Visual honey encryption: Application to steganography

Ji Won Yoon, Hyoungshick Kim, Hyun Ju Jo, Hyelim Lee, Kwangsu Lee

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    13 Citations (Scopus)

    Abstract

    Honey encryption (HE) is a new technique to overcome the weakness of conventional password-based encryption (PBE). However, conventional honey encryption still has the limitation that it works only for binary bit streams or integer sequences because it uses a fixed distribution-transforming encoder (DTE). In this paper, we propose a variant of honey encryption called visual honey encryption which employs an adaptive DTE in a Bayesian framework so that the proposed approach can be applied to more complex domains including images and videos. We applied this method to create a new steganography scheme which significantly improves the security level of traditional steganography.

    Original languageEnglish
    Title of host publicationIH and MMSec 2015 - Proceedings of the 2015 ACM Workshop on Information Hiding and Multimedia Security
    PublisherAssociation for Computing Machinery, Inc
    Pages65-74
    Number of pages10
    ISBN (Electronic)9781450335874
    DOIs
    Publication statusPublished - 2015 Jun 17
    Event3rd ACM Information Hiding and Multimedia Security Workshop, IH and MMSec 2015 - Portland, United States
    Duration: 2015 Jun 172015 Jun 19

    Publication series

    NameIH and MMSec 2015 - Proceedings of the 2015 ACM Workshop on Information Hiding and Multimedia Security

    Other

    Other3rd ACM Information Hiding and Multimedia Security Workshop, IH and MMSec 2015
    Country/TerritoryUnited States
    CityPortland
    Period15/6/1715/6/19

    Bibliographical note

    Publisher Copyright:
    © 2015 ACM.

    Keywords

    • Honey encryption (HE)
    • Password-based encryption (PBE)
    • Steganography

    ASJC Scopus subject areas

    • Computer Graphics and Computer-Aided Design
    • Human-Computer Interaction
    • Software

    Fingerprint

    Dive into the research topics of 'Visual honey encryption: Application to steganography'. Together they form a unique fingerprint.

    Cite this