CFP last date
22 April 2024
Reseach Article

Enhancing the Security of SMMWB Image Steganography Technique by using the Linked List structure (Cover Package Method)

by Abdelmgeid Amin Ali, Bahgat Abdelhamid Abdellateef, Al - Hussien Seddik Saad
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 90 - Number 7
Year of Publication: 2014
Authors: Abdelmgeid Amin Ali, Bahgat Abdelhamid Abdellateef, Al - Hussien Seddik Saad
10.5120/15588-4348

Abdelmgeid Amin Ali, Bahgat Abdelhamid Abdellateef, Al - Hussien Seddik Saad . Enhancing the Security of SMMWB Image Steganography Technique by using the Linked List structure (Cover Package Method). International Journal of Computer Applications. 90, 7 ( March 2014), 38-43. DOI=10.5120/15588-4348

@article{ 10.5120/15588-4348,
author = { Abdelmgeid Amin Ali, Bahgat Abdelhamid Abdellateef, Al - Hussien Seddik Saad },
title = { Enhancing the Security of SMMWB Image Steganography Technique by using the Linked List structure (Cover Package Method) },
journal = { International Journal of Computer Applications },
issue_date = { March 2014 },
volume = { 90 },
number = { 7 },
month = { March },
year = { 2014 },
issn = { 0975-8887 },
pages = { 38-43 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume90/number7/15588-4348/ },
doi = { 10.5120/15588-4348 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:10:27.695065+05:30
%A Abdelmgeid Amin Ali
%A Bahgat Abdelhamid Abdellateef
%A Al - Hussien Seddik Saad
%T Enhancing the Security of SMMWB Image Steganography Technique by using the Linked List structure (Cover Package Method)
%J International Journal of Computer Applications
%@ 0975-8887
%V 90
%N 7
%P 38-43
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The rapid development of data transfer through the internet made it easier to send and receive gigabytes of data accurately. One of the most important factors of information technology and communication is the security of the information. For security purposes, the concept of steganography has been used. Steganography is a covert communication in which the existence of the message is not known to anyone other than the sender and the receiver. The secrecy is gained by hiding information in other information or carriers like audio, video, digital images etc. , but digital images are the most popular carriers, that's because a lot of reasons such as their frequency on the internet. In fact, there exists a large variety of image steganography techniques some are more complex than others and all of them have respective strong and weak points, because of these weak points this work has been proposed. This paper contains a new proposed method which can be applied on any previously proposed image steganography technique as a pre-processing step to be added before the embedding steps to make the technique achieves its goals and strengthen its weak points, this method is the "Cover Package" which briefly means instead of using only one cover image to hide the secret message, a lot of cover images or a package of cover images can be used.

References
  1. Nagham H. , Abid Y. , Badlishah A. and Osamah M. A. , "Image Steganography Techniques: An Overview", International Journal of Computer Science and Security (IJCSS), Vol. 6, Issue 3, 2012.
  2. Hemalatha S. , Dinesh A. , Renuka A. and Priya R. K. , "A Secure and High Capacity Image Steganography Technique", Signal & Image Processing : An International Journal (SIPIJ), Vol. 4, No. 1, February 2013.
  3. Archana S. , Antony J. and Dr. Kaliyamurthie K. P. , "A Novel Approach on Image Steganographic Methods for Optimum Hiding Capacity", International Journal Of Engineering And Computer Science, Vol. 2, Issue 2, Feb 2013.
  4. Samir K. B. and Suman C. , "Image Steganography Using DNA Sequence", Asian Journal Of Computer Science And Information Technology, Vol. 1, Issue 2, 2011.
  5. Mrs. Kavitha, Kavita K. , Ashwini K. and Priya D. , "Steganography Using Least Signicant Bit Algorithm", International Journal of Engineering Research and Applications (IJERA), Vol. 2, Issue 3, May-Jun 2012.
  6. Poornima R. and Iswarya R. J. , "An Overview of Digital Image Steganography", International Journal of Computer Science & Engineering Survey (IJCSES), Vol. 4, No. 1, February 2013.
  7. Ms. Sravanthi G. S. , Mrs. Sunitha D. , Riyazoddin S. M. and Janga R. , "A Spatial Domain Image Steganography Technique Based on Plane Bit Substitution Method", Global Journal of Computer Science and Technology Graphics & Vision, Vol. 12, Issue 15, Version 1. 0, 2012.
  8. Atallah M. A. , "A New Method in Image Steganography with Improved Image Quality", Applied Mathematical Sciences, Vol. 6, No. 79, 2012.
  9. Abdelmgeid A. A. and Al – Hussien S. S. , "Image Steganography Technique By Using Braille Method of Blind People (LSBraille)", International Journal of Image Processing (IJIP), Vol. 7, Issue 1, 2013.
  10. Vanmathi C. and Prabu S. , "A Survey of State of the Art techniques of Steganography", International Journal of Engineering and Technology (IJET), Vol. 5, No. 1, Feb-Mar 2013.
  11. Al-Hussien S. S. , "Enhancing the (MSLDIP) Image steganographic method (ESLDIP Method)", International Conference on Graphic and Image Processing (ICGIP 2011), Proc. of SPIE Vol. 8285, Issue 82853I, 2011.
  12. Abdelmgeid A. A. and Al – Hussien S. S. , "New Technique for Encoding the Secret Message to Enhance the Performance of MSLDIP Image Steganography Method (MPK Encoding)", International Journal of Computer Applications, Vol. 59, No. 15, December 2012.
  13. Abdelmgeid A. A. and Al – Hussien S. S. , "New Image Steganography Method by Matching Secret Message with Pixels of Cover Image (SMM)", International Journal of Computer Science Engineering and Information Technology Research (IJCSEITR), Vol. 3, Issue 2, Jun 2013.
  14. Shikha S. and Sumit B. , "Image Steganography: A Review", International Journal of Emerging Technology and Advanced, Vol. 3, Issue 1, January 2013.
  15. Abdelmgeid A. A. and Al – Hussien S. S. , "Enhancing SMM Image Steganography Method by using LSBraille Image Steganography Method (SMMWB; Secret Message Matching With Braille)", International Journal of Computer Applications, Vol. 70, No. 8, May 2013.
  16. Chincholkar A. A. and Urkude D. A. , "Design and Implementation of Image Steganography", Journal of Signal and Image Processing, Vol. 3, Issue 3, 2012.
  17. Chinchu E. A. and Iwin T. J. , "An Analysis of Various Steganographic Algorithms", International Journal of Advanced Research in Electronics and Communication Engineering (IJARECE). Vol. 2, Issue 2, February 2013.
  18. Rosziati I. and Teoh S. K. , "Steganography Imaging System (SIS): Hiding Secret Message inside an Image", Proceedings of the World Congress on Engineering and Computer Science (WCECS 2010), Vol. I, October 20-22, 2010.
  19. http://lib. bioinfo. pl/ ,"Elementary data structures: stacks, queues, lists", BioInfoBank Institute, 2010.
Index Terms

Computer Science
Information Sciences

Keywords

Spatial Domain Image Steganography Peak Signal-to-Noise Ratio (PSNR) Maximum Hiding Capacity (MHC).