A resource-efficient approach to steganography in mobile systems

Prabhat Dahal, Dongming Peng, Yaoqing Yang, Hamid Sharif

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

With rapid development in mobile devices with high quality image and video processing capabilities, it is desirable or necessary to implement steganography technology within such devices in some applications such as source authentication. In this paper, we propose a method of implementing information hiding within a video with less processing time and memory requirement. The message to be secretly communicated is hidden in the video by modifying blocks of Discrete Wavelet Transform coefficients of feature regions. We choose corners as specific features. The localizable capability of both corner detection algorithm and the Discrete Wavelet Transform makes it possible for the entire embedding method to be localized. This makes the entire process of steganography computationally faster and memory efficient. Our simulations show that the proposed method has a processing time that is up to 2.6 times more efficient, in average, than other traditional methods without incurring memory overhead.

Original languageEnglish (US)
Title of host publication2016 International Wireless Communications and Mobile Computing Conference, IWCMC 2016
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages150-157
Number of pages8
ISBN (Electronic)9781509003044
DOIs
StatePublished - Sep 26 2016
Event12th IEEE International Wireless Communications and Mobile Computing Conference, IWCMC 2016 - Paphos, Cyprus
Duration: Sep 5 2016Sep 9 2016

Publication series

Name2016 International Wireless Communications and Mobile Computing Conference, IWCMC 2016

Other

Other12th IEEE International Wireless Communications and Mobile Computing Conference, IWCMC 2016
CountryCyprus
CityPaphos
Period9/5/169/9/16

Fingerprint

Steganography
Discrete wavelet transforms
Data storage equipment
Processing
Mobile devices
Authentication
Image quality

Keywords

  • DWT
  • Feature
  • Information hiding
  • Mobile
  • Steganganography

ASJC Scopus subject areas

  • Computer Networks and Communications

Cite this

Dahal, P., Peng, D., Yang, Y., & Sharif, H. (2016). A resource-efficient approach to steganography in mobile systems. In 2016 International Wireless Communications and Mobile Computing Conference, IWCMC 2016 (pp. 150-157). [7577049] (2016 International Wireless Communications and Mobile Computing Conference, IWCMC 2016). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/IWCMC.2016.7577049

A resource-efficient approach to steganography in mobile systems. / Dahal, Prabhat; Peng, Dongming; Yang, Yaoqing; Sharif, Hamid.

