Call for Paper - February 2021 Edition
IJCA solicits original research papers for the February 2021 Edition. Last date of manuscript submission is January 20, 2021. Read More

Estimating the Secret Message in the Digital Image

Print
PDF
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2019
Authors:
M. Sivaram D. Yuvaraj Amin Salih Mohamme V. Porkodi
10.5120/ijca2019918329

Sivaram Yuvaraj Amin Salih Mohamme M D V Porkodi. Estimating the Secret Message in the Digital Image. International Journal of Computer Applications 181(36):26-28, January 2019. BibTeX

@article{10.5120/ijca2019918329,
	author = {M. Sivaram D. Yuvaraj Amin Salih Mohamme V. Porkodi},
	title = {Estimating the Secret Message in the Digital Image},
	journal = {International Journal of Computer Applications},
	issue_date = {January 2019},
	volume = {181},
	number = {36},
	month = {Jan},
	year = {2019},
	issn = {0975-8887},
	pages = {26-28},
	numpages = {3},
	url = {http://www.ijcaonline.org/archives/volume181/number36/30268-2019918329},
	doi = {10.5120/ijca2019918329},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}
}

Abstract

In this paper, a new method for estimating the secret message in the digital image. The actual concept involved in this paper is that the secret message is embedded into the cover image at random pixel in the last two positions of the LSB. Due to this technique, the length restriction of the LSB method of hiding the data is enhanced. Since the previous two bits of the Least Significant Bits are altered the possibility of having a substantial content of information is possible. This technique will overcome the problems faced by many other steganography techniques like LSB, Filtering, Masking, etc... In the face of having only short messages embedded into the image.

References

  1. R.J. Anderson and F.A.P. Petitcolas, “On the Limits of Steganography”, IEEE Journal of Selected Areas in Communications, Special Issue on Copyright and Privacy Protection, vol. 16(4), pp. 474−481, 1998.
  2. R. Chandramouli and N. Memon, “Analysis of LSB Based Image Steganography Techniques”, Proc. of ICIP 2001, Thessaloniki, Greece, October 7–10, 2001.
  3. S. Dumitrescu, Wu Xiaolin, and Zhe Wang, “Detection of LSB Steganography via Sample Pair Analysis”, In LNCS vol. 2578, Springer-Verlag, New York, pp. 355–372, 2003.
  4. H. Farid and L. Siwei, “Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines”, In LNCS vol. 2578, Springer-Verlag, New York, pp. 340–354, 2003.
  5. J. Fridrich, M. Goljan, and R. Du, “Steganalysis based on JPEG compatibility”, SPIE Multimedia Systems and Applications IV, Denver, CO, August 20−24, 2001.
  6. J. Fridrich, M. Goljan, and R. Du, “Detecting LSB Steganography in Color and Gray-Scale Images”, Magazine of IEEE Multimedia, Special Issue on Security, October-November issue, pp. 22–28, 2001.
  7. N. Provos and P. Honeyman, “Detecting Steganographic Content on the Internet”, CITI Technical Report 01-11, 2001.
  8. A. Westfeld and A. Pfitzmann, “Attacks on Steganographic Systems”, In: LNCS vol.1768, Springer-Verlag, Berlin, pp. 61−75, 2000.
  9. Steganography software for windows, http://members.tripod.com/steganography/stego/software.html

Keywords

LSB, Steganography