CFP last date
20 May 2024
Reseach Article

Introducing Image Steganography in Bangla Language Communication

by Sams Jarin, Shah Mohazzem Hossain, Md. Rabiul Islam
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 110 - Number 8
Year of Publication: 2015
Authors: Sams Jarin, Shah Mohazzem Hossain, Md. Rabiul Islam
10.5120/19333-0660

Sams Jarin, Shah Mohazzem Hossain, Md. Rabiul Islam . Introducing Image Steganography in Bangla Language Communication. International Journal of Computer Applications. 110, 8 ( January 2015), 1-5. DOI=10.5120/19333-0660

@article{ 10.5120/19333-0660,
author = { Sams Jarin, Shah Mohazzem Hossain, Md. Rabiul Islam },
title = { Introducing Image Steganography in Bangla Language Communication },
journal = { International Journal of Computer Applications },
issue_date = { January 2015 },
volume = { 110 },
number = { 8 },
month = { January },
year = { 2015 },
issn = { 0975-8887 },
pages = { 1-5 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume110/number8/19333-0660/ },
doi = { 10.5120/19333-0660 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:45:47.405253+05:30
%A Sams Jarin
%A Shah Mohazzem Hossain
%A Md. Rabiul Islam
%T Introducing Image Steganography in Bangla Language Communication
%J International Journal of Computer Applications
%@ 0975-8887
%V 110
%N 8
%P 1-5
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Steganography is a modern technique of science by which any message can be hidden in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message like a form of security through obscurity. This technique has advantage over cryptography alone, is that messages do not attract attention to themselves where cryptography protects the contents of a message, steganography can be said to protect both messages and communicating parties. Now-a-days wide ranges of algorithms have been used using text, audio, video and images files as covering media. This paper represents a new approach for steganography in bangla texts considering the typical structure of bangla alphabets and also introduces a much easier process by which secret message is embedded in a 24 bit color image by using widely used 4LSB method. This paper shows a new path to provide an imperceptible stego-image for human natural vision by enhancing the embedding capacity of image steganography.

References
  1. Sara Khosravi, Mashallah Abbasi Dezfoli Mohammad Hossein Yektaie, "A new steganography method based HIOP (Higher Intensity of Pixel) algorithm and Strassen's matrix multiplication", Journal of Global Research in Computer Science, Vol. 2, No. 1, 2011.
  2. S. Katzenbeisser, and F. Peticolas, "Information Hiding Techniques for Steganography and Digital Watermarking", Artech House Inc, USA, 2000.
  3. Petitcolas, FAP; Anderson RJ; Kuhn MG (1999). "Information Hiding: A survey". Proceedings of the IEEE (special issue) 87 (7): 1062–78. doi:10. 1109/5. 771065. Retrieved 2008-09-02.
  4. Bret Dunbar, "A detailed look at Steganographic Techniques and their use in an Open-Systems Environment", SANS Institute, 2002.
  5. Jiri Fridrich and Du Rui. "Secure steganographic methods for palette images. ", In Inter'l Workshop on Information Hiding, pages 47–60, 1999.
  6. N. F. Johnson and S. Jajodia. "Exploring steganography: seeing the unseen. " In IEEE Comput. , pages 26–34, February 1998.
  7. X. -G. Xia, C. G. Boncelet, and G. R. Arce, "A muldresoludon watermark for digital images," Proeedings of the IEEE International Conference on image Processing, Santa Barbara, CA, October 1997, pp. 548-551.
  8. Ki-Hyeok Bae, Sung-Hwan Jung, "A New Information Hiding Using Wavelet Coefficient Relation in JPEG 2000", Dept. of Computer Engineering, Changwon National University, Korea,pp. 224-228
  9. Sravani Alameti, Sake Pothalalah , Dr. K Ashok Babu,"A New Approach to Telegu Text Steganography by Shifting Inherent Vowel Signs", International Journal of Engineering Science and Technology, Vol. 2 (12), 2010, 7203-7214.
  10. M. Hassan Shirali-Shahreza, Mohammad Shirali-Shahreza "Arabic/Persian Text Steganography Utilizing Similar Letters with Different Codes", The Arabian Journal for Science and Engineering, Volume 35, Number 1B.
Index Terms

Computer Science
Information Sciences

Keywords

Steganography 4LSB Image steganography Steganolysis SHA-1 Unicode.