CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

High Security Image Steganography with Modified Arnold's Cat Map

by Minati Mishra, Ashanta Ranjan Routray, Sunit Kumar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 37 - Number 9
Year of Publication: 2012
Authors: Minati Mishra, Ashanta Ranjan Routray, Sunit Kumar
10.5120/4636-6685

Minati Mishra, Ashanta Ranjan Routray, Sunit Kumar . High Security Image Steganography with Modified Arnold's Cat Map. International Journal of Computer Applications. 37, 9 ( January 2012), 16-20. DOI=10.5120/4636-6685

@article{ 10.5120/4636-6685,
author = { Minati Mishra, Ashanta Ranjan Routray, Sunit Kumar },
title = { High Security Image Steganography with Modified Arnold's Cat Map },
journal = { International Journal of Computer Applications },
issue_date = { January 2012 },
volume = { 37 },
number = { 9 },
month = { January },
year = { 2012 },
issn = { 0975-8887 },
pages = { 16-20 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume37/number9/4636-6685/ },
doi = { 10.5120/4636-6685 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:23:52.838906+05:30
%A Minati Mishra
%A Ashanta Ranjan Routray
%A Sunit Kumar
%T High Security Image Steganography with Modified Arnold's Cat Map
%J International Journal of Computer Applications
%@ 0975-8887
%V 37
%N 9
%P 16-20
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Information security is concerned with maintaining the secrecy, reliability and accessibility of data. The main objective of information security is to protect information and information system from unauthorized access, revelation, disruption, alteration, annihilation and use. This paper uses spatial domain LSB substitution method for information embedding and Arnold’s transform is applied twice in two different phases to ensure security. The system is tested and validated against a series of standard images and the results show that the method is highly secure and provides high data hiding capacity.

References
  1. Adhipathi Reddy and B.N.Chatterji.:A new wavelet based logo-watermarking scheme, Pattern Recognition Letters, 26:1019--1027, May 2005.
  2. A. Piva, M. Barni, F. Bartolini, and V. Cappellini.: DCT-based watermark recovering without resorting to the uncorrupted original image, In Proc. IEEE Int.Conf. Image Processing (ICIP 1997), 1997, pp.520-523.
  3. A.K. Jain: Fundamentals of Digital Image Processing, PHI, 2005.
  4. A.K.Jain and U.Uludag.: Hiding biometric data, IEEE Transaction on Pattern Analysis and Machine Intelligence, 25:1494--1498, Nov. 2003.
  5. B.Chand and D.D.Majumdar: Digital Image Processing and analysis, PHI, New Delhi, December, 2002.
  6. Changjiang Zhang et al., “Digital Image watermarking with Double encryption by Arnold Transform and Logistic”, Fourth International conference on Networked Computing & advanced information Management, pp. 329-334, 2008.
  7. C.Y.Lin and S.F.Chang.: A robust image authentication method distinguishing jpeg compression from malicious manipulation, IEEE Trans. On Circuits and Systems of Video Technology, 11:153--168, Feb. 2001.
  8. F. A. Petitcolas, R.Anderson, and M.Kuhn: Information hiding: A survey, Proceedings of the IEEE, July 1999, vol. 87, pp. 1062—1078
  9. G. C. Langelaar, I. Setyawan, and R. I. Lagendijk, “Watermarking Digital Image and Video Data,” in IEEE Signal Processing Magazine, pp. 20- 46, September, 2000.
  10. G. J. Yu, C. S. Lu, and H. Y. Liao.: Mean quantization-based fragile watermarking for image authentication, Optical Engineering, 40:1396--1408, July 2001.
  11. L. H. Chen, and J. J. Lin: Mean Quantization based Image Watermarking, in Image and Vision Computing, vol.21, pp. 717-727, August 2003.
  12. M.Barni, F.Bartolini, and A. Piva: Improved wavelet based watermarking through pixel-wise masking, in IEEE Trans. on Image Processing, vol.10, pp. 783-791, May 2001.
  13. M.Wu, “Joint security and robustness enhancement for quantization based data embedding,” in IEEE Trans. on Circuit and System for Video Technology, vol.13, pp. 831-841, August 2003.
  14. Manoj Kumar Meena et al., “Image Steganography tool using Adaptive Encoding Approach to maximize Image hiding capacity”, IJSCE, Vol.1, pp. 7-11, May 2011
  15. Minati Mishra et al.: Steganography: the art of Secret Messaging through Digital Images, Proceedings of National Conference on Computational Intelligence and its applications (NCCIA-2007), pp.104-113, July 2007.
  16. Neil F. Johnson: Steganography: Seeing the Unseen, George Mason University, http://www.iitc.com/stegdoc/sec202.html
  17. P.Meerwald, and A.Uhl.: A survey of wavelet-domain watermarking algorithms, in Proceedings of SPIE, Electronic Imaging, Security and Watermarking of Multimedia Contents III, vol. 4314, CA, USA, pp 505-516, January 2001.
  18. RC Gonzalez, RE Wood: Digital Image Processing, 2nd Ed, PHI, New Delhi, 2006.
Index Terms

Computer Science
Information Sciences

Keywords

Arnold’s cat map Encryption Cover image Decryption