Digital Image Cryptosystem with Adaptive Steganography

Submitted by: Submitted by

Views: 230

Words: 10765

Pages: 44

Category: Science and Technology

Date Submitted: 09/10/2013 06:25 AM

Report This Essay

JOMO KENYATTA UNIVERSITY

OF

AGRICULTURE AND TECHNOLOGY

INSTITUTE OF COMPUTER SCIENCE AND INFORMATION TECHNOLOGY

BSc COMPUTER TECHNOLOGY

Literature Review

On

DIGITAL IMAGE CRYPTOSYSTEM WITH ADAPTIVE STEGANOGRAPHY

NAME : JOHN NJENGA

REG NO : CS 282-0782/2009

SUPERVISORS:

DR. OKEYO

MR. J WAINAINA

DECLARATION

I declare that all materials presented here are my own original work, or fully and specifically acknowledged wherever adapted from other sources. The work has not been submitted previously, in whole or in part, to qualify for any academic award. The content of the thesis is the result of work which has been carried out since the official approval of my proposal.

Contents

DECLARATION 2

LIST OF FIGURES 5

LIST OF TABLES 5

ABBREVIATIONS AND SYMBOLS 5

ABSTRACT 6

CHAPTER 1 7

INTRODUCTION 7

1.1 BACKGROUND 8

A Steganographic Framework 8

1.2 STATEMENT OF THE PROBLEM 9

1.3 OBJECTIVES OF THE STUDY 11

1.4.1 Specific Objectives 11

CHAPTER TWO 12

2.0 LITERATURE REVIEW 12

2.1 Spatial Domain 12

2.2 Transform Domain 14

2.3 EXISTING ATTACKS 15

2.3.1 Steganalysis 15

2.4.1.2 Blind Attacks 18

2.3 STATISTICAL RESTORATION 20

Introduction 20

2.3.1 Embedding by Pixel 21

Algorithm Pixel Swap Embedding 22

2.3.1.1 Security Analysis 23

2.3.1.2 New Statistical Restoration Scheme 23

2.4 Mathematical Formulation of Proposed scheme 25

2.4.2 Restoration with Minimum Restoration 27

2.4.3 Security Analysis 28

2.4.3.1 Analysis 28

2.5 Spatial Desynchronization 28

2.5.1 Introduction 29

2.5.2 Calibration Attack 30

2.6 Counter Measures to Blind Steganalysis 30

2.6.1 Spatial Block Desynchronization 32

2.7 The Proposed Algorithm 33

2.8 CONCLUSION AND FUTURE DIRECTIONS 38

2.8.1 Conclusion 38

2.8.2 Future Directions 39

2.9 PROJECT SCHEDULE 40

3.0 RESEARCH BUDGET 41

REFERENCES 42

LIST OF FIGURES

Figure 1.1, Trade-off between embedding capacity, Undetectability and robustness in data hiding 10

Figure 2.1: A generalized steganographic framework 10

Figure 3: Private...