Details



AN EFFECTIVE LB TECHNIQUE OF COLORED IMAGE STEGANOGRAPHY

Dr Rajesh Kumar Pathak, Neha Jain

1-7

Vol. 5, Jan-Jun, 2017

Date of Submission: 2016-12-05 Date of Acceptance: 2017-01-02 Date of Publication: 2017-01-05

Abstract

In this paper we uses three layered approach which is helpful to hide large amount of message. Our approach provides a better way for embedding more secret data into cover image. This method makes the data embedding process to alter more LSBs of a pixel of RGB planes to increase the capacity of the steganography. It efficiently and effectively hides data with the help of a key in JPEG colored digital image. The proposed method makes the steganalysis harder by providing improved security and capacity to hide data. The security must be high so that any kind of attacks should not reveal secret information.

References

  1. Stuti Goel, Arun Rana, Manpreet Kaur “ADCT-based Robust Methodology for Image Steganography” I.J. Image, Graphics and Signal Processing, pp. 23-34, 2013
  2. Se-Min Kim; Ziqiang Cheng; Kee-Young Yoo “A New Steganography Scheme Based on an Index-Color Image” Information Technology: New Generations, ITNG pp. 376 – 381, 2009.
  3. Rui Miao; Yongfeng Huang “An Approach of Covert Communication Based on the Adaptive Steganography Scheme on Voice over IP” Communications (ICC) pp. 1-5, 2011.
  4. Premkumar, S.; Narayanan, A.E. “New visual Steganography scheme for secure banking application” Computing, Electronics and Electrical Technologies (ICCEET) pp. 1013 – 1016, 2012.
  5. Hongmei Tang, Gaochan Jin, Cuixia Wu; Peijiao Song “A New Image Encryption and Steganography Scheme” Computer and Communications Security, ICCCS pp. 60-63, 2009.
  6. Yongzhen Zheng, Fenlin Liu, Xiangyang Luo, Chunfang Yang “A Method Based on Feature Matching to Identify Steganography Software” Multimedia Information Networking and Security (MINES), pp. 989-994, 2012.
  7. 7. A.Gupta, S.Mahapatra and K.Singh “Data hiding in color image using cryptography with help of ASK algorithm” Emerging Trends in Networks and Computer Communications (ETNCC), pp. 15-17, 2011.
  8. Akhtar, N.,Johri, P.,Khan, S. “Enhancing the Security and Quality of LSB Based Image Steganography” Computational Intelligence and Communication Networks (CICN), pp. 385 – 390, 2013.
  9. Rai, S., Dubey, R. “A novel keyless algorithm for steganography” Engineering and Systems (SCES),pp. 1-4, 2012
  10. Neha Jain; Sudhir Goswami “An Improved Steganography Technique of LSB Substitution Method” International Journal Of Engineering And Computer Science ISSN:2319-7242, pp. 9912-9915, January 2015
  11. Deshpande Neeta, Kamalapur Snehal, Daisy Jacobs, “Implementation of LSB Steganography and Its Evaluation for Various Bits”, 2004
  12. Po-Yueh Chen and Hung-Ju Lin, “A DWT Based Approach for Image Steganography”, International Journal of Applied Science and Engineering 4, 3: 275-290, 2006.
  13. K.B.Shiva Kumar, K.B.Raja, R.K.Chhotaray, Sabyasachi Pattnaik, “Coherent Steganography using Segmentation and DCT”, IEEE-978-1-4244-5967-4/10,2010.
Download PDF
Back