Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (3)

Search Parameters:
Keywords = steganalysis resilience

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
23 pages, 1557 KiB  
Article
Dual Partial Reversible Data Hiding Using Enhanced Hamming Code
by Cheonshik Kim, Ching-Nung Yang and Lu Leng
Appl. Sci. 2025, 15(10), 5264; https://doi.org/10.3390/app15105264 - 8 May 2025
Viewed by 362
Abstract
Traditional reversible data hiding (RDH) methods prioritize the exact recovery of the original cover image; however, this rigidity often hinders both capacity and design flexibility. This study introduces a partial reversible data hiding (PRDH) framework that departs from conventional standards by allowing reversibility [...] Read more.
Traditional reversible data hiding (RDH) methods prioritize the exact recovery of the original cover image; however, this rigidity often hinders both capacity and design flexibility. This study introduces a partial reversible data hiding (PRDH) framework that departs from conventional standards by allowing reversibility relative to a generated cover image rather than the original. The proposed system leverages a dual-image structure and an enhanced HC(7,4) Hamming code to synthesize virtual pixels, enabling efficient and low-distortion syndrome-based encoding. Notably, it achieves embedding rates up to 1.5 bpp with PSNR values exceeding 48 dB. While the proposed method avoids auxiliary data, its reliability hinges on paired image availability, which is a consideration for real-world deployment. Demonstrated resilience to RS-based steganalysis suggests viability in sensitive domains such as embedding structured metadata in diagnostic medical imagery. Nonetheless, further evaluation across more diverse image types and attack scenarios is necessary in order to confirm its generalizability. Full article
(This article belongs to the Special Issue Digital Image Processing: Technologies and Applications)
Show Figures

Figure 1

19 pages, 1962 KiB  
Article
A Two-Phase Embedding Approach for Secure Distributed Steganography
by Kamil Woźniak, Marek R. Ogiela and Lidia Ogiela
Sensors 2025, 25(5), 1448; https://doi.org/10.3390/s25051448 - 27 Feb 2025
Viewed by 625
Abstract
Steganography serves a crucial role in secure communications by concealing information within non-suspicious media, yet traditional methods often lack resilience and efficiency. Distributed steganography, which involves fragmenting messages across multiple containers using secret sharing schemes, offers improved security but increases complexity. This paper [...] Read more.
Steganography serves a crucial role in secure communications by concealing information within non-suspicious media, yet traditional methods often lack resilience and efficiency. Distributed steganography, which involves fragmenting messages across multiple containers using secret sharing schemes, offers improved security but increases complexity. This paper introduces a novel two-phase embedding algorithm that mitigates these issues, enhancing both security and practicality. Initially, the secret message is divided into shares using Shamir’s Secret Sharing and embedded into distinct media containers via pseudo-random LSB paths determined by a unique internal stego key. Subsequently, this internal key is further divided and embedded using a shared stego key known only to the sender and receiver, adding an additional security layer. The algorithm effectively reduces key management complexity while enhancing resilience against sophisticated steganalytic attacks. Evaluation metrics, including Peak Signal-to-Noise Ratio (PSNR) and Structural Similarity Index Measure (SSIM), demonstrate that stego images maintain high quality even when embedding up to 0.95 bits per pixel (bpp). Additionally, robustness tests with StegoExpose and Aletheia confirm the algorithm’s stealthiness, as no detections are made by these advanced steganalysis tools. This research offers a secure and efficient advancement in distributed steganography, facilitating resilient information concealment in sophisticated communication environments. Full article
(This article belongs to the Special Issue Advances and Challenges in Sensor Security Systems)
Show Figures

Figure 1

13 pages, 353 KiB  
Article
Velody 2—Resilient High-Capacity MIDI Steganography for Organ and Harpsichord Music
by Eric Järpe and Mattias Weckstén
Appl. Sci. 2021, 11(1), 39; https://doi.org/10.3390/app11010039 - 23 Dec 2020
Cited by 6 | Viewed by 3752
Abstract
A new method for musical steganography for the MIDI format is presented. The MIDI standard is a user-friendly music technology protocol that is frequently deployed by composers of different levels of ambition. There is to the author’s knowledge no fully implemented and rigorously [...] Read more.
A new method for musical steganography for the MIDI format is presented. The MIDI standard is a user-friendly music technology protocol that is frequently deployed by composers of different levels of ambition. There is to the author’s knowledge no fully implemented and rigorously specified, publicly available method for MIDI steganography. The goal of this study, however, is to investigate how a novel MIDI steganography algorithm can be implemented by manipulation of the velocity attribute subject to restrictions of capacity and security. Many of today’s MIDI steganography methods—less rigorously described in the literature—fail to be resilient to steganalysis. Traces (such as artefacts in the MIDI code which would not occur by the mere generation of MIDI music: MIDI file size inflation, radical changes in mean absolute error or peak signal-to-noise ratio of certain kinds of MIDI events or even audible effects in the stego MIDI file) that could catch the eye of a scrutinizing steganalyst are side-effects of many current methods described in the literature. This steganalysis resilience is an imperative property of the steganography method. However, by restricting the carrier MIDI files to classical organ and harpsichord pieces, the problem of velocities following the mood of the music can be avoided. The proposed method, called Velody 2, is found to be on par with or better than the cutting edge alternative methods regarding capacity and inflation while still possessing a better resilience against steganalysis. An audibility test was conducted to check that there are no signs of audible traces in the stego MIDI files. Full article
Show Figures

Graphical abstract

Back to TopTop