Call for Paper - October 2019 Edition
IJCA solicits original research papers for the October 2019 Edition. Last date of manuscript submission is September 20, 2019. Read More

Auto Key Generation and Minimal Image Distortion Mechanism for Image Steganography

Print
PDF
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2018
Authors:
Yuvraj Hembade, Nikita Bhanose, Grishma Kulkarni, Utkarsha Memane, Jayashree Patil
10.5120/ijca2018916294

Yuvraj Hembade, Nikita Bhanose, Grishma Kulkarni, Utkarsha Memane and Jayashree Patil. Auto Key Generation and Minimal Image Distortion Mechanism for Image Steganography. International Journal of Computer Applications 179(17):36-40, February 2018. BibTeX

@article{10.5120/ijca2018916294,
	author = {Yuvraj Hembade and Nikita Bhanose and Grishma Kulkarni and Utkarsha Memane and Jayashree Patil},
	title = {Auto Key Generation and Minimal Image Distortion Mechanism for Image Steganography},
	journal = {International Journal of Computer Applications},
	issue_date = {February 2018},
	volume = {179},
	number = {17},
	month = {Feb},
	year = {2018},
	issn = {0975-8887},
	pages = {36-40},
	numpages = {5},
	url = {http://www.ijcaonline.org/archives/volume179/number17/28962-2018916294},
	doi = {10.5120/ijca2018916294},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}
}

Abstract

Nowadays, due to extensive usage of internet for communication, the possibility, threat to data being communicated can’t be neglected. Wherever there is a need to have secrecy of the data, there must be a strong technique of encryption.To improve the security features in case of data transfers over the internet, the techniques that have been known till now are like Cryptography, Steganography, etc. Where Cryptography is defined as the method to conceal information by encrypting plaintexts to cipher texts and later transmitting it to the intended recipient using an unknown key, on the other hand Steganography provides or extends security further to a high level by hiding the cipher text into text, image or other formats. For hiding secret information in images, there are many steganography techniques. Each of them has strong and weak points. The methods used before, were having limitations of payload capacity, specific image formats to be used, and more distortion of image quality.

The major advantages of this work are having maximum payload capacity, minimum kind of distortion in actual image quality, negligible change into original covert medium and encrypted file.

References

  1. Rupali Jain, Jayashree Boradh, Advances in digital image steganography, IEEE 2016.
  2. Saha, B. and Sharma, S., Steganographic Techniques of Data Hiding using Digital Images Defence Science Journal, Vol. 62, No. 1, January, pp. 11-18, DESIDOC, 2012.
  3. Bhatacharya, A., Banerjee, I., and Sanyal, G., A survey of steganography and steganalysis techniques in image, text, audio and video cover carrier”, Journal of Global Research in Computer Science, vol.2, no.4, pp.1-16, 2011.
  4. Morkel, J.H.P. Eloff, M.S. Olivier, “An overview of image steganography”, http://mo.co.za/openistegoverview.pdf.
  5. Sellars, Duncan, “Introduction to steganography”,http://www.cs.uct.ac.za/courses/CS400WINIS/papers99/dsellars/stego.html.
  6. Moerland, T., Steganography and Steganalysis, Leiden Institute of Advanced Computing Science, www.liacs.nl /home/ tmoerl/privtech.
  7. Rafael C. Gonzalez and Richard E. Woods, “Digital Image Processing”, Pearson Education India, 2009.ISBN- 8131726959, 9788131726952.
  8. Gandharba Swain,Saroj Kumar Lenka,Classification of Image Steganography Techniques in Spatial Domain: A Study,Vol. No.5,IJCSET 2014.
  9. Chan, C. K. and Chang, L. M.,hiding data images by simple LSB substitution, Pattern recognition, vol 37 pp 469-474,2004.
  10. Wu, C., Tsai, W.H.,Asteganographic method for images by pixel-value differencing,Pattern Recognition Letters vol 24,pp1613-1626,2003.
  11. Kaur, J., Duhan, M., Kumar, A., Yadav, R.K.,Matrix matching method for secret communication using image steganography, Fascicule 3. ISSN 1584 – 2673, 2012
  12. William Stallings, “Cryptography and Network Security Principles and Practices”, Fifth Edition, (2005).
  13. Mahendra Kumar,“ Steganography and steganalysis of JPEG images” ,2011.

Keywords

Covert image, Plaintext, Payload Capacity