Abstract
Any Universal Steganalysis algorithm developed should be tested with various stego-images to prove its efficiency. This work is aimed to develop a tool to build the stego-image database which is obtained by implementing various RGB based Least Significant Bit Steganographic algorithms. Though there are many stego-images sources available on the internet it lacks in the information such as how many rows has been infected by the steganography algorithms, how many bits have been modified and which channel has been affected. These parameters are important for Steganalysis algorithms to rate its efficiency. For the experiments conducted using proposed method, Stego-Image Image Generator Tool, images are chosen from board categories such as animals, nature, person etc to produce variety of Stego-Image. The proposed Stego-Image Generator (SIG) has been compared with various Stego-tools against various parameters to prove its efficiency.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Berghel, H., O’Gorman, L.: Protecting ownership rights through digital watermarks. IEEE Computer 29(7), 101–103 (1996)
Westfeld, A., Pfitzmann, A.: Attacks on Steganographic Systems. In: Proceedings of the Third International Workshop on Information Hiding, September 29-October 01, pp. 61–76 (1999)
Artz, D.: Digital Steganography: Hiding Data within Data. IEEE Internet Computing: Spotlight, 75–80 (May-June 2001)
Johnson, N., Jajodia, S.: Exploring steganography: Seeing the unseen. IEEE Computer 31(2), 26–34 (1998)
Pedram Hayati, A., et al.: Survey of Steganographic and Steganalytic Tools for the Digital Forensic Investigator. In: Workshop of Information Hiding and Digital Watermarking to be held in Conjunction with IFIPTM, Moncton, New Brunswick, Canada (July 2007)
Camera Shy, http://hacktivismo.com/projects/index.php
Hide, J.P., Seek.: http://linux01.gwdg.de/~alatham/stego.html
Jsteg Jpeg, http://www.nic.funet.fi/pub/crypt/steganography/
Mandelsteg, ftp://ftp.funet.fi/pub/crypt/steganography/
Steghide, http://steghide.sourceforge.net/
Camouflage, http://camouflage.unfiction.com/
Hide, Seek: ftp://ftp.funet.fi/pub/crypt/steganography/hdsk41.zip
S-Tools, ftp://ftp.funet.fi/pub/crypt/mirrors/idea.sec.dsi.unimi.it/code/
Steganos, http://www.steganography.com/
StegMark, http://www.datamark-tech.com/index.htm
Info Stego, http://www.antiy.net/infostego/
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Thiyagarajan, P., Aghila, G., Prasanna Venkatesan, V. (2011). Stego-Image Generator (SIG) - Building Steganography Image Database. In: Nagamalai, D., Renault, E., Dhanuskodi, M. (eds) Advances in Digital Image Processing and Information Technology. DPPR 2011. Communications in Computer and Information Science, vol 205. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-24055-3_27
Download citation
DOI: https://doi.org/10.1007/978-3-642-24055-3_27
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-24054-6
Online ISBN: 978-3-642-24055-3
eBook Packages: Computer ScienceComputer Science (R0)