skip to main content
article

A Java framework for experimentation with steganography

Published: 23 February 2005 Publication History

Abstract

This article describes a Java framework for experimentation with fundamental steganographic techniques. The framework is built on top of Java's image processing libraries and provides extensible handles for customization and experimentation. The framework is designed and presented with a view towards incorporation into an undergraduate computer science curriculum.

References

[1]
Gonzalez, R., and Woods, R. Digital Image Processing, Addison-Wesley Longman Publishing Co., Inc, Boston, Ma, 1992.
[2]
Hunt, K., Using Image Processing to Teach CS1 and CS2, ACM SIGCSE Bulletin, Volume 35, Issue 4:86--89.
[3]
Java2 Platform Standard Edition 1.4 Release 2002. Sun Microsystems. http://java.sun.com/j2se
[4]
Johnson, N. F., Steganography, web article found at http://www.jjtc.com/stegdoc/steg1995.html
[5]
Johnson, N., and Sushil, J., Steganography: Seeing the Unseen, IEEE Computer, February 1998: 26--34.
[6]
Kelley, J., Terror groups hid behind Web encryption, USA Today, February 5, 2001; available from http://www.usatoday.com/tech/news/2001-02-05-binladen.htm
[7]
Steinebach, Martin, Zmudzinski, S., and Chen, F., The Digital Watermarking Container: Secure and Efficient Embedding, Proceedings of the 2004 Multimedia and Security Workshop on Multimedia and Security, 2004:199--205.
[8]
Sutherland, K., Image Processing Programming Projects in an Upper Division Algorithms Course, Proceedings of the Midwest Instructional Computing Symposium, 2004.

Cited By

View all
  • (2011)A novel steganographic method for gray-level images with four-pixel differencing and LSB substitution2011 International Conference on Multimedia Computing and Systems10.1109/ICMCS.2011.5945688(1-4)Online publication date: Apr-2011
  • (2008)Digital data security and hiding on virtual reality VDO 3DGIS-mapProceedings of the 2nd International Convention on Rehabilitation Engineering & Assistive Technology10.5555/1983222.1983251(108-113)Online publication date: 13-May-2008
  • (2013)Digital data security and hiding on virtual reality video 3D GISInternational Journal of Management Science and Engineering Management10.1080/17509653.2009.106845754:3(163-176)Online publication date: 16-May-2013
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM SIGCSE Bulletin
ACM SIGCSE Bulletin  Volume 37, Issue 1
2005
562 pages
ISSN:0097-8418
DOI:10.1145/1047124
Issue’s Table of Contents
  • cover image ACM Conferences
    SIGCSE '05: Proceedings of the 36th SIGCSE technical symposium on Computer science education
    February 2005
    610 pages
    ISBN:1581139977
    DOI:10.1145/1047344
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 23 February 2005
Published in SIGCSE Volume 37, Issue 1

Check for updates

Author Tags

  1. computer security
  2. image processing
  3. information hiding
  4. steganography

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 07 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2011)A novel steganographic method for gray-level images with four-pixel differencing and LSB substitution2011 International Conference on Multimedia Computing and Systems10.1109/ICMCS.2011.5945688(1-4)Online publication date: Apr-2011
  • (2008)Digital data security and hiding on virtual reality VDO 3DGIS-mapProceedings of the 2nd International Convention on Rehabilitation Engineering & Assistive Technology10.5555/1983222.1983251(108-113)Online publication date: 13-May-2008
  • (2013)Digital data security and hiding on virtual reality video 3D GISInternational Journal of Management Science and Engineering Management10.1080/17509653.2009.106845754:3(163-176)Online publication date: 16-May-2013
  • (2010)Software architecture for real-time steganography in auditive media2010 IEEE Region 8 International Conference on Computational Technologies in Electrical and Electronics Engineering (SIBIRCON)10.1109/SIBIRCON.2010.5555319(100-105)Online publication date: Jul-2010
  • (2010)An Approach to Textual SteganographyGlobal Security, Safety, and Sustainability10.1007/978-3-642-15717-2_6(48-54)Online publication date: 2010
  • (2009)Analyzing programming projectsACM SIGCSE Bulletin10.1145/1539024.150899941:1(377-381)Online publication date: 4-Mar-2009
  • (2009)Analyzing programming projectsProceedings of the 40th ACM technical symposium on Computer science education10.1145/1508865.1508999(377-381)Online publication date: 4-Mar-2009
  • (2006)PNG palette permuterProceedings of the 11th annual SIGCSE conference on Innovation and technology in computer science education10.1145/1140124.1140164(143-147)Online publication date: 26-Jun-2006
  • (2006)PNG palette permuterACM SIGCSE Bulletin10.1145/1140123.114016438:3(143-147)Online publication date: 26-Jun-2006

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media