Development of Requirements Specification for Steganographic Systems

Open access

Abstract

The paper focuses on development of requirements specification for steganographic systems. The main concepts and fields of use of steganography are briefly explained. Criteria that can be used for various non-functional requirements are grouped and their possible metrics are given with examples and sample requirements. The authors provide an original systematic approach to develop requirements for steganographic systems based on the field of use and the importance of each criterion in the selected field. The approach also allows for automated selection of steganographic algorithms based on the requirements and is related to the concept of the Universal Stegoconstructor, which guarantees that clients receive the required steganographic system from the developers.

If the inline PDF is not rendering correctly, you can download the PDF file here.

  • [1] I. J. Cox M. L. Miller J. A. Bloom J. Fridrich and T. Kalker Digital Watermarking and Steganography 2nd ed. Burlington: Morgan Kaufmann 2008 624 p.

  • [2] C. Everett “Should encryption software be banned?” Network Security vol. 2016 iss. 8 pp. 14–17 Aug. 2016. https://doi.org/10.1016/S1353-4858(16)30078-2

  • [3] P. Mozur The New York Times. New Rules in Chine Upset Western Tech Companies. 2015. [Online]. Available: http://www.nytimes.com/2015/01/29/technology/in-china-new-cybersecurity-rules-perturb-western-tech-companies.html [Accessed: Oct. 9 2016].

  • [4] I. Sommerville Software Engineering 10th ed. USA: Pearson 2015 816 p.

  • [5] IEEE Recommended Practice for Software Requirements Specifications IEEE Std 830-1998 1998. https://doi.org/10.1109/IEEESTD.1998.88286

  • [6] MITRE. (2016) Develop System-Level Technical Requirements. [Online]. Available: https://www.mitre.org/publications/systems-engineering-guide/se-lifecycle-building-blocks/system-design-and-development/develop-systemlevel-technical-requirements [Accessed: Oct. 8 2016].

  • [7] G. Konahovich and A. Puzirenko Digital Steganography Theory and Practise - Компьютерная стеганография теория и практика. Kiev: MK-Press 2006 286 p. (in Russian).

  • [8] N. Hamid A. Yahya R. B. Ahmad and O. M. AI-Qershi “Image Steganography Techniques: An Overview” International Journal of Computer Science and Security (IJCSS) vol. 6 no. 3 pp. 168–187 June 2012.

  • [9] A. H. Lashkari A. A. Manaf and M. Masrom Magic Hexagon Image Steganography Evaluator. [Online]. Available: http://www.academia.edu/1014807/Magic_Hexagon_Image_Steganography_Evaluator [Accessed: Oct. 8 2016]

  • [10] V. Gribunin I. Okov and I. Turincev Digital Steganography Aspects of Protection - Цифровая стеганография аспекты защиты. Moscow: Solon-press 2009 265 p. (in Russian).

  • [11] A. Jersovs V. Zabiniako and P. Semencuks “Using Concatenated Steganography for Visual Analysis in GIS SOA” Applied Computer Systems vol. 13 pp. 74–82 Nov. 2012. https://doi.org/10.2478/v10312-012-0010-6

  • [12] T. Morkel J. H. P. Eloff and M. S. Olivier “An Overview of Image Steganography” in Proceedings of the Fifth Annual Information Security South Africa Conference (ISSA2005) Sandton Africa June/July 2005.

  • [13] M. Kharrazi H. T. Sencar and N. Memon “Cover Selection for Steganographic Embedding” in International Conference on Image Processing Atlanta Georgia USA 2006 pp. 317–326. https://doi.org/10.1109/icip.2006.312386

  • [14] Spammimic. (2015). Spam mimic. [Online]. Available: http://www.spammimic.com/ [Accessed: Oct. 9 2016].

  • [15] T. H. Cormen C. E. Leiserson R. L. Rivest and C. Stein Introduction to Algorithms 3rd ed. Massachusetts: The MIT Press 2009 1312 p.

  • [16] M. K. Kundu and S. Das “Lossless ROI Medical Image Watermarking Technique with Enhanced Security and High Payload Embedding” in International Conference on Pattern Recognition Istanbul Turkey Aug. 23–26 2010 pp. 1457–1460. https://doi.org/10.1109/icpr.2010.360

  • [17] International Telecommunication Union. (2012). Methodology for the subjective assessment of the quality of television pictures. Recommendation ITU-R BT.500-13. [Online]. Available: https://www.itu.int/rec/R-REC-BT.500-13-201201-I/en [Accessed: Oct. 8 2016]

  • [18] R. Böhme “Principles of Modern Steganography and Steganalysis” Information Security and Cryptography (Information Security and Cryptography) pp. 11–77 2010. https://doi.org/10.1007/978-3-642-14313-7_2

  • [19] H. Sajedi “Steganalysis based on steganography pattern discovery” Journal of Information Security and Applications vol. 30 pp. 3–14 Oct. 2016. https://doi.org/10.1016/j.jisa.2016.04.001

  • [20] D. Lerch-Hostalot and D. Megias “Unsupervised steganalysis based on artificial training sets” Engineering Applications of Artificial Intelligence vol. 50 pp. 45–59 Apr. 2016. https://doi.org/10.1016/j.engappai.2015.12.013

  • [21] T. Sloan and J. Hernandez-Castro “Steganalysis of OpenPuff through atomic concatenation of MP4 flags” Digital Investigation vol. 13 pp. 15–21 June 2015. https://doi.org/10.1016/j.diin.2015.02.002

  • [22] G. Luo and X. Sun “An Evaluation Scheme for Steganalysis-proof Ability of Steganographic Algorithms” in International Conference on Intelligent Information Hiding and Multimedia Signal Processing Haohsiung Taiwan Nov. 26–28 2007 pp. 126–129. https://doi.org/10.1109/iih-msp.2007.85

  • [23] J. Cummins P. Diskin S. Lau and R. Parlett. (2004). Steganography and Digital Watermarking. [Online]. Available: http://www.cs.bham.ac.uk/~mdr/teaching/modules03/security/students/SS5/Steganography.htm [Accessed: Oct. 8 2016].

  • [24] D. Kahn The Codebreakers. New York: Scribner 1996 1224 p.

  • [25] A. Jersovs and P. Rusakovs “Kutter Steganographical Method’s Improvement and Concept of Universal Stegoconstructor” in Computer Sciences vol. 38 pp. 198–208 Jan. 2009. https://doi.org/10.2478/v10143-009-0018-6

  • [26] M. Kharrazi H. T. Sencar and N. Memon “Benchmarking steganographic and steganalysis techniques” in Proceedings of the SPIE vol. 5681 pp. 252–263 March 2005. https://doi.org/10.1117/12.587375

Search
Journal information
Cited By
Metrics
All Time Past Year Past 30 Days
Abstract Views 0 0 0
Full Text Views 748 449 26
PDF Downloads 268 174 4