CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

A Novel Approach of Encoding for Image Steganography with Reduced Data Content

by Ashadeep Kaur, Rakesh Kumar, Nidhi Bhatla
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 155 - Number 9
Year of Publication: 2016
Authors: Ashadeep Kaur, Rakesh Kumar, Nidhi Bhatla
10.5120/ijca2016912428

Ashadeep Kaur, Rakesh Kumar, Nidhi Bhatla . A Novel Approach of Encoding for Image Steganography with Reduced Data Content. International Journal of Computer Applications. 155, 9 ( Dec 2016), 24-30. DOI=10.5120/ijca2016912428

@article{ 10.5120/ijca2016912428,
author = { Ashadeep Kaur, Rakesh Kumar, Nidhi Bhatla },
title = { A Novel Approach of Encoding for Image Steganography with Reduced Data Content },
journal = { International Journal of Computer Applications },
issue_date = { Dec 2016 },
volume = { 155 },
number = { 9 },
month = { Dec },
year = { 2016 },
issn = { 0975-8887 },
pages = { 24-30 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume155/number9/26634-2016912428/ },
doi = { 10.5120/ijca2016912428 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:00:49.757496+05:30
%A Ashadeep Kaur
%A Rakesh Kumar
%A Nidhi Bhatla
%T A Novel Approach of Encoding for Image Steganography with Reduced Data Content
%J International Journal of Computer Applications
%@ 0975-8887
%V 155
%N 9
%P 24-30
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Image Steganography is the technology that is being used to provide secure communication between the sender and the receiver. As the technology enhances, security becomes the important concern. Thus, image Steganography helps in embedding the data behind the image with the original image so that unauthorized user cannot access the data. In this paper, different techniques of image Steganography are discussed. This paper also concludes the comparison of the proposed technique with the existing techniques. Encoding of the data will reduce the risk of data tampering by unauthorized user and increase the security of the system. So the image format conversion is also used that will provide additional security to the data. Experiments have been performed with the proposed and existing technique and result proves that the efficiency of the proposed method is better in terms of security.

