CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Survey Paper of Encrypted Data Hiding using Skin Tone Detection

by Rekha D. Kalambe, Rakesh Pandit, Sachin Patel
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 79 - Number 5
Year of Publication: 2013
Authors: Rekha D. Kalambe, Rakesh Pandit, Sachin Patel
10.5120/13735-1533

Rekha D. Kalambe, Rakesh Pandit, Sachin Patel . Survey Paper of Encrypted Data Hiding using Skin Tone Detection. International Journal of Computer Applications. 79, 5 ( October 2013), 6-10. DOI=10.5120/13735-1533

@article{ 10.5120/13735-1533,
author = { Rekha D. Kalambe, Rakesh Pandit, Sachin Patel },
title = { Survey Paper of Encrypted Data Hiding using Skin Tone Detection },
journal = { International Journal of Computer Applications },
issue_date = { October 2013 },
volume = { 79 },
number = { 5 },
month = { October },
year = { 2013 },
issn = { 0975-8887 },
pages = { 6-10 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume79/number5/13735-1533/ },
doi = { 10.5120/13735-1533 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:52:12.607157+05:30
%A Rekha D. Kalambe
%A Rakesh Pandit
%A Sachin Patel
%T Survey Paper of Encrypted Data Hiding using Skin Tone Detection
%J International Journal of Computer Applications
%@ 0975-8887
%V 79
%N 5
%P 6-10
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Steganography is the skill of hiding the existence of data in other transmission medium to attain secret communication. It does not restore cryptography but quite boost the security using its abstruse features. In this paper we have surveyed on a Steganography and cryptography techniques which provide highly secure skin tone data hiding. Biometric characteristic used to apply steganography is skin tone region of images. Here important data is implanted within skin region of image which will give an outstanding secure location for data hiding. For this skin tone detection is need to be performed. Different steps of data hiding can be applied by cropping an image interactively. Cropping of an image improved security than hiding data without cropping the whole image, so cropped region works as a key at decoding region. Cryptography algorithm is used to convert the secret messages to an unreadable form before embedding; which provides a strong backbone for data security. This survey paper focuses on illuminating the technique to secure data or message with authenticity and non repudiation. So with this object oriented steganogaphy we track skin tone objects in image with the higher security and satisfactory PSNR . Modern steganography's goal is to keep its mere presence undetectable.

References
  1. Bernhard Fink, K. G. , Matts, and P. J. : "Visible skin color distribution plays a role in the perception of age, attractiveness, and health in female faces. "Evolution and Human Behavior 27(6) (2006) 433–442
  2. Anjali A. Shejul, Umesh L. Kulkarni "A Secure Skin Tone based Steganography Using Wavelet Transform"
  3. Crystal Muang and Dunxu Hu "Skin Detection - a Short Tutorial" Department of Computer Science, Rutgers University, Piscataway, NJ, 08902, USA
  4. https://en. wikipedia. org/wiki/HSL_and_HSV
  5. http://en. wikipedia. org/wiki/Cropping_(image)
  6. Abbas Cheddad, Joan Condell, Kevin Curran and Paul Mc Kevitt, "Securing Information Content using New Encryption Method and Steganography"
  7. petit colas, F. A. P. : "Introduction to Information Hiding". In: Katzenbeisser, S and Petit colas, F. A. P (ed. ) (2000) Information hiding Techniques for Steganography and Digital Watermarking. Norwood: Artech House, INC.
  8. Johnson, N. F. and Jajodia, S. : "Exploring Steganography: Seeing the Unseen. " IEEE Computer, 31 (2): 26-34, Feb 1998.
  9. Chang, C. C. , Chen, T. S and Chung, L. Z. ,"A steganographic method based upon JPEG and quantization table modification," Information Sciences, vol.
  10. , pp. 123-138(2002).
  11. Yang, Wan, Liao Xiaofeng. , Xiao Di. , and Wong Kwok-Wo. (2008). One-way hash function construction based on 2D coupled map lattices. Journal of Information Sciences 178 (2008) 1391- 1406
  12. Aruna Mittal, "Object Oriented Steganography using Skin Tone Detection and RSA Encryption Scheme".
Index Terms

Computer Science
Information Sciences

Keywords

Setganography data hiding skin Tone detection cryptography digital watermarking