An Application Based on Steganography


Karaman H. B. , Sagiroglu Ş.

IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, İstanbul, Turkey, 26 - 29 August 2012, pp.839-843 identifier identifier

  • Publication Type: Conference Paper / Full Text
  • Volume:
  • Doi Number: 10.1109/asonam.2012.152
  • City: İstanbul
  • Country: Turkey
  • Page Numbers: pp.839-843

Abstract

In this study, the aim and application areas of steganography and steganalysis are briefly described. Kinds of techniques used in steganography are analyzed and compared to each other according to their simplicity and robustness. Then, methods used in steganalysis in order to detect various kinds of steganography such as text, image, audio, video and file system steganography are examined. Finally, a steganography application for the receptions of the Presidency of the Republic of Turkey is developed. The identity information of the guests are first encrypted, and then embedded in their photos using the LSB technique on BMP images. Original and stego images after the embedding process are compared to each other and the robustness of the application against steganalysis attacks is measured using VSL tool.