Call for Paper - August 2020 Edition
IJCA solicits original research papers for the August 2020 Edition. Last date of manuscript submission is July 20, 2020. Read More

A New Steganography Method for Gray Level Images using Parity Checker

Print
PDF
International Journal of Computer Applications
© 2010 by IJCA Journal
Number 11 - Article 4
Year of Publication: 2010
Authors:
Rajkumar
Rahul Rishi
Sudhir Batra
10.5120/1627-2188

Rajkumar, Rahul Rishi and Sudhir Batra. Article:A New Steganography Method for Gray Level Images using Parity Checker. International Journal of Computer Applications 11(11):18–24, December 2010. Published By Foundation of Computer Science. BibTeX

@article{key:article,
	author = {Rajkumar and Rahul Rishi and Sudhir Batra},
	title = {Article:A New Steganography Method for Gray Level Images using Parity Checker},
	journal = {International Journal of Computer Applications},
	year = {2010},
	volume = {11},
	number = {11},
	pages = {18--24},
	month = {December},
	note = {Published By Foundation of Computer Science}
}

Abstract

In the present study, we present a new steganography technique for hiding data in images using parity checker. This method uses the concept of odd and even parity for insertion and retrieval of message. This method is an improvement over earlier methods like least significant bit method and 6th, 7th bit method [1] for hiding information in images. Our method retains the advantages of above methods but discards the disadvantages of above methods and provides us the optimal results.

Reference

  • Parvinder, Sudhir Batra and H R Sharma, “Evaluating the Performance of Message Hidden in First and Second Bit Plane, W SEAS Transaction on Information Science and Technology, Vol. 2, No. 89, PP 1220-1222, Aug. 2005.
  • A. Gutub, M. Fattani, “A Novel Arabic Text Stegnography Method Using Letter Points and Extension”, WASET International Conference on Computer, Information and System Science and Engineering (ICCISSE), Vienna, Austria, May 25-27, 2007.
  • RJ Anderson, “Stretching the Limit of Stegnography”, In Information Hiding, Springer Lecture Notes in Computer Science, Vol. 1174, pp 39-48, 1996.
  • G J Simmons, “The Prisoners Problem and the Subliminal Chaunell”, Proceedings of cypto’ 83, Plenum Press, pp 51-67, 1983.
  • RJ Anderson, FAP Petitcolas, “On the Limits of Stegnography” IEE Journal on Selected Areas in Communications, Vol. 16 No. 4, PP 474-481, May, 1998.
  • Neil F Johnson, Sushil Jajodia, “Exploring Stenography: Seeing the Unseen”, IEEE Computer, pp 26-34, Feb 1998.
  • E Franz, A Jerichow, S Moller, A Pfitznaun, I Stierand, “Computer Based Stegnography”, Information Hiding, Springer Lecture Notes in Computer Science vol. 1174, pp 7-21, 1996.
  • Yeuan-Kuen Lee, Ling – Hwei chen, “A secure Robust Image Stegnography Model”, 10th National Conference on Information Security, Hualien, Taiwan, pp 275-284, May, 2000.