JOURNAL BROWSE
Search
Advanced SearchSearch Tips
Research on Steganography in Emulab Testbed
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
Research on Steganography in Emulab Testbed
Jung, Ki-Hyun; Seok, Woo-Jin;
  PDF(new window)
 Abstract
Steganography is to conceal the existence of secrete data itself. The Emulab is a framework to provide real systems and network topology that can set up at anytime by researchers. In this paper, we show that steganography techniques can be applied in the Emulab environment. Steganography methods are evaluated on a standalone and sharing environments using the color bitmap images. The cover image is divided into RGB channels and then embedded the secret data at each client. The experimental results demonstrate that execution time is better in client/server environment as cover image size is increasing.
 Keywords
Information Hiding;Steganography;Emulab;Data Hiding;Information Security;
 Language
Korean
 Cited by
 References
1.
A. Khan, A. Siddiqa, S. Munib, S.A. Malik, A recent survey of reversible watermarking techniques, Information Sciences 279, pp. 252-272, 2014.

2.
M.S. Subhedar, V.H. Mankar, Current status and key issues in image steganography: a survey, Computer Science Review 13(14), pp. 95-113, 2014.

3.
A. Cheddad, J. Condell, K. Curran, P.M. Kevitt, Digital image steganography: survey and analysis of current methods, Signal Processing 90, pp. 727-752, 2010. crossref(new window)

4.
A. Nissar, A.H. Mir, Classification of steganalysis techniques: a study, Digital Signal Processing 20, pp. 1758-1770, 2010. crossref(new window)

5.
J. Zollner, H. Federrath, H. Klimant, A. Pfitzmann, R. Piotraschke, A. Westfeld, G. Wicke, and G. Wolf, "Modeling the Security of Steganographic Systems," 2nd Workshop on Information Hiding, pp. 345-355, 1998

6.
KISTI Emulab, http://www.emulab.kreonet.net

7.
Emulab, http://www.emulab.net/

8.
M.H. Le, W.J. Seok, "Research on the trend of utilizing Emulab as cyber security research framework", Journal of The Korea Institute of Information Security & Cryptology 23(6), pp. 1169-1180, 2013. crossref(new window)

9.
K.H. Jung, J.H. Lee, K.Y. Yoo, "Steganography on android smart devices", Journal of The Institute of Electronics and Information Engineers 52(4), pp. 99-105, 2015.

10.
W.J. Kim, P.H. Kim, J.H. Lee, K.H. Jung, K.Y. Yoo, "Reversible data hiding method based on min/max in 2x2 sub-blocks", Journal of The Institute of Electronics and Information Engineers 51(4), pp.745-751, 2014.

11.
K.H. Jung, K.Y. Yoo, "High-capacity index based data hiding method", Multimedia Tools and Applications 74(6), pp. 2179-2193, 2015. crossref(new window)

12.
J. Tian, "Reversible data embedding using a difference expansion", IEEE Transactions on Circuits and Systems for Video Technology 13(8), pp. 890-896, 2003. crossref(new window)

13.
K.H. Jung, "Image steganographic method using variable length for data embedding", The Korea Institute of Military Science and Technology 11(32), pp. 115-122, 2008.

14.
K.H. Jung, I.T, Kim, J.C. Kim, "Steganographic method based on three directional embedding", The Korea Institute of Military Science and Technology 13(2), pp. 268-274, 2010.

15.
K.H. Jung, K.Y. Yoo, "Data hiding method in binary images based on block masking for key authentication", Information Sciences 277(1), pp. 188-196, 2014. crossref(new window)

16.
J. Mielikainen, "LSB matching revisited", IEEE Signal Processing Letters 13, pp. 285-287, 2006. crossref(new window)

17.
D.C. Wu, W.H. Tsai, "A steganographic method for images by pixel-value differencing", Pattern Regcognition Letters 24, pp. 1613-1626, 2003. crossref(new window)

18.
H.C. Wu, N.I. Wu, C.S. Tsai, M.S. Hwang, "Image steganographic scheme based on pixel-value differencing and LSB replacement methods", IEE Processing Visualization, Image Signal Process 152, pp. 611-615, 2005. crossref(new window)

19.
X. Li, J. Li, B. Li, B. Yang, "High-fidelity reversible data hiding scheme based on pixel-value-ordering and prediction-error expansion", Signal Processing 93, pp. 198-205, 2013. crossref(new window)