CFP last date
20 May 2024
Reseach Article

Steganography in Colored Images Using Information Reflector with 2k Correction

by Manish Mahajan, Akashdeep Sharma
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 1 - Number 1
Year of Publication: 2010
Authors: Manish Mahajan, Akashdeep Sharma
10.5120/22-130

Manish Mahajan, Akashdeep Sharma . Steganography in Colored Images Using Information Reflector with 2k Correction. International Journal of Computer Applications. 1, 1 ( February 2010), 48-53. DOI=10.5120/22-130

@article{ 10.5120/22-130,
author = { Manish Mahajan, Akashdeep Sharma },
title = { Steganography in Colored Images Using Information Reflector with 2k Correction },
journal = { International Journal of Computer Applications },
issue_date = { February 2010 },
volume = { 1 },
number = { 1 },
month = { February },
year = { 2010 },
issn = { 0975-8887 },
pages = { 48-53 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume1/number1/22-130/ },
doi = { 10.5120/22-130 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:43:38.212490+05:30
%A Manish Mahajan
%A Akashdeep Sharma
%T Steganography in Colored Images Using Information Reflector with 2k Correction
%J International Journal of Computer Applications
%@ 0975-8887
%V 1
%N 1
%P 48-53
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Steganography is a process that involves hiding a message in an appropriate carrier for example an image or an audio file. The carrier can then be sent to a receiver without anyone else knowing that it contains a hidden message. The aim of this study was to investigate the various steganograhy methods & how they are implemented .LSB is a very well known method in this field. In binary images we are very much restricted in the scope as there are only 4 bits or 8 bits to represent a pixel so we are very much restricted to most popular LSB methods .But in colored images there are generally up to 24 bits images with three different RGB channels, if using RGB color space .So, we can explore a lot many new methods which can manipulate or use various channels of colored images in regular or arbitrary pattern to hide the information. Using this concept we have explored the various existing methods of data hiding in colored images & taken an intersection between the arbitrary pixel manipulation & LSB method to propose our work which uses arbitrary channel of a pixel to reflect the presence of data in one or two other channels. Finally we have used the 2k correction method to improve the stego image so as to assure the maximum security against the visual attacks. We have proved that this work shows an attractive result as compared to the other present algorithms on the various parameters like security, imperceptibility capacity & robustness.At the end the new steganography technique is also compared with the available techniques.et has become a vital resource for everyone.

References
  1. S. Venkatraman, A. Abraham, M. Paprzycki, "Significance of Steganography on Data Security", International Conference on Information Technology: Coding and Computing (ITCC'04), Las Vegas, 5-7 April 2004.
  2. Kathryn Hempstalk, "Hiding Behind Corners: Using Edges in Images for Better Steganography", Proceedings of the Computing Women's Congress, Hamilton, New Zealand, 11- 19 February 2006.
  3. N.F. Johnson, S. Jajodia, "Exploring Steganography: Seeing the Unseen", IEEE computer, Vol. 31, No. 2, pages 26-34, February 1998.
  4. G.C. Kessler, "An Overview of Steganography for the Computer Forensics Examiner", Forensic Science Communications, Vol. 6, July 2004.
  5. D. Artz, "Digital Steganography: Hiding Data within Data", IEEE Internet Computing: Spotlight, pages 75-80, May-June 2001.
  6. K. Bailey, K. Curran, "An Evaluation of Image Based Steganography Methods", Multimedia Tools & Applications, Vol. 30, No. 1, pages 55-88, July 2006.
  7. A. Gutub, L. Ghouti , A. Amin, T. Alkharobi, M.K. Ibrahim, "Utilizing Extension Character ‘Kashida’ With Pointed Letters For Arabic Text Digital Watermarking", Inter. Conf. on Security and Cryptography - SECRYPT, Barcelona, Spain, July 28 - 31, 2007.
  8. A. Gutub, M. Fattani, "A Novel Arabic Text Steganography Method Using Letter Points and Extensions", WASET International Conference on Computer, Information and Systems Science and Engineering (ICCISSE), Vienna, Austria, May 25-27, 2007.
  9. Johnson Neil F., Zoran Duric, Sushil Jajodia, Information Hiding, and Watermarking - Attacks & Countermeasures, Kluwer 2001.
  10. Westfield Andreas and Andreas Pfitzmann, Attacks on Steganographic Systems. Third International Workshop, IH'99 Dresden Germany, October Proceedings, Computer Science 1768. pp. 61- 76, 1999.
  11. Zollner J., H. Federrath, H. Klimant, A. Pfitzmann, R. Piotraschke, A. Westfeld, G. Wicke, G. Wolf, Modelling the Security of Steganographic Systems, Information Hiding, 2nd International Workshop, IH'98 Portland, Oregon, USA, Computer Science 1525. pp. 344-354, April 1998.
  12. Pfitzmann Birgit. Information Hiding Terminology. First International Workshop, Cambridge, UK, Proceedings, Computer Science 1174. pp. 347-350, May -June
  13. Jae-Gil Yu1, Eun-Joon Yoon2, Sang-Ho Shin1 andKee-Young Yoo, Dept. of Computer Engineering, Kyungpook National University Daegu, Korea,” A New Image Steganography Based on 2k Correction and Edge-Detection”, Fifth International Conference on Information Technology: New Generations 978-0-7695-3099-4/08 © April 2008 IEEE
  14. Ali Shariq Imran, M. Younus Javed, and Naveed Sarfraz Khattak “A Robust Method for Encrypted Data Hiding Technique Based on Neighborhood Pixels” Information International Journal of Computer Science and Engineering 1;3 © www.waset.org Summer 2007
Index Terms

Computer Science
Information Sciences

Keywords

Steganography Information reflector