Call for Paper - August 2021 Edition
IJCA solicits original research papers for the August 2021 Edition. Last date of manuscript submission is July 20, 2021. Read More

Implementing Semi-Blind Image Steganography with Improved Concealment

Print
PDF
IJCA Proceedings on International Conference on Computer Technology
© 2015 by IJCA Journal
ICCT 2015 - Number 4
Year of Publication: 2015
Authors:
Karan Nair
Karan Asher
Jonathan Joshi

Karan Nair, Karan Asher and Jonathan Joshi. Article: Implementing Semi-Blind Image Steganography with Improved Concealment. IJCA Proceedings on International Conference on Computer Technology ICCT 2015(4):14-19, September 2015. Full text available. BibTeX

@article{key:article,
	author = {Karan Nair and Karan Asher and Jonathan Joshi},
	title = {Article: Implementing Semi-Blind Image Steganography with Improved Concealment},
	journal = {IJCA Proceedings on International Conference on Computer Technology},
	year = {2015},
	volume = {ICCT 2015},
	number = {4},
	pages = {14-19},
	month = {September},
	note = {Full text available}
}

Abstract

There have been a number of proposed methods to conceal information using steganographic techniques. Images are the favoured carrier due to the large capacity for concealed information and relative ease to work with. A number of methods exist to conceal text as well as image data within images. This paper proposes an information embedding scheme with improved concealment of secret images within larger images using a fractional embedding scheme. It explores the natural redundancy of image data, as well as limitations of human perception and statistical attacks to provide better subjective and objective concealment.

References

  • Bruce Norman, Secret warfare, the battle of Codes and Ciphers. Acropolis Books Inc. , first edition, 1980. ISBN 0-87491-600-3.
  • Neil F. Johnson, Sushil Jajodia, George Mason University, "Exploring Steganography: Seeing the Unseen", IEEE Computers, February 1998, pp. 26-34.
  • A. Joseph Raphael, Dr. V Sundaram, "Cryptography and Steganography – A Survey'' , Int. Journal of Comp. Tech. Appl. , Vol 2 (3), 626-630.
  • I. Cox, M. Miller, J. Bloom, J. Fridrich, and T. Kalker, "Digital Watermarking and Steganography (Second Edition)", Morgan Kaufmann Publishers, ISBN: 978-0-12-372585-1, 2007.
  • Philip Bateman, Dr. Hans Georg Schaathun,"Image Steganography and Steganalysis", Department of Computing, University of Surrey, 2008.
  • J. Fridrich, M. Goljan, and D. Hogea. "Attacking the OutGuess", Proceedings of the 3rd Information Hiding Workshop on Multimedia and Security 2002, Juan-les-Pins, France, 2002.
  • Ismail Avc?bas¸Nasir Memon and Bülent Sankur "Steganalysis Using Image Quality Metrics", IEEE Transactions on Image processing Vol. 12
  • Huynh-Thu, Q. ;Psytechnics Ltd. , Ipswich ; Ghanbari, M. "Scope of validity of PSNR in image/video quality assessment", IEEE xplore.
  • Zhou Wang, Alan C. Bovik, Hamid R. Sheikh and Eero P. Simoncelli "The SSIM Index for Image QualityAssessment",http://www. cns. nyu. edu/lcv/ssim/