CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Article:A New Steganography Method for Gray Level Images using Parity Checker

by Rajkumar, Rahul Rishi, Sudhir Batra
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 11 - Number 11
Year of Publication: 2010
Authors: Rajkumar, Rahul Rishi, Sudhir Batra
10.5120/1627-2188

Rajkumar, Rahul Rishi, Sudhir Batra . Article:A New Steganography Method for Gray Level Images using Parity Checker. International Journal of Computer Applications. 11, 11 ( December 2010), 18-24. DOI=10.5120/1627-2188

@article{ 10.5120/1627-2188,
author = { Rajkumar, Rahul Rishi, Sudhir Batra },
title = { Article:A New Steganography Method for Gray Level Images using Parity Checker },
journal = { International Journal of Computer Applications },
issue_date = { December 2010 },
volume = { 11 },
number = { 11 },
month = { December },
year = { 2010 },
issn = { 0975-8887 },
pages = { 18-24 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume11/number11/1627-2188/ },
doi = { 10.5120/1627-2188 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:00:17.425332+05:30
%A Rajkumar
%A Rahul Rishi
%A Sudhir Batra
%T Article:A New Steganography Method for Gray Level Images using Parity Checker
%J International Journal of Computer Applications
%@ 0975-8887
%V 11
%N 11
%P 18-24
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In the present study, we present a new steganography technique for hiding data in images using parity checker. This method uses the concept of odd and even parity for insertion and retrieval of message. This method is an improvement over earlier methods like least significant bit method and 6th, 7th bit method [1] for hiding information in images. Our method retains the advantages of above methods but discards the disadvantages of above methods and provides us the optimal results.

References
  1. Parvinder, Sudhir Batra and H R Sharma, “Evaluating the Performance of Message Hidden in First and Second Bit Plane, W SEAS Transaction on Information Science and Technology, Vol. 2, No. 89, PP 1220-1222, Aug. 2005.
  2. A. Gutub, M. Fattani, “A Novel Arabic Text Stegnography Method Using Letter Points and Extension”, WASET International Conference on Computer, Information and System Science and Engineering (ICCISSE), Vienna, Austria, May 25-27, 2007.
  3. RJ Anderson, “Stretching the Limit of Stegnography”, In Information Hiding, Springer Lecture Notes in Computer Science, Vol. 1174, pp 39-48, 1996.
  4. G J Simmons, “The Prisoners Problem and the Subliminal Chaunell”, Proceedings of cypto’ 83, Plenum Press, pp 51-67, 1983.
  5. RJ Anderson, FAP Petitcolas, “On the Limits of Stegnography” IEE Journal on Selected Areas in Communications, Vol. 16 No. 4, PP 474-481, May, 1998.
  6. Neil F Johnson, Sushil Jajodia, “Exploring Stenography: Seeing the Unseen”, IEEE Computer, pp 26-34, Feb 1998.
  7. E Franz, A Jerichow, S Moller, A Pfitznaun, I Stierand, “Computer Based Stegnography”, Information Hiding, Springer Lecture Notes in Computer Science vol. 1174, pp 7-21, 1996.
  8. Yeuan-Kuen Lee, Ling – Hwei chen, “A secure Robust Image Stegnography Model”, 10th National Conference on Information Security, Hualien, Taiwan, pp 275-284, May, 2000.
Index Terms

Computer Science
Information Sciences

Keywords

Parity Checker Even Parity Odd Parity Pseudo Random Number Generator Steganalysis