CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Divide and Conquer Steganography Model

by V. Raja, S. Rajalakshmi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 91 - Number 15
Year of Publication: 2014
Authors: V. Raja, S. Rajalakshmi
10.5120/15960-5356

V. Raja, S. Rajalakshmi . Divide and Conquer Steganography Model. International Journal of Computer Applications. 91, 15 ( April 2014), 38-44. DOI=10.5120/15960-5356

@article{ 10.5120/15960-5356,
author = { V. Raja, S. Rajalakshmi },
title = { Divide and Conquer Steganography Model },
journal = { International Journal of Computer Applications },
issue_date = { April 2014 },
volume = { 91 },
number = { 15 },
month = { April },
year = { 2014 },
issn = { 0975-8887 },
pages = { 38-44 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume91/number15/15960-5356/ },
doi = { 10.5120/15960-5356 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:12:51.624760+05:30
%A V. Raja
%A S. Rajalakshmi
%T Divide and Conquer Steganography Model
%J International Journal of Computer Applications
%@ 0975-8887
%V 91
%N 15
%P 38-44
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Steganography is one of the vital topics in the field of information security. In this paper we propose, a new Steganography algorithm that generates and brings out steganographic secret information hidden in images. In the proposed algorithm, the cover image is partitioned into four non overlapping blocks and the confidential data bits are also divided. The data bits are embedded in scattered way into the four blocks. In each pixel either single colour channel or two colour channels are used to embed the confidential data bits depending upon the size of the data bits. The proposed method generates low MSE value and high PSNR value. The experimental outcome shows, the algorithm can overcome drawbacks of many existing algorithms.

