CFP last date
20 May 2024
Reseach Article

Mode and Multiple Technique: A New Image Steganography Method for Capacity Enhancement of Message in Image

by Rahul Rishi, Sudhir Batra, Rajkumar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 13 - Number 4
Year of Publication: 2011
Authors: Rahul Rishi, Sudhir Batra, Rajkumar
10.5120/1770-2432

Rahul Rishi, Sudhir Batra, Rajkumar . Mode and Multiple Technique: A New Image Steganography Method for Capacity Enhancement of Message in Image. International Journal of Computer Applications. 13, 4 ( January 2011), 10-15. DOI=10.5120/1770-2432

@article{ 10.5120/1770-2432,
author = { Rahul Rishi, Sudhir Batra, Rajkumar },
title = { Mode and Multiple Technique: A New Image Steganography Method for Capacity Enhancement of Message in Image },
journal = { International Journal of Computer Applications },
issue_date = { January 2011 },
volume = { 13 },
number = { 4 },
month = { January },
year = { 2011 },
issn = { 0975-8887 },
pages = { 10-15 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume13/number4/1770-2432/ },
doi = { 10.5120/1770-2432 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:01:51.112186+05:30
%A Rahul Rishi
%A Sudhir Batra
%A Rajkumar
%T Mode and Multiple Technique: A New Image Steganography Method for Capacity Enhancement of Message in Image
%J International Journal of Computer Applications
%@ 0975-8887
%V 13
%N 4
%P 10-15
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Now a days, a major stress in steganography is to hide the maximum information possible alongwith the consideration of minimum bits used in such a way that image is not significantly degraded after embedding and embedded information is immune to modifications from intelligent attacks or manipulations. In the present paper we are proposing mode and multiple methods which shows an improvement over existing digital logic steganography method with comparatively lesser number of bits used to insert and extract the hidden information from image.

References
  1. G J Simmons, “The Prisoners Problem and the Subliminal Chaunell”, Proceedings of cypto‟ 83, Plenum Press, pp 51-67, 1983.
  2. Parvinder Singh, Sudhir Batra, HR Sharma, "Steganographic Techniques Based on Digital Logic for Minimum Embedding and Maximum Hiding", WSEAS Transactions on Signal Processing, issue 5, vol 3, May 2007, ISSN 1790-5022, pp 346-353.
  3. Neil F Johnson, Sushil Jajodia, “Exploring Stenography: Seeing the Unseen”, IEEE Computer, Feb 1998, pp 26-34.
  4. Neil F. Johnson, Sushil Jajodia, “Steganalysis of Images Created Using Current Steganography Software”, Lecture Notes in Computer Science, vol 1525, 1998, Springer-Verlag.
  5. JJ Eggers, R Bauml, Bernd Grid, “A Communication 4675, Jan 2002, Security and Watermarking of Multimedia Contents IV, San Jose, Callifornia.
  6. Parvinder Singh, Sudhir Batra, HR Sharma, “Evaluating the Performance of Message Hidden in 1st and 2nd Bit Plane”, WSEAS Transactions on Information Science and Applications, issue 8, vol 2, Aug 2005, pp 1220-1227.
  7. Sudhir Batra, Rahul Rishi, Rajkumar , “Insertion of Message in 6th , 7th and 8th Bit of Pixel Values and Its Retrieval in Case Intruder Changes the Least Significant Bit of Image Pixels”, International Journal of Security and its Applications, issue 3, vol, 4, July 2010, pp 1-10.
  8. SN Sivanandan, CK Gokulnath, K Prasanna, S Rajeev, “NFD Techniques for Efficient and Secured Information Hiding in Low Resolution Images”, Lecture Notes in Computer Sciences, vol 3347, Springer Verlag, 2004, pp 458-467.
  9. NF Johnson, S Katzenbeisser, “A Survey of Steganographic Techniques”, Information Hiding, Artech House, pp 43-78, 2000.
  10. Jessica Fridrich, Miroslav Goljan , Rui Du, “Detecting LSB Steganography in Color and Gray-Scale Images”, IEEE Multimedia, issue 4, vol 8, 2001.
Index Terms

Computer Science
Information Sciences

Keywords

Steganography mode and multiple method multiplication factor