CFP last date
20 May 2024
Reseach Article

Image Block-based Steganography using Varying Size Approach

by Vikas Verma, Rishma Chawla
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 97 - Number 13
Year of Publication: 2014
Authors: Vikas Verma, Rishma Chawla
10.5120/17071-7505

Vikas Verma, Rishma Chawla . Image Block-based Steganography using Varying Size Approach. International Journal of Computer Applications. 97, 13 ( July 2014), 58-61. DOI=10.5120/17071-7505

@article{ 10.5120/17071-7505,
author = { Vikas Verma, Rishma Chawla },
title = { Image Block-based Steganography using Varying Size Approach },
journal = { International Journal of Computer Applications },
issue_date = { July 2014 },
volume = { 97 },
number = { 13 },
month = { July },
year = { 2014 },
issn = { 0975-8887 },
pages = { 58-61 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume97/number13/17071-7505/ },
doi = { 10.5120/17071-7505 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:24:04.013347+05:30
%A Vikas Verma
%A Rishma Chawla
%T Image Block-based Steganography using Varying Size Approach
%J International Journal of Computer Applications
%@ 0975-8887
%V 97
%N 13
%P 58-61
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The field of data hiding in digital image processing becomes important as the use of public networks such as the Internet becomes popular and activities of spam increases. Various methods have been proposed and implemented in data hiding. Steganography is one such way to increase the security of messages over the internet. The least significant is one of the methods used in steganography. While most methods work bit by bit value or pixel by pixel value to hide the data. The one disadvantage of such methods is that there is low percentage of data that can be hidden. In this paper, a new algorithm has been proposed that works on blocks of images that are found same or similar in other image. As in today era, the size of digital images are quite large as compared to images used in early years of digital processing and the images contain randomized pixel having blocks of different sizes and variations in colors. This leads to similarity of block of one image with part of other image of same domain and the same approach is used to hide an image inside another image. In this regard, blocks of hiding image are matched up to maximum size m*n with parts of cover image.

References
  1. Ghazanfari, K. , Ghaemmaghami, S. , Khosravi, S. R. , "LSB++: An improvement to LSB+ Steganography," TENCON 2011 -2011 IEEE Region 10 Conference, Bali, 2011, pp. 364-368.
  2. Katzenbeisser, S. , Sadeghi, A. Information Hiding, 11th International Workshop (2009) Darmstadt, Germany, June 8-10, 2009, Lecture Notes in Computer Science 5806, Springer.
  3. Moerland, T. (2009) Steganography and Steganalysis, Leiden Institute of Advanced Computing Science, www. liacs. nl/home/ tmoerl/privtech. pdf
  4. T Morkel, JHP Eloff and MS Olivier, "An Overview of Image Steganography," in Proceedings of the Fifth Annual Information Security South Africa Conference (ISSA2005), Sandton, South Africa, June/July 2005 (Published electronically).
  5. B. Pfitzmann, Information Hiding Termonology, Proc. First Int'l Workshop Information Hiding. Lecture Notes in Computer Science No. 1,174, Springer- Verlag, Berline, 1996, pp. 347-356.
  6. Wang, H and Wang, S, (2004) Cyber warfare: Steganography vs. Steganalysis, Communications of the ACM, 47:10, October 2004.
  7. Jamil, T. , (1999) Steganography: The art of hiding information is plain sight, IEEE Potentials, 18:01, 1999.
  8. H. B. Kekre, Sudeep D. Thepade, Ratnesh N. Chaturvedi, Block Based Information Hiding using Cosine, Hartley, Walsh and Haar Wavelets, International Journal of Advanced Computer Research (ISSN (print): 2249-7277 ISSN (online): 2277-7970) Volume-3 Number-1 Issue-9 March-2013.
  9. Dr. H. B. Kekre, Archana B. Patankar and Dipali Koshti "Performance Comparison of Simple Orthogo-Nal Transforms and Wavelet Transforms for Image Steganography", International Journal of Computer Applications (0975 – 8887) Volume 44– No. 6, April 2012.
  10. Abbas Cheddad, Joan Condell ,Kevin Curran, Paul McKevitt School of Computing and Intelligent Systems, Faculty of Computing and Engineering, University of Ulsterat Magee, London derry, BT487JL, Northern Ireland, UK Contents lists available at Science Direct journal homepage: www. elsevier. com/locate/sigpro Signal Processing.
  11. Yambin Jina Chanu, Themrichon Tuithung, Kh Manglem singh, "A Short Survey on Image Steganography and Steganalysis Technique," IEEE Trans. , 2012.
  12. Ge Huayong, Huang Mingsheng, Wang Qian, "Steganography and Steganalysis Based on Digital Image," IEEE Trans. International Congress on Image and Signal Processing, 2011, pp. 252-255.
  13. Johnson, N. F. & Jajodia, S. , "Exploring Steganography: Seeing the Unseen", Computer Journal, February 1998.
  14. Owens, M. , "A discussion of covert channels and steganography", SANS Institute, 2002.
  15. Vikas Verma, Poonam, Rishma Chawla, " An Enhanced Least Significant Bit Steganography Method Using Midpoint Circle Approach," IEEE International Conference on Communication and Signal Processing, 2014, pp. 692-695.
  16. Wen-Yuan Chen and Chin-Hsing Chen, "Public-key image steganography using discrete cosine transform and quadtree partition vector quantization coding", Optical Engineering 42, 2886-2892, 2003.
  17. Krenn, R. , "Steganography and Steganalysis", http://www. krenn. nl/univ/cry/steg/article. pdf.
  18. Chang, C. -C. , Chen, T. -S. , and Chung, L. -Z. (2002) A steganographic method based upon JPEG and quantization table modification, Information Sciences, vol. 141, 2002, pp. 123-138.
Index Terms

Computer Science
Information Sciences

Keywords

Image hiding least significant bit (LSB) block based steganography varying size