CFP last date
20 May 2024
Reseach Article

Enhanced Bandwidth Utilization in Image Steganography with Enhanced Data Security

by Balkrishan, Amar Partap Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 84 - Number 11
Year of Publication: 2013
Authors: Balkrishan, Amar Partap Singh
10.5120/14622-2954

Balkrishan, Amar Partap Singh . Enhanced Bandwidth Utilization in Image Steganography with Enhanced Data Security. International Journal of Computer Applications. 84, 11 ( December 2013), 31-37. DOI=10.5120/14622-2954

@article{ 10.5120/14622-2954,
author = { Balkrishan, Amar Partap Singh },
title = { Enhanced Bandwidth Utilization in Image Steganography with Enhanced Data Security },
journal = { International Journal of Computer Applications },
issue_date = { December 2013 },
volume = { 84 },
number = { 11 },
month = { December },
year = { 2013 },
issn = { 0975-8887 },
pages = { 31-37 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume84/number11/14622-2954/ },
doi = { 10.5120/14622-2954 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:00:40.214358+05:30
%A Balkrishan
%A Amar Partap Singh
%T Enhanced Bandwidth Utilization in Image Steganography with Enhanced Data Security
%J International Journal of Computer Applications
%@ 0975-8887
%V 84
%N 11
%P 31-37
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper, a new method is proposed for image steganography that involves double encryption as well as compression of a message followed by its subsequent hiding in a digital image. The proposed method enhances bandwidth utilization besides ensuring three layered security to the message. The underlying principle of this method involves decomposition of each image-pixel into two blocks. One block is called Parity Reflecting Block (PRB) whereas other is known as Pixel Adjustment Block (PAB). The information about hidden bit is reflected by parity condition in the Parity Reflecting Block. The Pixel Adjustment Block is used to perform local pixel adjustment in order to reduce the degradation effect in the cover image produced as a result of alteration in the moderate bit. The performance of the proposed algorithm is evaluated in terms of Image Quality Measures (IQM) including Mean Square Error (MSE), Peak-Signal-to-Noise Ratio (PSNR), Entropy, Correlation, Mean Value and Standard Deviation. Security analysis is also carried by comparing the histograms of the cover and stego-images. The results of this study are quite promising.

References
  1. Forouzan. B. A. , Cryptography and Network Security. 4th ed. Publisher: McGraw-Hill Higher Education, 2008.
  2. Vinoly Seromony, "Image encryption and compression using number theoretic paradigm", GSPx Conference, (April 2003).
  3. W. B. Pennebaker, J. Mitchell, "JPEG still image compression standard", New York, Van Nostrand Reinhold, edition (2001).
  4. V. Jagannathan, A. Mahadevan, R. Hariharan and E. Srinivasan, "Number Theory Based Image Compression Encryption and Application to Image Multiplexing", IEEE - ICSCN 2007, MIT Campus, Anna University, Chennai, India. Feb. 22-24, (2007), pp. 59-64.
  5. Neil F. Johnson and Sushil Jajodia, "Exploring steganography seeing the unseen", IEEE Computer, (February 1998), pp. 26-34.
  6. R. J. Anderson and F. A. P. Petitcolas, "On the limits of the steganography", IEEE Journal Selected Areas in Communications, (2001), 16(4), pp. 474-481.
  7. F. A. P. Petitcolas, R. J. Anderson and M. G. Kuhn, "Information Hiding–A Survey", Proceedings of IEEE, (July 1999), vol. 87 pp. 1062-1078.
  8. K. B. Raja, C. R. Chowdary, R. K. Venugopal, L. M. Patnaik, "A Secure Image Steganography using LSB, DCT and Compression Techniques on Raw Images", Proceedings of IEEE, (2005), pp. 171-176.
  9. Westfeld A. , "Steganography for Radio Amateurs-A DSSS Based Approach for Slow Scan Television", LNCS 4437, Springer-Verlag Berlin Heidelberg, 2007, pp. 201-215.
  10. Y. K. Lee and L. H. Chen, "A high capacity image steganographic model", In IEE Vision, Image and Signal Processing, (2000), 147(3), pp. 288-294.
  11. Michael Backes, "A cryptographically sound Dolev Yao style security proof of the Otway-Rees protocol", In Proceedings of the 9th European Symposium on Research in Computer Security (ESORICS), vol. 3193, Springer Verlag, Berlin Germany, (September 2004), pp. 89-108.
  12. L. M. Marvel, C. G. Boncelet, and C. T. Retter, "Spread spectrum image steganography", IEEE Transactions on Image Processing, vol. 8, Aug. (1999), pp. 1075–1083.
  13. Xin Li, Hong-heather Yu, "Transparent and Robust Audio Data Hiding in Spectrum Domain", IEEE International Conference on Multimedia and Expo (ICME), NY, USA, (2 August 2000).
  14. Chin-Chen Chang, Chi-Shiang Chan,Yi-Hsuan Fan, "Image hiding scheme with modulus function and dynamic programming strategy on partitioned pixels," Pattern Recognition, vol. 39, (2006), pp. 1155-1167.
  15. Balkrishan and Amar Partap Singh, "Hiding Encrypted Data using Randomly Chosen Moderate Bit Insertion in Digital Image Steganography", Journal of Computer Science and Engineering, vol. 1, issue 2, (June 2010), pp. 21-27.
  16. Jindal B, Singh AP (2013) Camouflaging in Digital Image for Secure Communication. J. IE(I)-Springer: Electrical, Electronics & Telecommunication and Computer Engineering DOI 10. 1007/s40031-013-0050-3.
  17. Gonzalez R C and Woods R E. Digital Image Processing. Pearson Education, (2003).
Index Terms

Computer Science
Information Sciences

Keywords

Data Hiding Chinese Remainder Theorem Crypto-Compressed-Data Flexible Matrix Parity