Skip to main content

Stego-Image Generator (SIG) - Building Steganography Image Database

  • Conference paper
Advances in Digital Image Processing and Information Technology (DPPR 2011)

Abstract

Any Universal Steganalysis algorithm developed should be tested with various stego-images to prove its efficiency. This work is aimed to develop a tool to build the stego-image database which is obtained by implementing various RGB based Least Significant Bit Steganographic algorithms. Though there are many stego-images sources available on the internet it lacks in the information such as how many rows has been infected by the steganography algorithms, how many bits have been modified and which channel has been affected. These parameters are important for Steganalysis algorithms to rate its efficiency. For the experiments conducted using proposed method, Stego-Image Image Generator Tool, images are chosen from board categories such as animals, nature, person etc to produce variety of Stego-Image. The proposed Stego-Image Generator (SIG) has been compared with various Stego-tools against various parameters to prove its efficiency.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Berghel, H., O’Gorman, L.: Protecting ownership rights through digital watermarks. IEEE Computer 29(7), 101–103 (1996)

    Article  Google Scholar 

  2. Westfeld, A., Pfitzmann, A.: Attacks on Steganographic Systems. In: Proceedings of the Third International Workshop on Information Hiding, September 29-October 01, pp. 61–76 (1999)

    Google Scholar 

  3. Artz, D.: Digital Steganography: Hiding Data within Data. IEEE Internet Computing: Spotlight, 75–80 (May-June 2001)

    Google Scholar 

  4. Johnson, N., Jajodia, S.: Exploring steganography: Seeing the unseen. IEEE Computer 31(2), 26–34 (1998)

    Article  Google Scholar 

  5. Pedram Hayati, A., et al.: Survey of Steganographic and Steganalytic Tools for the Digital Forensic Investigator. In: Workshop of Information Hiding and Digital Watermarking to be held in Conjunction with IFIPTM, Moncton, New Brunswick, Canada (July 2007)

    Google Scholar 

  6. Camera Shy, http://hacktivismo.com/projects/index.php

  7. Hide4PGP, http://www.heinz-repp.onlinehome.de/Hide4PGP.htm

  8. Hide, J.P., Seek.: http://linux01.gwdg.de/~alatham/stego.html

  9. Jsteg Jpeg, http://www.nic.funet.fi/pub/crypt/steganography/

  10. Mandelsteg, ftp://ftp.funet.fi/pub/crypt/steganography/

  11. Steghide, http://steghide.sourceforge.net/

  12. Camouflage, http://camouflage.unfiction.com/

  13. Hide, Seek: ftp://ftp.funet.fi/pub/crypt/steganography/hdsk41.zip

  14. S-Tools, ftp://ftp.funet.fi/pub/crypt/mirrors/idea.sec.dsi.unimi.it/code/

  15. Steganos, http://www.steganography.com/

  16. StegMark, http://www.datamark-tech.com/index.htm

  17. Info Stego, http://www.antiy.net/infostego/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Thiyagarajan, P., Aghila, G., Prasanna Venkatesan, V. (2011). Stego-Image Generator (SIG) - Building Steganography Image Database. In: Nagamalai, D., Renault, E., Dhanuskodi, M. (eds) Advances in Digital Image Processing and Information Technology. DPPR 2011. Communications in Computer and Information Science, vol 205. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-24055-3_27

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-24055-3_27

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-24054-6

  • Online ISBN: 978-3-642-24055-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics