Article Information  
CRYPTO-STEG: A Hybrid Cryptology - Steganography Approach for Improved Data Security

Keywords: Cryptology, Steganography, Steganalysis, Classification

Mehran University Research Journal of Engineering & Technology

Volume 31 ,  Issue 2

Atif  Bin Mansoor , Zohaib Khan  , Shoab Ahmed Khan ,

References
1. Stallings, W., "Cryptography and Network Security: Principles and Practices", Prentice Hall, Chapter-3, pp. 63-64, New York, 2003.
2. McBride, B.T., Peterson, G.L., and Gustafson, S.C., "A New Blind Method for Detecting Novel Steganography", Digital Investigation, Volume 2, pp. 50-70, February, 2005.
3. Khan, Z., and Mansoor, A.B., "Steganalysis of JPEG Images with Joint Transform Features", Pacific-Rim Symposium on Image and Video Technology, Volume 1, pp. 965-975, Tokyo, Japan, 2009.
4. Khan, Z., and Mansoor, A.B., "A New Hybrid DCT and Contourlet Transform Based JPEG Image Steganalysis Technique", 16th Scandinavian Conference on Image Analysis, Volume 1, pp. 91-98, Oslo, Norway, June, 2009.
5. UCID (Uncompressed Colour Image Database), Online: http://vision.cs.aston.ac.uk/datasets/UCID/ucid.html.
6. Schaefer, G., and Stich, M., "UCID-An Uncompressed Colour Image Database", SPIE, Storage and Retrieval Methods and Applications for Multimedia, Volume 1, pp. 472-480, San Jose, USA, January, 2004.
7. Steganography Software F5. Online : http://wwwrn.inf.tudresden. de/~westfeld/f5.html.
8. Westfeld, A. , "F5-A Steganographic Algorithm: High Capacity Despite Better Steganalysis", Information Hiding: 4th International Workshop, Lecture Notes in Computer Science, Moskowitz, I.S., (Editor), Volume 1, pp. 289-302, Springer-Verlag, Berlin Heidelberg, April, 2001.
9. Farid, H., "Detecting Hidden Messages Using Higherorder Statistical Models", IEEE International Conference on Image Processing, Volume 1, pp. 905-908, New York, 2002.
10. Wang, Y., and Moulin, P., "Optimized Feature Extraction for Learning-Based Image Steganalysis", IEEE Transactions on Information Forensics and Security, Volume 2, pp. 31-45, March, 2007.
11. Model Based JPEG Steganography Demo. Online: http:/ /www.philsallee.com/mbsteg/index.html.
12. Sallee, P., "Model Based Steganography", International Workshop on Digital Watermarking, Volume 1, pp. 174-188, Seoul, Korea, October, 2003.
13. Fridrich, J., "Feature-Based Steganalysis for JPEG Images and its Implications for Future Design of Steganographic Schemes", Sixth Information Hiding Workshop, Lecture Notes in Computer Science, Volume 1, pp. 67-81, Springer-Verlag, Berlin Heidelberg, 2004.
14. Kharrazi, M., Sencar, H.T., and Memon, N., "Benchmarking Steganographic and Steganalysis Technique", SPIE Electronic Imaging, Security, Steganography and Watermarking of Multimedia Contents-VII, Volume 1, pp. 152-263, San Jose, USA, 2005
15. Duda, R.O, Hart, P.E., and Stork, D.G., "Pattern Classification", John Wiley & Sons, Chapter-3, pp. 117-120, New York, USA, 2001.