Abstract

Many steganographic techniques are extremely vulnerable to attacks, and even detection of the information in the image file is quite easy. So a microcontroller is used for the sake of security where it transmits a pre-programmed password at the beginning of each process. The steganalysis algorithm continued only if the received password is correct at the destination otherwise retrieving the secure information from the cover image is impossible.

Keywords

External Hardware Security, Steganography.

How to Cite this Article?

Suresh D.S and V. Udayashankara (2007). External Hardware Security for Steganography. i-manager’s Journal on Future Engineering and Technology, 2(2), 17-22. https://doi.org/10.26634/jfet.2.2.874

References

[1] Neil.F.Johnson and sushil jajodia, - steganography: seeing the unseen, IEEE computer, February 1998.
[2] Johnson, N.F., Duric, Z and Jajodia S. - 2001 Information Hiding: Steganography and Watermarking Attacks and Countermeasures, Kluwer Academic, Dordrecht, The Netherlands.
[3] Johnson, N.F. and Jajodia S. - 1998, Steganalysis: The Investigation of Hidden Information. In IEEE Conference on Information technology. Kearns, M.J. and Vazirani, U.v.1994
[4] Cole E - Hiding in Plain Sight: Steganography and the Art of Covert Communication, Wiley Publishing, Inc., 2003.
[5] Westfeld, A. - 1999. F5 A Steganographic Algorithm. In Third International Workshop on Information Hiding. (Dresden, Germany), Springer Verilag.
[6] Myke Predky - customizing PIC microcontroller.
[7] Steganography Mailing List - Markus Kuhn--1995-07-03 URL:http://www.thur.de/ulf/stegano/
[ 8 ] Windows BMPB itmap File Format URL:http://web.uccs.edu/wbahn/ECE1021/index.html.
[ 9 ] Microcontroller references URL: http://www.microchip.com.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Online 15 15

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.