Call for Paper - January 2024 Edition
IJCA solicits original research papers for the January 2024 Edition. Last date of manuscript submission is December 20, 2023. Read More

Security Building at the Line of Control for Image Stego

International Journal of Computer Applications
© 2010 by IJCA Journal
Number 5 - Article 8
Year of Publication: 2010
Benita Bose
Sasidhar Imadabathuni
John Bosco
Balaguru Rayappan

Rengarajan, Amirtharajan, Benita Bose, Sasidhar Imadabathuni, John Bosco and Balaguru Rayappan. Article:Security Building at the Line of Control for Image Stego. International Journal of Computer Applications 12(5):46–53, December 2010. Published By Foundation of Computer Science. BibTeX

	author = {Rengarajan and Amirtharajan and Benita Bose and Sasidhar Imadabathuni and John Bosco and Balaguru Rayappan},
	title = {Article:Security Building at the Line of Control for Image Stego},
	journal = {International Journal of Computer Applications},
	year = {2010},
	volume = {12},
	number = {5},
	pages = {46--53},
	month = {December},
	note = {Published By Foundation of Computer Science}


Security has virtually become an indispensable non-functional requirement for any technology that deals with data. Traditional methods of imparting security using encryption have given away themselves long ago to cryptanalytic ventures. A different method of secure data transfer without revealing the mere existence of secret, called Steganography is a promising technique to ensure security. This technique camouflages secret data into a casual cover image, without affecting its visually perceived quality. This paper proposes a novel technique, which is a hybrid of cryptography, edge detection and steganography. By differentially embedding secret data into edges and smooth pixels of cover image, so that edge pixels and smooth pixels have data with different encryptions, the cryptic effect can be boosted to a greater limit, making the unauthorized extraction of secret data impossible.


  • Abbas Cheddad, Joan Condell, Kevin Curran, Paul Mc Kevitt, Digital image steganography: Survey and analysis of current methods Signal Processing 90 (2010) 727–752.
  • Adnan Gutub, "Pixel Indicator Technique for RGB Image Steganography", Journal of Emerging Technologies in Web Intelligence (JETWI) (2010 )2(1) 56-64
  • R.Amirtharajan, Aishwarya G, Madhumita Rameshbabu and John Bosco Balaguru Rayappan, “Optimum Pixel & Bit location for Colour Image Stego- A Distortion Resistant Approach. International Journal of Computer Applications(2010) 10(7):17–24.
  • R.Amirtharajan, Adharsh.D, Vignesh.V and R.John Bosco Balaguru, “PVD Blend with Pixel Indicator - OPAP Composite for High Fidelity Steganography” International Journal of Computer Applications (2010) 7(9):31–37.
  • R.Amirtharajan, Sandeep Kumar Behera, Motamarri Abhilash Swarup, Mohamed Ashfaaq K and John Bosco Balaguru Rayappan, “ Colour Guided Colour Image Steganography” Universal Journal of Computer Science and Engineering Technology 1 (1) (2010), 16-23.
  • R.Amirtharajan and Dr. R. John Bosco Balaguru, “Tri-Layer Stego for Enhanced Security – A Keyless Random Approach” - IEEE Xplore, DOI, 10.1109/IMSAA.2009.5439438.
  • R.Amirtharajan, R. Akila, P.Deepikachowdavarapu, “A Comparative Analysis of Image Steganography”. International Journal of Computer Applications 2(3)(2010):41–47.
  • R.Amirtharajan, Krishnendra Nathella and J Harish, “Info Hide – A Cluster Cover Approach” International Journal of Computer Applications 3(5)(2010) 11–18.
  • R.Amirtharajan and R.John Bosco Balaguru. “Constructive Role of SFC & RGB Fusion versus Destructive Intrusion”. International Journal of Computer Applications 1(20):30–36
  • Bruice Schneier, Applied Cryptography Protocols, Algorithm and Source Code in C. Second edition. Wiley India edition 2007
  • W. Bender, D. Gruhl, N. Morimoto, A. Lu, “Techniques for data hiding” IBM Syst. J. 35 (3&4) (1996) 313–336.
  • C.K. Chan, L.M. Chen, Hiding data in images by simple LSB substitution, Pattern Recognition 37 (3) (2004) 469–474.
  • Chang, C.C., Hsiao, J.Y., Chan, C.S., 2003. Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy. Pattern Recognition 36 (July), 1583–1595.
  • Chang, C.C., Tseng, H.W., 2004. A steganographic method for digital images using side match. Pattern Recognition Letter 25 (September), 1431–1437.
  • F.A.P. Petitcolas, R.J. Anderson, M.G. Kuhn, Information hiding—a survey, Proc. IEEE 87 (7) (1999) 1062–1078.
  • S. Katzenbeisser, F.A.P. Petitcolas, Information Hiding Techniques for Steganography and Digital Watermarking, Artech House, Norwood, MA, 2000.
  • Peter Wayner, “Disappearing cryptography: information hiding : steganography & watermarking” 2nd. ed. San Francisco: Morgan Kaufmann; 2002.
  • N. Provos and P. Honeyman, “Hide and seek: An introduction to steganography,” IEEE Security Privacy Mag.,1 (3) (2003) 32–44
  • C.C. Thien, J.C. Lin, A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function, Pattern Recognition 36 (11) (2003) 2875–2881
  • Po-Yueh Chen Hung-Ju Lin, “A DWT Based Approach for Image Steganography”, International Journal of Applied Science and Engineering 4(3)(2006): 275-290
  • R.Z. Wang, C.F. Lin, J.C. Lin, Image hiding by optimal LSB substitution and genetic algorithm, Pattern Recognition 34 (3) (2000) 671–683