CFP last date
22 April 2024
Reseach Article

Article:Security Building at the Line of Control for Image Stego

by Rengarajan, Amirtharajan, Benita Bose, Sasidhar Imadabathuni, John Bosco, Balaguru Rayappan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 12 - Number 5
Year of Publication: 2010
Authors: Rengarajan, Amirtharajan, Benita Bose, Sasidhar Imadabathuni, John Bosco, Balaguru Rayappan
10.5120/1671-2252

Rengarajan, Amirtharajan, Benita Bose, Sasidhar Imadabathuni, John Bosco, Balaguru Rayappan . Article:Security Building at the Line of Control for Image Stego. International Journal of Computer Applications. 12, 5 ( December 2010), 46-53. DOI=10.5120/1671-2252

@article{ 10.5120/1671-2252,
author = { Rengarajan, Amirtharajan, Benita Bose, Sasidhar Imadabathuni, John Bosco, Balaguru Rayappan },
title = { Article:Security Building at the Line of Control for Image Stego },
journal = { International Journal of Computer Applications },
issue_date = { December 2010 },
volume = { 12 },
number = { 5 },
month = { December },
year = { 2010 },
issn = { 0975-8887 },
pages = { 46-53 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume12/number5/1671-2252/ },
doi = { 10.5120/1671-2252 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:01:26.666405+05:30
%A Rengarajan
%A Amirtharajan
%A Benita Bose
%A Sasidhar Imadabathuni
%A John Bosco
%A Balaguru Rayappan
%T Article:Security Building at the Line of Control for Image Stego
%J International Journal of Computer Applications
%@ 0975-8887
%V 12
%N 5
%P 46-53
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Security has virtually become an indispensable non-functional requirement for any technology that deals with data. Traditional methods of imparting security using encryption have given away themselves long ago to cryptanalytic ventures. A different method of secure data transfer without revealing the mere existence of secret, called Steganography is a promising technique to ensure security. This technique camouflages secret data into a casual cover image, without affecting its visually perceived quality. This paper proposes a novel technique, which is a hybrid of cryptography, edge detection and steganography. By differentially embedding secret data into edges and smooth pixels of cover image, so that edge pixels and smooth pixels have data with different encryptions, the cryptic effect can be boosted to a greater limit, making the unauthorized extraction of secret data impossible.

References
  1. Abbas Cheddad, Joan Condell, Kevin Curran, Paul Mc Kevitt, Digital image steganography: Survey and analysis of current methods Signal Processing 90 (2010) 727–752.
  2. Adnan Gutub, "Pixel Indicator Technique for RGB Image Steganography", Journal of Emerging Technologies in Web Intelligence (JETWI) (2010 )2(1) 56-64
  3. R.Amirtharajan, Aishwarya G, Madhumita Rameshbabu and John Bosco Balaguru Rayappan, “Optimum Pixel & Bit location for Colour Image Stego- A Distortion Resistant Approach. International Journal of Computer Applications(2010) 10(7):17–24.
  4. R.Amirtharajan, Adharsh.D, Vignesh.V and R.John Bosco Balaguru, “PVD Blend with Pixel Indicator - OPAP Composite for High Fidelity Steganography” International Journal of Computer Applications (2010) 7(9):31–37.
  5. R.Amirtharajan, Sandeep Kumar Behera, Motamarri Abhilash Swarup, Mohamed Ashfaaq K and John Bosco Balaguru Rayappan, “ Colour Guided Colour Image Steganography” Universal Journal of Computer Science and Engineering Technology 1 (1) (2010), 16-23.
  6. R.Amirtharajan and Dr. R. John Bosco Balaguru, “Tri-Layer Stego for Enhanced Security – A Keyless Random Approach” - IEEE Xplore, DOI, 10.1109/IMSAA.2009.5439438.
  7. R.Amirtharajan, R. Akila, P.Deepikachowdavarapu, “A Comparative Analysis of Image Steganography”. International Journal of Computer Applications 2(3)(2010):41–47.
  8. R.Amirtharajan, Krishnendra Nathella and J Harish, “Info Hide – A Cluster Cover Approach” International Journal of Computer Applications 3(5)(2010) 11–18.
  9. R.Amirtharajan and R.John Bosco Balaguru. “Constructive Role of SFC & RGB Fusion versus Destructive Intrusion”. International Journal of Computer Applications 1(20):30–36
  10. Bruice Schneier, Applied Cryptography Protocols, Algorithm and Source Code in C. Second edition. Wiley India edition 2007
  11. W. Bender, D. Gruhl, N. Morimoto, A. Lu, “Techniques for data hiding” IBM Syst. J. 35 (3&4) (1996) 313–336.
  12. C.K. Chan, L.M. Chen, Hiding data in images by simple LSB substitution, Pattern Recognition 37 (3) (2004) 469–474.
  13. Chang, C.C., Hsiao, J.Y., Chan, C.S., 2003. Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy. Pattern Recognition 36 (July), 1583–1595.
  14. Chang, C.C., Tseng, H.W., 2004. A steganographic method for digital images using side match. Pattern Recognition Letter 25 (September), 1431–1437.
  15. F.A.P. Petitcolas, R.J. Anderson, M.G. Kuhn, Information hiding—a survey, Proc. IEEE 87 (7) (1999) 1062–1078.
  16. S. Katzenbeisser, F.A.P. Petitcolas, Information Hiding Techniques for Steganography and Digital Watermarking, Artech House, Norwood, MA, 2000.
  17. Peter Wayner, “Disappearing cryptography: information hiding : steganography & watermarking” 2nd. ed. San Francisco: Morgan Kaufmann; 2002.
  18. N. Provos and P. Honeyman, “Hide and seek: An introduction to steganography,” IEEE Security Privacy Mag.,1 (3) (2003) 32–44
  19. C.C. Thien, J.C. Lin, A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function, Pattern Recognition 36 (11) (2003) 2875–2881
  20. Po-Yueh Chen Hung-Ju Lin, “A DWT Based Approach for Image Steganography”, International Journal of Applied Science and Engineering 4(3)(2006): 275-290
  21. R.Z. Wang, C.F. Lin, J.C. Lin, Image hiding by optimal LSB substitution and genetic algorithm, Pattern Recognition 34 (3) (2000) 671–683
Index Terms

Computer Science
Information Sciences

Keywords

Edge Detection Information hiding Least Significant Bit (LSB) Embedding Optimal Pixel Adjustment Process (OPAP)