CFP last date
20 May 2024
Reseach Article

A Relevant Technique of Hiding Information in an image using Shared Cryptography

by Boina Avinash Kumar, Madhusmita Das, Madhusmita Sahu
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 69 - Number 18
Year of Publication: 2013
Authors: Boina Avinash Kumar, Madhusmita Das, Madhusmita Sahu
10.5120/12070-8145

Boina Avinash Kumar, Madhusmita Das, Madhusmita Sahu . A Relevant Technique of Hiding Information in an image using Shared Cryptography. International Journal of Computer Applications. 69, 18 ( May 2013), 12-20. DOI=10.5120/12070-8145

@article{ 10.5120/12070-8145,
author = { Boina Avinash Kumar, Madhusmita Das, Madhusmita Sahu },
title = { A Relevant Technique of Hiding Information in an image using Shared Cryptography },
journal = { International Journal of Computer Applications },
issue_date = { May 2013 },
volume = { 69 },
number = { 18 },
month = { May },
year = { 2013 },
issn = { 0975-8887 },
pages = { 12-20 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume69/number18/12070-8145/ },
doi = { 10.5120/12070-8145 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:30:50.390010+05:30
%A Boina Avinash Kumar
%A Madhusmita Das
%A Madhusmita Sahu
%T A Relevant Technique of Hiding Information in an image using Shared Cryptography
%J International Journal of Computer Applications
%@ 0975-8887
%V 69
%N 18
%P 12-20
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Steganography is the art and science of hidden writing. The purpose of steganography is covert communication to hide the existence of a message from an intermediate attacker . This paper will discuss about pure steganographic technique, which does not require prior exchange of data like shared-keys. The proposed technique use a secure mask generation technique and the masking of original data repeatedly generate shares. These shares of secret data are embedded using an irreversible stegonographic technique in cover image called stego image, which is sent to receiver node.

References
  1. F. A. P. Petitcalas, R. J. Anderson and M. G. Kuhn. "Information Hiding – A Survey". Proceedings of the IEEE Special issue on Protection of Multimedia Content. 87(7). 1062-1078. July 1999. DOI:10. 1109/5. 771065.
  2. D. Kahn. "The Code Breakers- The Story of Secret Writing". New York U. S. A: Scrinber. 1996. ISBN 0-684-83130-9.
  3. Madhusmita Das, MahamayaMohanty, "Hiding relevant information in an image" Information Processing and ManagementCommunications in Computer and Information Science Volume 70, 2010, pp 501-504 .
  4. AlkhraisatHabes. "Information Hiding in BMP image implementation, Analysis and evaluation", Information Transmissions In Computer Networks - 2006,.
  5. Abhijit Das, SoumyaSankarBasu, AtalChaudhuri, "A Novel Security Scheme for Wireless Adhoc Network", 978-1-4577-0787-2/11 IEEE 2011.
  6. Almohammad, A. , and Ghinea, G. , (2010). "Stego Image Quality and the Reliability of PSNR". International Conference on Image Processing Theory, Tools and Applications (IPTA 2010), Paris, France, 7-10 July, 2010, 215-220, IEEE.
  7. Yuan-Hui Yu, Chin-Chen Chang, Iuon-Chang Lin,A new steganographic method for color and grayscale image hiding. JournalComputer Vision and Image Understanding, Volume 107, Issue 3, September 2007, Pages 183–194
  8. W. Bender, D. Gruhl and N. Morimoto, A. Lu. "Techniques for Data Hiding" Tech. Report. Mit Media Lab. 1994.
  9. W. Bender, D. Gruhl, N. Morimoto, A. Lu. "Techniques for Data Hiding". IBM Systems Journal. Vol 35, issue 3-4, 1996. 313-336. ISSN: 0018-8670.
  10. R. H. Alwan, F. J. Kadhim, A. T. Al-Taani. "Data Embedding Based on Better Use of Bits in Image Pixels". International Journal of Signal Processing. Volume. 2, Number. 1, 2005. pp: 104-107. ISSN: 1304-4494.
  11. A. T. Al-Taani, A. M. Al-Issa. "A Novel Steganographic Method for Gray-Level Images". International Journal of computer, Information, and systems Science and Engeering. 3:1. 2009. pp:5-10 ISSN:2070-3732.
  12. Eric Cole. "Hiding in plain sight". Wiley Publishing,Indianapolis,Indiana,2003.
  13. Y. Desmedt "Some recent research aspects of threshold cryptography" Proc of ISW. 97 1st International Information Security Workshop vol. 1196 of LNCS pp 158-173 Springer-Verlag 1997.
  14. A. Shamir: "How to share a secret?" Communications ACM, 22(11): pp612-613, 1979.
Index Terms

Computer Science
Information Sciences

Keywords

Shared Cryptography Masking Stegonography Image Stegonography Digital Steganography