2016 International Wireless Communications and Mobile Computing Conference, IWCMC 2016. Institute of Electrical and Electronics Engineers Inc., 2016. p. 150-157 7577049 (2016 International Wireless Communications and Mobile Computing Conference, IWCMC 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Dahal, P, Peng, D, Yang, Y & Sharif, H 2016, A resource-efficient approach to steganography in mobile systems. in 2016 International Wireless Communications and Mobile Computing Conference, IWCMC 2016., 7577049, 2016 International Wireless Communications and Mobile Computing Conference, IWCMC 2016, Institute of Electrical and Electronics Engineers Inc., pp. 150-157, 12th IEEE International Wireless Communications and Mobile Computing Conference, IWCMC 2016, Paphos, Cyprus, 9/5/16. https://doi.org/10.1109/IWCMC.2016.7577049
Dahal P, Peng D, Yang Y, Sharif H. A resource-efficient approach to steganography in mobile systems. In 2016 International Wireless Communications and Mobile Computing Conference, IWCMC 2016. Institute of Electrical and Electronics Engineers Inc. 2016. p. 150-157. 7577049. (2016 International Wireless Communications and Mobile Computing Conference, IWCMC 2016). https://doi.org/10.1109/IWCMC.2016.7577049
Dahal, Prabhat ; Peng, Dongming ; Yang, Yaoqing ; Sharif, Hamid. / A resource-efficient approach to steganography in mobile systems. 2016 International Wireless Communications and Mobile Computing Conference, IWCMC 2016. Institute of Electrical and Electronics Engineers Inc., 2016. pp. 150-157 (2016 International Wireless Communications and Mobile Computing Conference, IWCMC 2016).
@inproceedings{db800d27256d4b42bd0aabbedea935ca,
title = "A resource-efficient approach to steganography in mobile systems",
abstract = "With rapid development in mobile devices with high quality image and video processing capabilities, it is desirable or necessary to implement steganography technology within such devices in some applications such as source authentication. In this paper, we propose a method of implementing information hiding within a video with less processing time and memory requirement. The message to be secretly communicated is hidden in the video by modifying blocks of Discrete Wavelet Transform coefficients of feature regions. We choose corners as specific features. The localizable capability of both corner detection algorithm and the Discrete Wavelet Transform makes it possible for the entire embedding method to be localized. This makes the entire process of steganography computationally faster and memory efficient. Our simulations show that the proposed method has a processing time that is up to 2.6 times more efficient, in average, than other traditional methods without incurring memory overhead.",
keywords = "DWT, Feature, Information hiding, Mobile, Steganganography",
author = "Prabhat Dahal and Dongming Peng and Yaoqing Yang and Hamid Sharif",
year = "2016",
month = "9",
day = "26",
doi = "10.1109/IWCMC.2016.7577049",
language = "English (US)",
series = "2016 International Wireless Communications and Mobile Computing Conference, IWCMC 2016",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
pages = "150--157",
booktitle = "2016 International Wireless Communications and Mobile Computing Conference, IWCMC 2016",

}

TY - GEN

T1 - A resource-efficient approach to steganography in mobile systems

AU - Dahal, Prabhat

AU - Peng, Dongming

AU - Yang, Yaoqing

AU - Sharif, Hamid

PY - 2016/9/26

Y1 - 2016/9/26

N2 - With rapid development in mobile devices with high quality image and video processing capabilities, it is desirable or necessary to implement steganography technology within such devices in some applications such as source authentication. In this paper, we propose a method of implementing information hiding within a video with less processing time and memory requirement. The message to be secretly communicated is hidden in the video by modifying blocks of Discrete Wavelet Transform coefficients of feature regions. We choose corners as specific features. The localizable capability of both corner detection algorithm and the Discrete Wavelet Transform makes it possible for the entire embedding method to be localized. This makes the entire process of steganography computationally faster and memory efficient. Our simulations show that the proposed method has a processing time that is up to 2.6 times more efficient, in average, than other traditional methods without incurring memory overhead.

AB - With rapid development in mobile devices with high quality image and video processing capabilities, it is desirable or necessary to implement steganography technology within such devices in some applications such as source authentication. In this paper, we propose a method of implementing information hiding within a video with less processing time and memory requirement. The message to be secretly communicated is hidden in the video by modifying blocks of Discrete Wavelet Transform coefficients of feature regions. We choose corners as specific features. The localizable capability of both corner detection algorithm and the Discrete Wavelet Transform makes it possible for the entire embedding method to be localized. This makes the entire process of steganography computationally faster and memory efficient. Our simulations show that the proposed method has a processing time that is up to 2.6 times more efficient, in average, than other traditional methods without incurring memory overhead.

KW - DWT

KW - Feature

KW - Information hiding

KW - Mobile

KW - Steganganography

UR - http://www.scopus.com/inward/record.url?scp=84994092869&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84994092869&partnerID=8YFLogxK

U2 - 10.1109/IWCMC.2016.7577049

DO - 10.1109/IWCMC.2016.7577049

M3 - Conference contribution

AN - SCOPUS:84994092869

T3 - 2016 International Wireless Communications and Mobile Computing Conference, IWCMC 2016

SP - 150

EP - 157

BT - 2016 International Wireless Communications and Mobile Computing Conference, IWCMC 2016

PB - Institute of Electrical and Electronics Engineers Inc.

ER -