One-Time Pad Encryption Steganography System

Michael J. Pelosi, Gary Kessler, Michael Scott S. Brown

Research output: Contribution to conferencePresentation

Abstract

In this paper we introduce and describe a novel approach to adaptive image steganography which is combined with One-Time Pad encryption, and demonstrate the software which implements this methodology. Testing using the state-of-the-art steganalysis software tool StegExpose concludes the image hiding is reliably secure and undetectable using reasonably-sized message payloads (≤25% message bits per image pixel; bpp). Payload image file format outputs from the software include PNG, BMP, JP2, JXR, J2K, TIFF, and WEBP. A variety of file output formats is empirically important as most steganalysis programs will only accept PNG, BMP, and possibly JPG, as the file inputs.

Keywords: steganography, one-time pad, steganalysis, information hiding, digital forensics

Original languageAmerican English
StatePublished - May 25 2016
Externally publishedYes

Disciplines

  • Aviation Safety and Security
  • Computer Law
  • Computer Sciences
  • Defense and Security Studies
  • Forensic Science and Technology
  • Information Security
  • National Security Law
  • OS and Networks
  • Other Computer Sciences
  • Social Control, Law, Crime, and Deviance

Cite this