CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

Implementing Semi-Blind Image Steganography with Improved Concealment

Published on September 2015 by Karan Nair, Karan Asher, Jonathan Joshi
CAE Proceedings on International Conference on Communication Technology
Foundation of Computer Science USA
ICCT2015 - Number 4
September 2015
Authors: Karan Nair, Karan Asher, Jonathan Joshi
7e7d0c01-eadb-4b28-97e5-b019c9404e5e

Karan Nair, Karan Asher, Jonathan Joshi . Implementing Semi-Blind Image Steganography with Improved Concealment. CAE Proceedings on International Conference on Communication Technology. ICCT2015, 4 (September 2015), 14-19.

@article{
author = { Karan Nair, Karan Asher, Jonathan Joshi },
title = { Implementing Semi-Blind Image Steganography with Improved Concealment },
journal = { CAE Proceedings on International Conference on Communication Technology },
issue_date = { September 2015 },
volume = { ICCT2015 },
number = { 4 },
month = { September },
year = { 2015 },
issn = 0975-8887,
pages = { 14-19 },
numpages = 6,
url = { /proceedings/icct2015/number4/22657-1558/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 CAE Proceedings on International Conference on Communication Technology
%A Karan Nair
%A Karan Asher
%A Jonathan Joshi
%T Implementing Semi-Blind Image Steganography with Improved Concealment
%J CAE Proceedings on International Conference on Communication Technology
%@ 0975-8887
%V ICCT2015
%N 4
%P 14-19
%D 2015
%I International Journal of Computer Applications
Abstract

There have been a number of proposed methods to conceal information using steganographic techniques. Images are the favoured carrier due to the large capacity for concealed information and relative ease to work with. A number of methods exist to conceal text as well as image data within images. This paper proposes an information embedding scheme with improved concealment of secret images within larger images using a fractional embedding scheme. It explores the natural redundancy of image data, as well as limitations of human perception and statistical attacks to provide better subjective and objective concealment.

References
  1. Bruce Norman, Secret warfare, the battle of Codes and Ciphers. Acropolis Books Inc. , first edition, 1980. ISBN 0-87491-600-3.
  2. Neil F. Johnson, Sushil Jajodia, George Mason University, "Exploring Steganography: Seeing the Unseen", IEEE Computers, February 1998, pp. 26-34.
  3. A. Joseph Raphael, Dr. V Sundaram, "Cryptography and Steganography – A Survey'' , Int. Journal of Comp. