Visual honey encryption: Application to steganography

Ji Won Yoon, Hyoungshick Kim, Hyun Ju Jo, Hyelim Lee, Kwangsu Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Citations (Scopus)

Abstract

Honey encryption (HE) is a new technique to overcome the weakness of conventional password-based encryption (PBE). However, conventional honey encryption still has the limitation that it works only for binary bit streams or integer sequences because it uses a fixed distribution-transforming encoder (DTE). In this paper, we propose a variant of honey encryption called visual honey encryption which employs an adaptive DTE in a Bayesian framework so that the proposed approach can be applied to more complex domains including images and videos. We applied this method to create a new steganography scheme which significantly improves the security level of traditional steganography.

Original languageEnglish
Title of host publicationIH and MMSec 2015 - Proceedings of the 2015 ACM Workshop on Information Hiding and Multimedia Security
PublisherAssociation for Computing Machinery, Inc
Pages65-74
Number of pages10
ISBN (Print)9781450335874
DOIs
Publication statusPublished - 2015 Jun 17
Event3rd ACM Information Hiding and Multimedia Security Workshop, IH and MMSec 2015 - Portland, United States
Duration: 2015 Jun 172015 Jun 19

Other

Other3rd ACM Information Hiding and Multimedia Security Workshop, IH and MMSec 2015
CountryUnited States
CityPortland
Period15/6/1715/6/19

Keywords

  • Honey encryption (HE)
  • Password-based encryption (PBE)
  • Steganography

ASJC Scopus subject areas

  • Computer Graphics and Computer-Aided Design
  • Human-Computer Interaction
  • Software

Fingerprint Dive into the research topics of 'Visual honey encryption: Application to steganography'. Together they form a unique fingerprint.

  • Cite this

    Yoon, J. W., Kim, H., Jo, H. J., Lee, H., & Lee, K. (2015). Visual honey encryption: Application to steganography. In IH and MMSec 2015 - Proceedings of the 2015 ACM Workshop on Information Hiding and Multimedia Security (pp. 65-74). Association for Computing Machinery, Inc. https://doi.org/10.1145/2756601.2756606