CFP last date
20 May 2024
Reseach Article

Dithering Technique for Digital Image Steganography

by K. Jyothsna, V. Lokeswara Reddy
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 123 - Number 5
Year of Publication: 2015
Authors: K. Jyothsna, V. Lokeswara Reddy
10.5120/ijca2015905315

K. Jyothsna, V. Lokeswara Reddy . Dithering Technique for Digital Image Steganography. International Journal of Computer Applications. 123, 5 ( August 2015), 11-14. DOI=10.5120/ijca2015905315

@article{ 10.5120/ijca2015905315,
author = { K. Jyothsna, V. Lokeswara Reddy },
title = { Dithering Technique for Digital Image Steganography },
journal = { International Journal of Computer Applications },
issue_date = { August 2015 },
volume = { 123 },
number = { 5 },
month = { August },
year = { 2015 },
issn = { 0975-8887 },
pages = { 11-14 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume123/number5/21954-2015905315/ },
doi = { 10.5120/ijca2015905315 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:11:50.870835+05:30
%A K. Jyothsna
%A V. Lokeswara Reddy
%T Dithering Technique for Digital Image Steganography
%J International Journal of Computer Applications
%@ 0975-8887
%V 123
%N 5
%P 11-14
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Image Processing is a generally examined branch of sciences. Digital Image is a spot, where one can save data and can be recovered by normal vision handling. Considering the general properties of images, there are numerous strategies and procedures connected in this Image Processing. Steganography alludes to the investigation of imperceptible correspondence. Unique from cryptography, where the objective is to secure communications from a spy, yet the steganographic systems endeavor to conceal the very vicinity of the message itself from an observer. The general thought of concealing some information in advanced substance had a more extensive class of uses that go beyond steganography. This paper proposes a creative method for concealing and afterwards recovering a secret image. One can blend two branches of innovation of image processing and stenography. The system comprises of two procedures i.e encoding and decoding . The primary phase in the encoding stage is to shroud the secret RGB color image in a cover picture and get a few shares which are to be transmitted to the receiver. The main focus in the decoding stage is to get back the recovered picture to the original picture quality. However much as could reasonably be expected from the shares in the receiver end.

References
  1. Reginald L. Lagendijk and Jan Biemond, “BASIC METHODS FOR IMAGE RESTORATION AND IDENTIFICATION”, Information and Communication Theory Group, Faculty of Information Technology and Systems Delft University of Technology,The Netherlands.
  2. Abbas Cheddad  Joan Condell, Kevin Curran Paul Mc Kevitt Digital image steganography: Survey and analysis of current methods School of Computing and Intelligent Systems, Faculty of Computing and Engineering, University of Ulster at Magee, Londonderry, BT48 7JL, Northern Ireland, UK.
  3. Lin, Chang-Chou, and Wen-Hsiang Tsai. "Secret image sharing with steganography and authentication." Journal of Systems and software 73.3 (2004): 405-414.
  4. T. Morkel , J.H.P. Eloff M.S. Olivier An Overview Of Image Steganography, Information and Computer Security Architecture (ICSA) Research Group Department of Computer Science University of Pretoria, 0002, Pretoria, South Africa.
  5. Marvel, Lisa M., Charles G. Boncelet Jr, and Charles T. Retter. "Spread spectrum image steganography." Image Processing, IEEE Transactions on 8.8 (1999): 1075-1083.
  6. D. Biswas, S. Biswas, P. P. Sarkar, D. Sarkar, A. Pal, S. Banerjee, S. Polle, F. K. M. Nawaz, K.Das, “Embedding Watermark byPixel Bit Manipulation”, IEEE conference on Scientific Paradigm Shift in Information Technology and Management (SPSITM),2011.
  7. G.Langelaar, I. Setyawan, and R. Lagendijk. Watermarking digital image and video data. IEEE Signal Processing Magazine, 17:20–46, 2000.
  8. Houmansadr , Shahrokh Ghaemmaghami , “A Digital Image Watermarking Scheme Based on Visual Cryptography” Electrical
  9. Engineering Department, Sharif University of Technology, Azadi St., Tehran, Iran.Debasish Jena, Sanjay Kumar Jena, “A Novel Visual Cryptography Scheme” Centre for IT Education, Biju Pattanaik University ofTechnology, Orissa 751010, India, Department of Computer Science & Engineering
  10. R. J. Hwang, “ A Digital Copyright Protection Scheme Based on Visual Cryptography”, Tamkang Journal of Science andEngineering, vol. 3,no. 3, 2000.
  11. N.Naor and A.Shamir, “Visual Cryptography”, Advances in cryptology: Eurocrypt’94, Springer- Verlag, Berlin,1995,pp.1-12.
  12. Lin, Chang-Chou, and Wen-Hsiang Tsai. "Visual cryptography for gray-level images by dithering techniques." Pattern Recognition Letters 24.1 (2003): 349-358.
Index Terms

Computer Science
Information Sciences

Keywords

Steganography Dithering Filtering Encoding and Decoding Cover image Secret image.