Notification: Our email services are now fully restored after a brief, temporary outage caused by a denial-of-service (DoS) attack. If you sent an email on Dec 6 and haven't received a response, please resend your email.
CFP last date
20 December 2024
Reseach Article

Improving ZOH Image Steganography Method by using Braille Method

by Abdelmged A. A., Tarek A. A., Al-Hussien Seddik Saad, Shaimaa M. H.
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 151 - Number 7
Year of Publication: 2016
Authors: Abdelmged A. A., Tarek A. A., Al-Hussien Seddik Saad, Shaimaa M. H.
10.5120/ijca2016911799

Abdelmged A. A., Tarek A. A., Al-Hussien Seddik Saad, Shaimaa M. H. . Improving ZOH Image Steganography Method by using Braille Method. International Journal of Computer Applications. 151, 7 ( Oct 2016), 31-35. DOI=10.5120/ijca2016911799

@article{ 10.5120/ijca2016911799,
author = { Abdelmged A. A., Tarek A. A., Al-Hussien Seddik Saad, Shaimaa M. H. },
title = { Improving ZOH Image Steganography Method by using Braille Method },
journal = { International Journal of Computer Applications },
issue_date = { Oct 2016 },
volume = { 151 },
number = { 7 },
month = { Oct },
year = { 2016 },
issn = { 0975-8887 },
pages = { 31-35 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume151/number7/26247-2016911799/ },
doi = { 10.5120/ijca2016911799 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:56:29.882853+05:30
%A Abdelmged A. A.
%A Tarek A. A.
%A Al-Hussien Seddik Saad
%A Shaimaa M. H.
%T Improving ZOH Image Steganography Method by using Braille Method
%J International Journal of Computer Applications
%@ 0975-8887
%V 151
%N 7
%P 31-35
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Steganography is considered one of the branches of data hiding. It is the science of hiding sensitive information in a cover such as image, audio, video to achieve secure and secret communication. The word steganography derived from two Greek words: steganos means covered and graphien means writing and often refers to secret writing. The most common use of steganography is to hide a file inside another file. In this paper we modify the secret message that embedded into the cover not the technique of embedding of the previously proposed image steganography method using Zero Order Hold zooming (ZOH) by using LSBraille image steganography method that can represent the secret message characters by 6 bits only not 8 bits as binary representation. The proposed method provides MHC and PSNR more than the previously proposed method ZOH.

References
  1. Arun Kumar Singh, Juhi Singh, Dr. Harsh Vikram Singh, "Steganography in Images Using LSB Technique "International Journal of Latest Trends in Engineering and Technology (IJLTET), Vol. 5 Issue 1 January 2015, ISSN: 2278-621X.
  2. Stuti Goel, Arun Rana, Manpreet Kaur,”A Review of Comparison Techniques of Image Steganography”, IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE) e-ISSN: 2278-1676,p-ISSN: 2320-3331, Volume 6, Issue 1 (May. - Jun. 2013), PP 41-48.
  3. Shikha S., and Sumit B., "Image Steganography: A Review", International Journal of Emerging Technology and Advanced, Vol. 3, Issue 1, January 2013.
  4. Krista B., Linguistic Steganography: Survey, Analysis, And Robustness Concerns For Hiding Information In Text, Center for Education and Research in Information Assurance and Security, Purdue University, West Lafayette, IN 47907-2086, CERIAS Tech Report 2004-13
  5. Abdelmgeid A. A., Tarek A. A., Al-Hussien S. S., Shaimaa M. H., " New Image Steganography Method using Zero Order Hold Zooming ",International Journal of Computer Applications, Vol 133 – No.9, January 2016.
  6. Abdelmgeid A. A., Al – Hussien S. S., "Image Steganography Technique By Using Braille Method of Blind People (LSBraille) ", International Journal of Image Processing (IJIP), Vol 7, Issue 1, 2013.
  7. Sara N., Amir M. E., Mohammad S. M.,"Secure Information Transmission using Steganography and Morphological Associative Memory ", International Journal of Computer Applications, Vol 61, No 7, January 2013.
  8. Moazzam H., Sadia A. H., Farhana S., " Variable Rate Steganography in Gray Scale Digital Images Using Neighborhood Pixel Information ", The International Arab Journal of Information Technology, Vol. 7, No. 1, January 2010.
  9. Sara N., Amir M. E., Mohammad S. M.,"Secure Information Transmission using Steganography and Morphological Associative Memory ", International Journal of Computer Applications, Vol 61, No 7, January 2013.
  10. Moazzam H., Sadia A. H., Farhana S., " Variable Rate Steganography in Gray Scale Digital Images Using Neighborhood Pixel Information ", The International Arab Journal of Information Technology, Vol. 7, No. 1, January 2010.
  11. Shweta M., Vishal.," An Improved Novel Steganographic Technique for RGB and YCbCr Colorspace", IJCSMC, Vol. 3, Issue. 5, May 2014, pg.377 – 381, ISSN 2320–088X.
  12. Chandra P. S., Mr. Ramneet S Ch.," A Survey of Steganography Technique, Attacks and Applications ",ijarcsse , Volume 4, Issue 2, February 2014, ISSN: 2277 128X.
  13. Deepa S., Umarani R., " A Study on Digital Image Steganography ", International Journal of Advanced Research in Computer Science and Software Engineering, Vol 3, Issue 1, January 2013.
  14. Abdelmgeid A. A., Al – Hussien S. S., " New Technique for Encoding the Secret Message to Enhance the Performance of MSLDIP Image Steganography Method (MPK Encoding) ", International Journal of Computer Applications, Vol 59, No.15, December 2012.
Index Terms

Computer Science
Information Sciences

Keywords

Steganography Zero Order Hold (ZOH) Method Peak Signal-to-Noise Rate (PSNR) Mean Square Error (MSE).