Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

An Image based Steganography Scheme Implying Pseudo-Random Mapping of Text Segments to Logical Region of Cover Image using a New Block Mapping Function and Randomization Technique

Print
PDF
International Journal of Computer Applications
© 2012 by IJCA Journal
Volume 50 - Number 2
Year of Publication: 2012
Authors:
Shiladitya Pujari
Sripati Mukhopadhyay
10.5120/7746-0799

Shiladitya Pujari and Sripati Mukhopadhyay. Article: An Image based Steganography Scheme Implying Pseudo-Random Mapping of Text Segments to Logical Region of Cover Image using a New Block Mapping Function and Randomization Technique. International Journal of Computer Applications 50(2):40-46, July 2012. Full text available. BibTeX

@article{key:article,
	author = {Shiladitya Pujari and Sripati Mukhopadhyay},
	title = {Article: An Image based Steganography Scheme Implying Pseudo-Random Mapping of Text Segments to Logical Region of Cover Image using a New Block Mapping Function and Randomization Technique},
	journal = {International Journal of Computer Applications},
	year = {2012},
	volume = {50},
	number = {2},
	pages = {40-46},
	month = {July},
	note = {Full text available}
}

Abstract

This paper presented a new scheme of image based Steganography where the secret message is divided or segmented into random number of units holding equal number of characters and the cover image is logically divided into a random number of square blocks. Each logical block of image is used to hide each unit of message in a pseudo-random fashion. These mappings are done by using a new mapping function.

References

  • Huang W, Zhao Y and Rong-Rong Ni, Block-based Adaptive Image Steganography using LSB Matching Revisited, Journal of Electronic Science and Technology, Vol. 9 (4), 2011
  • Luo W, Huang F and Huang J, Edge Adaptive Image Steganography Based on LSB Matching Revisited, IEEE Transaction on Information Forensics and Security, Vol. 5 (4), June 2010.
  • Yang C and Wang S, Transforming LSB Substitution for Image-based Steganography in Matching Algorithms, Journal of Information Science and Engineering 26, 1199-1212, 2010.
  • Shiva Kumar K B, Raja K B, Chhotaray R K, Pattanaik S, Bit Length Replacement Steganography Based On DCT Coefficients, International Journal of Engineering Science and Technology, Vol. 2 (8), 3561-3570, 2010.
  • T Mrkel, JHP Eloff and MS Olivier. "An Overview of Image Steganography," in proceedings of the fifth annual Information Security South Africa Conference, 2005.
  • L. Y. Por and B. Delina, "Information Hiding: A New Approach in Text Steganography", 7th WSEAS International Conference on Applied Computer & Applied Computational Science, April 2008, pp- 689-695.
  • Analysis of LSB Based Image Steganography Techniques ,R. Chandramouli, Nasir Memon, Proc. IEEE ICIP, 2001.
  • J. Y. Hsiao. C. C. Chang. and C. -S. Chan. Finding optimal least significant- bit substitution in image hiding by dynamic programming strategy. Pattern Recognition, 36:1583–1595, 2003.
  • Potdar V. and Chang E. Gray level modification steganography for secret communication. In IEEE International Conference on Industria lInformatics, pages 355–368, Berlin, Germany, 2004.
  • Potdar V. and Chang E. Gray level modification steganography for secret communication. In IEEE International Conference on Industria lInformatics, pages 355–368, Berlin, Germany, 2004.