References
  1. Rabah Kefa, "Steganography-The Art of Hiding Data", Information Technology Journal 3 (3), 2004, 245-269.
  2. N. Provos, P. Honeyman, "Hide and seek: an introduction to Steganography", IEEE Security & Privacy Magazine 1 ,2003,32–44.
  3. W. Bender, W. Butera, D. Gruhl, R. Hwang, F. J. Paiz, S. Pogreb, "Applications for data hiding", IBM Systems Journal 39 (3&4) ,2000, 547–568.
  4. Mehdi Kharrazi, Husrev T. Sencar, and Nasir Memon, "Image Steganography: Concepts and Practice" ,WSPC/Lecture Notes Series, 2004.
  5. Hans Sagan, "Space-Filling Curves", Springer-Verlag, New York, 1994.
  6. W. Bender, D. Gruhl, N. Morimoto, "A. Lu, Techniques for data hiding", IBM Systems Journal 35 (3&4) ,1996, 313–336.
  7. R. Amitharajan,J. B. BalaguruRayappan , "An intelligent chaotic embedding approach to enhance stego-image quality", information science Volume 193, 2012, Pages 115–124.
  8. B. Karthikeyan,S. Ramakrishnan,V. Vaithiyanathan,S. Sruti,M. Gomathymeenakshi,"An Improved Steganographic Technique Using LSB Replacement on a Scanned Path Image", International Journal of Network Security, 15(1), 2013, 314-318.
  9. V. Tyagi, A. Kumar, R. Patel, S. Tyagi, S. S. Gangwar,"Image Steganography using Least Significant Bit with Cryptography", Journal of Global Research in Computer Science, 3(3), 2012, 53-55.
  10. V. Reddy, A. Subramanyam and P. Reddy, "Implementation of LSB steganography and it's evaluation for various file formats", International Journal of Advanced Networking & Applications, 2011,vol. 2, no. 5, 868-872.
  11. A. Westfeld E. J. Delp, III, P. W. Wong (Eds), "Space filling curves in steganalysis, in Security, Steganography and Watermarking of Multimedia Contents", VII SPIE 5681, 2005, pp. 28–37.
  12. N. Tiwari, M. Shandilya, "Evaluation of Various LSB based Methods of Image Steganography on GIF File Format", International Journal of Computer Applications, 6(2), 2010, 1-4.
  13. H. B. Kekre, Archana Athawale and Pallavi N. Halarnkarg, "Increased Capacity of Information Hiding in LSB's Method for Text and Image", International Journal of Electrical, Computer and Systems Engineering, 2008, pp. 246-249.
  14. C. H. Yang, "Inverted pattern approach to improve image quality of information hiding by LSB substitution", Pattern Recognition 41 2008, 2674–2683.
  15. C. M. Wang, N. I. Wu, C. S. Tsai, M. S. Hwang, "A high quality steganography method with pixel-value differencing and modulus function", Journal of System and Software 81 2008,150–158.
  16. C. K. Chan, L. M. Chen, "Hiding data in images by simple LSB substitution", Pattern Recognition 37 (3) 2004,469–474.
  17. C. C. Thien, J. C. Lin, "A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function", Pattern Recognition 36 (11) ,2003, 2875–2881.
  18. C. C. Chang, T. S. Chen, L. Z. Chung, "A steganographic method based upon JPEG and quantization table modification", Information Sciences 141, 2002, 123–138.
  19. Chin-Chen Chang, Pei-Yan Pai, Chia-Ming Yeh, Yung-Kuan Chan, "A high payload frequency-based reversible image hiding method", Information Sciences 180,2010, 2286–2298.
  20. Chin-Chen Chang, The Duc Kieu, "A reversible data hiding scheme using complementary embedding strategy", Information Sciences 180 ,2010, 3045– 3058.
  21. F. Zhang, Z. Pan, K. Cao, F. Zheng, F. Wu, "The upper and lower bounds of the information-hiding capacity of digital images", Information Sciences 178 (14–15),2008, 2950–2959.
  22. Tse-Hua Lan and Ahmed H. Tewfik, "A Novel High-Capacity Data-Embedding System", IEEE Transactions on Image Processing, Vol. 15, 2006, pp. 2431-2440.
  23. Young-Ran Park, Hyun-Ho Kang, Sang-Uk Shin, Ki-Ryong Kwon, "An image steganography using pixel characteristics", CIS 2005, Part II, LNAI, vol. 3802, Springer-Verlag, Berlin Heidelberg, 2005, pp. 581–588.
  24. M. Singh, R. Sharma, D. Garg, "A New Purposed Issue for Secure Image Steganography Technique Based On 2-D Block DCT and DCT", International Journal of Advanced Research in Computer Science and Software Engineering, 2(7), 2012, 29-34.
  25. Po-Yueh Chen, Hung-Ju Lin, "A DWT based approach for image Steganography", International Journal of Applied Science and Engineering ,2006, 275–290.
  26. Tolba, M. F. ; Ghonemy, M. A. -S. ; Taha, I. A. -H. ; Khalifa,A. S. , "High Capacity Image Steganography using Wavelet-Based Fusion",Computers and Communications, 2004. Proceedings, ISCC 2004. Ninth International Symposium on Volume, Issue, 28 June-1 July 2004 ,Vol. 1, 430-435.
  27. R. González and R. Woods, "Digital image processing", 2008, Prentice Hall.
  28. Owens, M. , "A discussion of covert channels and Steganography", SANS Institute, 2002.
  29. Silman, J. , "Steganography and Steganalysis: An Overview", SANS Institute, 2001.
  30. Johnson, N. F. and S. Jajodia, "Exploring steganography: Seeing the unseen", IEEE Computer, 31, 1998, 26-34.
  31. Tuomas Aura, "Practical invisibility in digital communication", Proceedings of the Workshop on Information Hiding, LNCS 1174, 1996, pp. 265–278.
  32. Bruice Schneier, "Applied Cryptography Protocols", second ed. , Algorithm and Source Code in C, Wiley India Edition, 2007.
  33. Stefan Katzenbeisser, Fabien A. P. Petitcolas:, "Information Hiding Techniques for Steganography and Digital Watermarking", Artech House,Inc, 2000.
  34. F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, "Information hiding—a survey", Proc. IEEE, vol. 87, no. 7,1999, pp. 1062–1078.
  35. W. Bender, W. Butera, D. Gruhl, R. Hwang, F. J. Paiz, S. Pogreb, "Applications for data hiding" , IBM Systems Journal 39 (3&4),2000 547–568.
  36. Xiang-Yang Luo, Dao-Shun Wang, Ping Wang, Fen-Lin Liu, "A review on blind detection for image Steganography", Signal Processing 88,2008, 2138–2157.
  37. F. Zhang, Z. Pan, K. Cao, F. Zheng, F. Wu, "The upper and lower bounds of the information-hiding capacity of digital images", Information Sciences 178(14–15),2008, 2950–2959.
  38. William Stallings, Cryptography and Network Security Principles and Practices 2013, Prentice Hall.
Index Terms

Computer Science
Information Sciences

Keywords

Steganography MSE PSNR