CFP last date
21 October 2024
Reseach Article

Data Hiding Algorithm using Variable Block Size in Cover Image File

by Prasita Mukherjee, Sourasekhar Banerjee, Asoke Nath
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 89 - Number 13
Year of Publication: 2014
Authors: Prasita Mukherjee, Sourasekhar Banerjee, Asoke Nath
10.5120/15690-4559

Prasita Mukherjee, Sourasekhar Banerjee, Asoke Nath . Data Hiding Algorithm using Variable Block Size in Cover Image File. International Journal of Computer Applications. 89, 13 ( March 2014), 11-20. DOI=10.5120/15690-4559

@article{ 10.5120/15690-4559,
author = { Prasita Mukherjee, Sourasekhar Banerjee, Asoke Nath },
title = { Data Hiding Algorithm using Variable Block Size in Cover Image File },
journal = { International Journal of Computer Applications },
issue_date = { March 2014 },
volume = { 89 },
number = { 13 },
month = { March },
year = { 2014 },
issn = { 0975-8887 },
pages = { 11-20 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume89/number13/15690-4559/ },
doi = { 10.5120/15690-4559 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:09:08.411012+05:30
%A Prasita Mukherjee
%A Sourasekhar Banerjee
%A Asoke Nath
%T Data Hiding Algorithm using Variable Block Size in Cover Image File
%J International Journal of Computer Applications
%@ 0975-8887
%V 89
%N 13
%P 11-20
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Data hiding inside any standard or non standard cover file is now a common area of interest across the globe. Nath et al already developed several methods for hiding any secret message inside any standard or non standard cover file. In the present work the authors have introduced a new method of hiding any kind of small secret message such as text, image, audio file inside any cover file which is mainly . bmp file. The authors divide the entire cover file into number of blocks and then inserted the bits of the secret file after a series of shift operations on them in the RGB components of pixels of cover image file. After inserting any secret message inside a cover file it was found that there is no significant change in the stego file. The shifting operation on the bits of the secret file in addition to the random generation of blocks, and processing them in an order, where a definite number of bits of the secret file to embed are reserved for each block will make the entire process fully secured. The size of the cover image should be at least 10-20 times larger than the secret message file so that the entire process should be almost unbreakable.

References
  1. Data Hiding and Retrieval : AsokeNath, Sankar Das, AmlanChakraborti, published in IEEE"Proceedings of International Conference on Computational Intelligence and Communication.
  2. Advanced steganographic approach for hiding encrypted secret message in LSB, LSB+1, LSB+2 and LSB+3 bits in non standard cover files: JoyshreeNath, Sankar Das, Shalabh Agarwal and AsokeNath, International Journal of Computer Applications, Vol14-No. 7,Page-31-35, Feb(2011).
  3. Advanced Steganography Algorithm using encrypted secret message : Joyshree Nath and AsokeNath International Journal of Advanced Computer Science and Applications, Vol-2, No-3, Page-19-24, March(2011).
  4. A Challenge in hiding encrypted message in LSB and LSB+1 bit positions in any cover files: executable files, Microsoft office files and database files, image files, audio files and video files: JoyshreeNath, Sankar Das, Shalabh Agarwal and AsokeNath: JGRCS, Vol-2,No. 4,Page:180-185,April (2011).
  5. New Data Hiding Algorithm in MATLAB using Encrypted secret message: Agniswar Dutta, Abhirup Kumar Sen , Sankar Das , Shalabh Agarwal and AsokeNath : Proceedings of IEEE CSNT-2011 held at SMVDU(Jammu) 03-06 June2011,Page262- 267(2011).
  6. An efficient data hiding method using encrypted secret message obtained by MSA algorithm: JoyshreeNath, MeheboobAlamMallik , Saima Ghosh and AsokeNath: Proceedings of the International conference Worldcomp 2011 held at Las Vegas(USA), 18-21 Jul(2011), Page 312-318, Vol-1(2011).
  7. A new randomized data hiding algorithm with encrypted secret message using modified generalized Vernam Cipher Method: RAN-SEC algorithm, Rishav Ray, JeeyanSanyal, Tripti Das, KaushikGoswami, Sankar Das and AsokeNath, Proceedings of IEEE International conference: World Congress WICT-2011 held at Mumbai University 11-14 Dec, 2011, Page No. 1215-1220 (2011).
  8. A new Challenge of hiding any encrypted secret message inside any Text/ASCII file or in MS word file : RJDA Algorithm, Rishav Ray, JeeyanSanyal, Debanjan Das and AsokeNath, Proceedings of IEEE CSNT-2012 conference held at Rajkot May 11-13, 2012, Page:889- 893(2012).
  9. A new data hiding algorithm with encrypted secret message using TTJSA symmetric key crypto system,SayakGuha, Tamodeep Das, Saima Ghosh,JoyshreeNath, Sankar Das, AsokeNath,Journal of Global Research in Computer Science, Vol 3, No. 4, Page-11-16(2012).
  10. Advanced Digital Steganography using Encrypted Secret Message and Encrypted Embedded Cover File, Joyshree Nath, Saima Ghosh and AsokeNath, International Journal of Computer Applications(IJCA0975-8887), Vol 46, No-14, May ,(2012).
  11. Advanced Steganography Algorithm Using Randomized Intermediate QR Host Embedded with Any Encrypted Secret Message : ASA_QR Algorithm, Somdipdey, KalyanMondal, JoyshreeNath, AsokeNath, International Journal of Modern Education and Computer Science, No. 6, Page 59-67, 2012.
  12. Data hiding algorithm using two-way encryption and embedding in a cover file – A new method for sending password or confidential message, JoyshreeNath ,Saima Ghosh and AsokeNath, Proceedings ofInternational Conference Worldcomp 2012 at lasVegas, USA,IPCV-12, Page-414-420(2012).
  13. A New Technique to Hide Encrypted Data in QRCodesTM, SomdipDey, JoyshreeNath and AsokeNath,Proceedings of International Conference Worldcomp 2012 held at Las Vegas, USA, ICOMP-12, Page-94,101(2012).
Index Terms

Computer Science
Information Sciences

Keywords

data hiding audio file stego file secret file pixels