Research Article Open Access

Efficient Multi-Secret Digital Images Steganography

Haval Muhammed Sidqi1
  • 1 University of Sulaimani Polytechnic, Iraq

Abstract

The new conceptions of more than one secret message and false digital image steganography are presented in the current paper. One of the major ideas in these approaches is embodiment of more than one message in one container (digital image). The secrets that are hidden are known as real and false messages. The former one includes basic data that should be transferred between various parties in a secure manner. The second one is a bait for in order to focus attention on a non-important message. When it is discovered that there exists the actual information, this false and multiple data hidden steganography is cracked, regardless of detection of false message. Many various applications can be found for these concepts, particularly in situations that there is close monitoring over the communication channel between a receiver and a sender and there is suspicion of using steganography. In this case, probably the transferred data would be examined in detailed. The concepts that are defined in the current paper would be helpful for overcoming this problem through ignoring an invented message and thus, deception of the warden. It can be perceived as an additional benefit that it is possible to send both false and real data at the same time. The presented idea actually gives the opportunity of the establishment of a subliminal channel during the transfer of hidden information by the use of digital images.

Journal of Computer Science
Volume 16 No. 2, 2020, 249-256

DOI: https://doi.org/10.3844/jcssp.2020.249.256

Submitted On: 16 October 2019 Published On: 22 February 2020

How to Cite: Sidqi, H. M. (2020). Efficient Multi-Secret Digital Images Steganography. Journal of Computer Science, 16(2), 249-256. https://doi.org/10.3844/jcssp.2020.249.256

  • 3,785 Views
  • 1,775 Downloads
  • 0 Citations

Download

Keywords

  • Cryptographic Protocols
  • Information Splitting
  • Information Hiding
  • Steganography