CFP last date
20 May 2024
Reseach Article

Improved Image Steganography Algorithm using Huffman Codes

by Hamza Tariq Khan, Heebah Saleem
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 147 - Number 12
Year of Publication: 2016
Authors: Hamza Tariq Khan, Heebah Saleem
10.5120/ijca2016911242

Hamza Tariq Khan, Heebah Saleem . Improved Image Steganography Algorithm using Huffman Codes. International Journal of Computer Applications. 147, 12 ( Aug 2016), 1-4. DOI=10.5120/ijca2016911242

@article{ 10.5120/ijca2016911242,
author = { Hamza Tariq Khan, Heebah Saleem },
title = { Improved Image Steganography Algorithm using Huffman Codes },
journal = { International Journal of Computer Applications },
issue_date = { Aug 2016 },
volume = { 147 },
number = { 12 },
month = { Aug },
year = { 2016 },
issn = { 0975-8887 },
pages = { 1-4 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume147/number12/25702-2016911242/ },
doi = { 10.5120/ijca2016911242 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:51:42.761419+05:30
%A Hamza Tariq Khan
%A Heebah Saleem
%T Improved Image Steganography Algorithm using Huffman Codes
%J International Journal of Computer Applications
%@ 0975-8887
%V 147
%N 12
%P 1-4
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Steganography promises confidentiality of data being transmitted between two parties by hiding the very existence of the data. It helps to achieve secure transmission of data over a network. This research paper provides a technical introduction of image steganography and its implementation using Least Significant Bit (LSB) technique with Huffman Coding. It focuses on the use of Huffman Coding Algorithm to minimize the amount of bits to be embedded into the carrier in order to achieve efficient image steganography.

References
  1. Joan Condell, Kevin Curren, Paul Mc Kevitt “Digital image steganography: Survey and analysis of current methods”, ELSEVIER, Signal Processing, Volume 90, Issue 3, March 2000, pages 727-752.
  2. N. F. Johnson and S. Jajodia, “Exploring steganography: seeing the unseen”, IEEE Computer, 31(2)(1998), pp. 26-34.
  3. “Greedy Algorithms” - http://www.geeksforgeeks.org/greedy-algorithms-set-3-huffman-coding.
  4. Bin Li, Junhui He, Jiwu Huang, Yun Qing Shi, “A Survey On Image Steganography and Steganalysis”, Journal of Information Hiding and Multimedia Signal Processing, Volume 2, Number 2, April 2011, ISSN 2073-4212.
  5. Rajarathnam Chandramouli, Mehdi Kharrazi, Nasir Memon, “Image Steganography and Steganalysis: Concepts and Practice”, Springer Berlin Heidelberg, Digital Watermarking, Volume 2939, Computer Science, pp 35-49.
  6. T. Morkel, J.H.P. Eloff, M.S. Olivier, “An Overview Of Image Steganography”, Information and Computer Security Architecture (ICSA) Research Group “http://mo.co.za/open/stegoverview.pdf”.
  7. Jasleen Kour, Deepankar Verma, “Steganography Techniques – A Review Paper”, International Journal of Emerging Research in Management and Technology, ISSN: 2278-9359, Volume 3, Issue 5.
  8. Shashikala Channalli, Ajay Jadhav, “Steganography An Art of Hiding Data”, International Journal on Computer Science and Engineering, Volume 1(3), 2009, pp. 137-141.
  9. Arvind Kumar, Km. Pooja, “Steganography – A Data Hiding Technique”, International Journal of Computer Applications, Volume 9 – No. 7, 2010.
  10. Shawn D. Dickman, “An Overview of Steganography”, James Madison University Infosec Techreport, “http://vanilla47.com/PDFs/Cryptography/Steganography/An%20Overview%20of%20Steganography.pdf”.
  11. Muhalim Mohamed Amin, Subariah Ibrahim, Mazleena Salleh, Mohd. Rozi Katmin, “Information Hiding Using Steganography”, Universiti Teknologi Malaysia, “http://avierfjard.com/PDFs/Cryptography/Steganography/INFORMATION%20HIDING%20USING%20STEGANOGRAPHY.pdf”.
  12. Nagham Hamid, Abid Yahya, R. Badlishah, Osamah M. Al-Qershi, “Image Steganography Techniques: An Overview”, IJCSS, volume6, Issue3, IJCSS-670.
  13. Chi-Kwong Chan, L.M. Cheng, “Hiding data in images by using simple LSB”, Elsevier, Pattern Recognition, Volume 37, Issue 3, March 2004, pages 469-474.
  14. R. Amirtharajan, R. Akila, P. Deepikachowdavarapu, “A Comparative Analysis of Image Steganography”, “http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.206.4715&rep=rep1&type=pdf”.
  15. Chin-Chen Chang, Min-Hui Lin, Yu-Chen Hu, “A Fast and Secure Image Hiding Scheme Based on LSB Substitution”, International Journal of Pattern Recognition and Artificial Intelligence, Volume 16, Issue 04, June 2002, DOI: 10.1142/S0218001402001770.
Index Terms

Computer Science
Information Sciences

Keywords

Steganography image steganography carrier image steganography object steganography key Least Significant Bit (LSB) Huffman Coding.