CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Hidden Data Transmission using Image Steganography

by Dharmesh Mistry, Richa Desai, Megh Jagad
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 130 - Number 14
Year of Publication: 2015
Authors: Dharmesh Mistry, Richa Desai, Megh Jagad
10.5120/ijca2015907177

Dharmesh Mistry, Richa Desai, Megh Jagad . Hidden Data Transmission using Image Steganography. International Journal of Computer Applications. 130, 14 ( November 2015), 8-11. DOI=10.5120/ijca2015907177

@article{ 10.5120/ijca2015907177,
author = { Dharmesh Mistry, Richa Desai, Megh Jagad },
title = { Hidden Data Transmission using Image Steganography },
journal = { International Journal of Computer Applications },
issue_date = { November 2015 },
volume = { 130 },
number = { 14 },
month = { November },
year = { 2015 },
issn = { 0975-8887 },
pages = { 8-11 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume130/number14/23275-2015907177/ },
doi = { 10.5120/ijca2015907177 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:25:31.713603+05:30
%A Dharmesh Mistry
%A Richa Desai
%A Megh Jagad
%T Hidden Data Transmission using Image Steganography
%J International Journal of Computer Applications
%@ 0975-8887
%V 130
%N 14
%P 8-11
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Steganography can be defined as the science of hiding data behind images in such a way that no one except the sender and receiver has any idea about the transfer of hidden message taking place. In this paper, light is thrown on the algorithm using LSB of the image pixels to store data and transfer in a hidden manner, such that it won’t attract attention and the observers will be unaware of any data transmission taking place. The project involved implement and compare three algorithms and evaluate the results to find the most efficient algorithm.

References
  1. Arron Miller Thesis on Steganography
  2. Steganalysis- Detecting hidden information, forensic analysis 1014.
  3. Data-genetics Blog, March 12,2012
  4. Detecting LSB Steganography in Images Ankit Gupta, Rahul Garg.
  5. Lee, Y-K. ; Bell, G., Huang, S-Y., Wang, R-Z. and Shyu, S-J. (2009), “An Advanced Least Significant-Bit Embedding Scheme for Steganographic Encoding”, PSIVT 2009, LNCS 5414, Springer, pp. 349–360.
  6. Chan, Chi-Kwong, and L. M. Cheng. (2004), "Hiding data in images by simple LSB substitution." Pattern Recognition Vol. 37, no. 3, pp. 469-474.
  7. M.W. Chao, C.H. Lin, C.W. Yu and T.Y. Lee, A high capacity 3D steganography algorithm, IEEE Transactions on Visualization and Computer Graphics, 15(2)(2009)274-284.
  8. C.C. Chang, P. Tsai and M.H. Lin, An adaptive steganography for index-based images using codeword grouping, Advances in Multimedia Information Processing-PCM,Springer, (3333)(2004)731-738.
  9. R. Böhme and A. Westfeld, Breaking cauchy model-based JPEG steganography with first order statistics, in: Proceedings of the European Symposium on Research in Computer Security, ESORICS 2004, Valbonne, France, 13th Sept. 2004, LNCS, vol.3193, pp.125-140.
  10. J. Fridrich, M. Goljan and D. Hogeg, steganalysis of JPEG images: Breaking the F5 algorithm, in: Proceedings of Information Hiding: 5th International Workshop, IH 2002 Noordwijkerhout, The
  11. Netherlands, LNCS, Springer, October 7-9, 2002, 2578/2003, pp. 310-323.
  12. Andreas Westfeld. F5-a steganographic algorithm. In Information Hiding, pages 289–302, 2001.
Index Terms

Computer Science
Information Sciences

Keywords

Steganography steganalysis cover image steg image LSB