References
  1. M. Kameswara Rao (2015). Security Enhancement in Image Steganography a MATLAB Approach. Journal of scientific research, Vol 23(2), Pp 357-361.
  2. Parmar Ajit Kumar Maganbha (2015). A Study and literature Review on Image Steganography. IJCSIT, vol 6(1), Pp 686-688.
  3. Shikha Mohan (2015). Image Steganography: Classification, Application and Algorithms. IJCEM, Vol 1(10), Pp 93-97.
  4. A Rashi Singh (2014). Review on Image Steganography. International Journal of Advanced Research in Computer Science and Software Engineering Research Paper, Volume 4, Issue 5,Pp 686-689.
  5. Chaitali R. Gaidhani (2014). Image Steganography for Message Hiding Using Genetic. IJCSE, vol 2(3), Pp 67-70.
  6. Chin-Chen Chang (2014). Meaningful Shadows for Image Secret Sharing with Steganography and Authentication Techniques. Journal of information hiding and data processing, vol 5(3), Pp 342-352.
  7. Jasleen Kour (2014). Steganography Techniques –A Review Paper. International Journal of Emerging Research in Management &Technology ,Volume-3, Issue-5, pp 132-135.
  8. Mamta Juneja (2014). Improved LSB based Steganography Techniques for Color Images in Spatial Domain. IJNS, vol 16(6), Pp 452-462.
  9. Mohammad Sajid Khan (2014). Encryption Based Steganography- Modern Approach for Information Security. IJCSIT, Vol. 5 (3) , Pp 2914-2917.
  10. Prof.Pramod Khandare (2014). Data Hiding Technique Using Steganography. IJCSIT, Vol. 5 (2) , Pp 1785-1787.
  11. Sabyasachi Pramanik (2014). Image Steganography Using Wavelet Transform And Genetic Algorithm. IJIRAE, vol 1(1), Pp 17-20.
  12. Shemi P B (August-2014). An Enhanced Image Steganography Technique in Art Images. IJCSMC, Vol.3 Issue.8, pg. 613-621.
  13. Shrutika Suri (2014). Comparative Analysis of Steganography for Coloured Images. JCSE, vol 2(4), Pp 180-184.
  14. Takashi Mihara (2014). A New Framework of Steganography Using the Content of Cover Data. Journal of information hiding and multimedia signal processing, Vol 5(2), Pp 117-123.
  15. AL-Shatnawi, Atallah M.,and Bader M. AlFawwaz (2013). An Integrated Image Steganography System with Improved Image Quality. Applied Mathematical Sciences 7.71 : 3545-3553.
  16. Anil Kumar (2013). A Secure Image Steganography Based on RSA Algorithm and Hash-LSB Technique. International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 7, Pp 363-372.
  17. Banik Bamali Gupta and Samir K Bandvopadhvay (2013). A DWT Method for Image Steganography. International Journal 3.6.
  18. C.P.Sumathi (2013). A Study of Various Steganographic Techniques Used for Information Hiding. International Journal of Computer Science & Engineering Survey (IJCSES) Vol.4, No.6, 9,Pp 9-25.
  19. Goel, Arun Rana, and Stuti Manpreet Kaur (2013). A Review of Comparison Techniques of Image Steganography. Global Journal of Computer Science and Technology 13.4.
  20. Mehdi Hussain (2013). A Survey of Image Steganography Techniques. International Journal of Advanced Science and Technology Vol. 54,Pp 113-124.
  21. Stuti Goel (2013). A Review of Comparison Techniques of Image Steganography. Global Journal of Computer Science and Technology Graphics & Vision Volume 13 Issue 4 Version 1.0 , pp 8-14.
  22. Swati malik, Ajit (May 2013). Securing Data by Using Cryptography with Steganography. International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 5.
  23. Soni, A., Jain, J., Roshan, R. (March 2013). Image Steganography using discrete fractional Fourier transform. Intelligent Systems and Signal Processing (ISSP), International Conference, vol., no., pp.97,100.
  24. Atallah M (2012). A New Method in Image Steganography with Improved Image Quality. Applied Mathematical Sciences, Vol. 6, no. 79, 3907 – 3915.
  25. Bhattacharyya, Souvik, and Gautam Sanyal (2012). A Robust Image Steganography using DWT Difference Modulation (DWTDM). International Journal of Computer Network & Information Security 4.7.
  26. J. K. Mandal (2012). Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain. International Journal of Information Sciences and Techniques (IJIST) Vol.2, No.4, Pp 83-93.
  27. Shabir A. Parah, Javaid A. Sheikh, G.M. Bhat (July 2012). Data Hiding in Intermediate Significant Bit Planes, A High Capacity Blind Steganographic Technique. International Conference on Emerging Trends in Science, Engineering and Technology , pp.192-197.
  28. Saddaf rubab and M Younus (February 2012). Improved Image Steganography Technique for Colored Images using Wavelet Transform. International Journal of Computer Applications 39(14):29-32, Published by Foundation of Computer Science, New York, USA.
  29. Masud Karim, S.M.; Rahman, M.S.; Hossain, M.I. (December 2011). A new approach for LSB based image Steganography using secret key. Computer and Information Technology (ICCIT), 14th International Conference, vol., no., pp.286,291.
  30. Chang, Chin-Chen., Lin, Iuan-Chang., and Yaun-Hui YU. (2007). A new Steganographic method for color and gray scale image hiding. Computer Vision and Image Understanding, ELSEVIER, Vol. 107, No. 3, pp. 183-194.
  31. Deshpande Neeta, Kamalapur Snehal, DaisyJacobs (2007). Implementation of LSB Steganography and Its Evaluation for Various Bits. Digital Information Management, 1st International conference.pp 173-178.
  32. Komal Hirachandani. New Approach of Information Security through Steganography by using Wavelet Transformation and Symmetric Encryption. IJCSIT, vol 5(5), Pp 6253-6260.
  33. R.Poornima. An Overview of Digital Image Steganography. International Journal of Computer Science & Engineering Survey (IJCSES) Vol.4, No.1, Pp 23 -31.
  34. Sohag, Saeed Ahmed, Md Kabirul Islam, and Md Baharul Islam. A Novel Approach for Image Steganography Using Dynamic Substitution and Secret key.
Index Terms

Computer Science
Information Sciences

Keywords

Steganography Stego Image YcBcr Run Length Encoding Data hiding