CFP last date
22 April 2024
Reseach Article

Estimating the Secret Message in the Digital Image

by M. Sivaram D. Yuvaraj Amin Salih Mohamme V. Porkodi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 181 - Number 36
Year of Publication: 2019
Authors: M. Sivaram D. Yuvaraj Amin Salih Mohamme V. Porkodi
10.5120/ijca2019918329

M. Sivaram D. Yuvaraj Amin Salih Mohamme V. Porkodi . Estimating the Secret Message in the Digital Image. International Journal of Computer Applications. 181, 36 ( Jan 2019), 26-28. DOI=10.5120/ijca2019918329

@article{ 10.5120/ijca2019918329,
author = { M. Sivaram D. Yuvaraj Amin Salih Mohamme V. Porkodi },
title = { Estimating the Secret Message in the Digital Image },
journal = { International Journal of Computer Applications },
issue_date = { Jan 2019 },
volume = { 181 },
number = { 36 },
month = { Jan },
year = { 2019 },
issn = { 0975-8887 },
pages = { 26-28 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume181/number36/30268-2019918329/ },
doi = { 10.5120/ijca2019918329 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:08:20.393878+05:30
%A M. Sivaram D. Yuvaraj Amin Salih Mohamme V. Porkodi
%T Estimating the Secret Message in the Digital Image
%J International Journal of Computer Applications
%@ 0975-8887
%V 181
%N 36
%P 26-28
%D 2019
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper, a new method for estimating the secret message in the digital image. The actual concept involved in this paper is that the secret message is embedded into the cover image at random pixel in the last two positions of the LSB. Due to this technique, the length restriction of the LSB method of hiding the data is enhanced. Since the previous two bits of the Least Significant Bits are altered the possibility of having a substantial content of information is possible. This technique will overcome the problems faced by many other steganography techniques like LSB, Filtering, Masking, etc... In the face of having only short messages embedded into the image.

References
  1. R.J. Anderson and F.A.P. Petitcolas, “On the Limits of Steganography”, IEEE Journal of Selected Areas in Communications, Special Issue on Copyright and Privacy Protection, vol. 16(4), pp. 474−481, 1998.
  2. R. Chandramouli and N. Memon, “Analysis of LSB Based Image Steganography Techniques”, Proc. of ICIP 2001, Thessaloniki, Greece, October 7–10, 2001.
  3. S. Dumitrescu, Wu Xiaolin, and Zhe Wang, “Detection of LSB Steganography via Sample Pair Analysis”, In LNCS vol. 2578, Springer-Verlag, New York, pp. 355–372, 2003.
  4. H. Farid and L. Siwei, “Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines”, In LNCS vol. 2578, Springer-Verlag, New York, pp. 340–354, 2003.
  5. J. Fridrich, M. Goljan, and R. Du, “Steganalysis based on JPEG compatibility”, SPIE Multimedia Systems and Applications IV, Denver, CO, August 20−24, 2001.
  6. J. Fridrich, M. Goljan, and R. Du, “Detecting LSB Steganography in Color and Gray-Scale Images”, Magazine of IEEE Multimedia, Special Issue on Security, October-November issue, pp. 22–28, 2001.
  7. N. Provos and P. Honeyman, “Detecting Steganographic Content on the Internet”, CITI Technical Report 01-11, 2001.
  8. A. Westfeld and A. Pfitzmann, “Attacks on Steganographic Systems”, In: LNCS vol.1768, Springer-Verlag, Berlin, pp. 61−75, 2000.
  9. Steganography software for windows, http://members.tripod.com/steganography/stego/software.html
Index Terms

Computer Science
Information Sciences

Keywords

LSB Steganography