CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

A Session based Spatial Domain Multiple Image Hiding Technique using Variable Bit Replacement and Multiple Passwords

by Tanmay Bhattacharya, Bikash Debnath, S. R. Bhadra Chaudhuri
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 56 - Number 13
Year of Publication: 2012
Authors: Tanmay Bhattacharya, Bikash Debnath, S. R. Bhadra Chaudhuri
10.5120/8951-3134

Tanmay Bhattacharya, Bikash Debnath, S. R. Bhadra Chaudhuri . A Session based Spatial Domain Multiple Image Hiding Technique using Variable Bit Replacement and Multiple Passwords. International Journal of Computer Applications. 56, 13 ( October 2012), 17-21. DOI=10.5120/8951-3134

@article{ 10.5120/8951-3134,
author = { Tanmay Bhattacharya, Bikash Debnath, S. R. Bhadra Chaudhuri },
title = { A Session based Spatial Domain Multiple Image Hiding Technique using Variable Bit Replacement and Multiple Passwords },
journal = { International Journal of Computer Applications },
issue_date = { October 2012 },
volume = { 56 },
number = { 13 },
month = { October },
year = { 2012 },
issn = { 0975-8887 },
pages = { 17-21 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume56/number13/8951-3134/ },
doi = { 10.5120/8951-3134 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:58:43.611332+05:30
%A Tanmay Bhattacharya
%A Bikash Debnath
%A S. R. Bhadra Chaudhuri
%T A Session based Spatial Domain Multiple Image Hiding Technique using Variable Bit Replacement and Multiple Passwords
%J International Journal of Computer Applications
%@ 0975-8887
%V 56
%N 13
%P 17-21
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

For hiding secret information in images, there exists a large variety of Steganography techniques. The least significant bit (LSB) insertion method is the most common and easiest method for embedding messages in an image in spatial domain but it has some limitations such as it is easier to understand using steganalysis, this limitation has been overcame in this work. This work intends to embed multiple images in a single cover image. Three images can be embedded within a single cover image in its three different color channels (RGB) and they are embedded in between least significant bit (LSB) and moderately significant bit (MdSB). Three different passwords which are later converted into keys are used for three different color channels. Three different keys of 64 elements are generated from three different passwords. The key consists of the position values of a colored channel of the cover image where the information of a grey image is embedded using variable bit replacement (VBR) technique. Three different channels are combined to form a stego image and later grey images are retrieved from the stego image similarly. This transition of password to key and also the dependency on key imposes greater security. Another important aspect is that the same stego image bears different meaning for different receiver.

References
  1. R. Chandramouli, Nasir Memon: "Analysis of LSB Based Image Steganography Techniques", Proc. IEEE ICIP, pp1019-1022, 2001.
  2. Dr. H. B. Kekre, Archana Athawale, Ms. Pallavi. N. Halarnkar: "Increased Capacity of Information Hiding in LSB's Method for Text and Image", International Journal of Electrical and Electronics Engineering 2:4 pp. 246-249, 2008
  3. Yang C and Wang S: "Transforming LSB Substitution for Image-based Steganography in Matching Algorithms", Journal of Information Science and Engineering 26, pp. 1199-1212, 2010.
  4. D. C. Wu and W. H. Tsai: "A steganographic method for images by pixel-value differencing," Pattern Recognition Letters, vol. 24, no. 9-10,pp. 1613-1626, 2003.
  5. H. C. Wu, N. I. Wu, C. S. Hwang: "Image steganographic scheme based on pixel-value differencing and LSB replacement methods", IEEE Proceedings: Vision, Image and Signal Processing, Vol. 152, Issue 5, pp. 611-615, Oct 2005
  6. V. Potdar, & Chang, E. , 2004: "Grey Level Modification Steganography for Secret Communication", Proceedings of IEEE Conference on Industrial Informatics, pp. 223-228, June 2004 Berlin.
  7. Tanmay Bhattacharya, Sandeep Bhowmik & S. R. Bhadra Chaudhuri: "A Steganographic Approach by using Session Based Stego-Key, Genetic Algorithm and Variable Bit Replacement Technique", International Conference on Computer and Electrical Engineering, pp-51-55, 2008.
  8. Ran-Zan Wang, Chi-Fang Lin and Ja-Chen Lin: "Hiding data in images by optimal moderately significant-bit replacement" Electronics Letters 7th December 2000 Vol. 36 No. 25, pp. 2069-2070.
Index Terms

Computer Science
Information Sciences

Keywords

Steganography Session based Multiple Keys Variable Bit Replacement (VBR) and Moderately Significant Bit (MdSB)