Abstract
In this paper we’ll define new steganographic techniques for information hiding, which depend on the carrier. In traditional steganographic solutions the way of secret hiding is usually not dependent on the content or features of container, in which new information is placed. Most approaches modify parameters in spatial or frequency domains, and not consider local carrier parameters. Such parameters can also determine the way of secret hiding. Such techniques allow to hide particular information in different manner, especially when we consider containers with different graphical features.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Pizzolante, R., Carpentieri, B., Castiglione, A., Castiglione, A., Palmieri, F.: Text compression and encryption through smart devices for mobile communication. In: Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, pp. 672–677 (2013) https://doi.org/10.1109/IMIS.2013.121
Koptyra, K., Ogiela, M.R.: Steganography in IoT: information hiding with APDS-9960 proximity and gestures sensor. Sensors 22(7), 2612 (2022). 1–11 https://doi.org/10.3390/s22072612
Ogiela, M.R., Koptyra, K.: Visual pattern embedding in multi-secret image steganography. In: ICIIBMS 2015 - International Conference on Intelligent Informatics and BioMedical Sciences, November 28–30, 2015, Okinawa, Japan, pp. 434–437. IEEE (2015). ISBN 978-1-4799-8562-3/15
Ogiela, L., Ogiela, M.R.: Cognitive security paradigm for cloud computing applications. Concurr. Comput.: Pract. Exp. 32(8), e5316 (2020). https://doi.org/10.1002/cpe.5316
Ogiela, L.: Transformative computing in advanced data analysis processes in the cloud. Inf. Process. Manag. 57(5), 102260 (2020)
Ogiela, M.R., Ogiela, L., Ogiela, U.: Biometric methods for advanced strategic data sharing protocols. In: 2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing IMIS 2015, pp. 179–183 (2015). https://doi.org/10.1109/IMIS.2015.29
Ogiela, U., Ogiela, L.: Linguistic techniques for cryptographic data sharing algorithms. Concurr. Comput. Pract. Exp. 30(3), e4275 (2018). https://doi.org/10.1002/cpe.4275
Ogiela, M.R., Ogiela, U.: Secure information splitting using grammar schemes. New Challenges in Computational Collective Intelligence. SCI, vol. 244, pp. 327–336. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-03958-4_28
Ogiela, M.R., Ogiela, U., Ogiela, L.: Secure information sharing using personal biometric characteristics. In: Kim, T.-H., Kang, J.-J., Grosky, W.I., Arslan, T., Pissinou, N. (eds.) FGIT 2012. CCIS, vol. 353, pp. 369–373. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-35521-9_54
Acknowledgments
This work has been supported by the AGH University of Science and Technology research Grant No 16.16.120.773. This work has been supported by the National Science Centre, Poland, under project number DEC-2016/23/B/HS4/00616.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Ogiela, M.R., Ogiela, U. (2022). Steganographic Approaches for Carrier Related Information Hiding. In: Barolli, L. (eds) Complex, Intelligent and Software Intensive Systems. CISIS 2022. Lecture Notes in Networks and Systems, vol 497. Springer, Cham. https://doi.org/10.1007/978-3-031-08812-4_14
Download citation
DOI: https://doi.org/10.1007/978-3-031-08812-4_14
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-08811-7
Online ISBN: 978-3-031-08812-4
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)