2015 Student Research Conference:
28th Annual Student Research Conference

The Limits of Steganography
Anna E. Goodloe
Dr. Jon Beck, Faculty Mentor

The purpose of this study is to determine the size of message that can be embedded in an ordinary image file before obvious alteration is detected by normal viewers. Participants are shown randomly sets of images that have varying amounts of information hidden juxtaposed to the original, and it is noted for which images they believe to be modified. In a set of images the same cover image and the same set of messages were used to create images using five common steganography programs. There are an assortment of methods used to hide messages into images. Steganography tools implementing these methods are freely available and they vary in ability to avoid detection.

Keywords: steganography, detection of hidden messages, image manipulation

Topic(s):Computer Science

Presentation Type: Oral Paper

Session: 205-3
Location: MG 1096
Time: 11:30

Add to Custom Schedule

Contact SRC Webmaster  |  SRC Privacy Policy