Fuzzy Logic on a Polygenic Multi-Agent System for Steganalysis of Digital Images

2012 
Digital cryptography has being a solution for protecting transmission of data in applications such as electronic commerce (Luciano 2003), electronic vote (Kofler 2003), and digital Television (Macq 1995). However, an interceptor monitoring network flow could easily break purely encoded data and clear the contents of cryptographed messages. Steganography techniques came up in order to help improving this protection. The goal of steganography is to hide data into a covering message (envelop) in such a way that an interceptor has no way to notice the presence of a hidden message in its covering envelop. Note that one can combine both cryptography and steganography in order to achieve better security. For example an image can be enriched with visually imperceptible extra information that, when eventually noticed, could be understood as an eventual noise. This damaged image could serve thus as a camouflaging body that brings protected data to the other side of the communication process. Any media object can be used as the covering message, such as text, audio, video, network packages, and file systems. Digital images are known to be the most used media objects for this purpose due to its inherent artistic appeal.
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    23
    References
    2
    Citations
    NaN
    KQI
    []