Message Hiding with Pseudo-Random Binary Sequence Utilization
Proceeding: The Third International Conference on Computing Technology and Information Management (ICCTIM)Publication Date: 2017-12-08
Authors : Gabriel Bugár; Juraj Gazda; Dušan Levický;
Page : 25-31
Keywords : Steganography; SSIM; DCT; DWT; Social Network.;
Abstract
This paper presents a novel computational secret message hiding technique, also called Code-booked steganography technique based on Code Division Multiple Access (CDMA) technology with having regard to security and perceptibility of hidden message. This CDMA technique and their variations have mainly exploitation in mobile phone communication standards, the world's most widely used cell phone standard. We model the cover object transmission over two interacting social networks using a user based model in which we apply the fundamental principles of the steganography. We show that the imposed features of CDMA techniques agree with imperatives claimed upon steganography systems and it facilitates the creation of an unsuspicious communication channel.
Other Latest Articles
Last modified: 2018-03-18 16:39:32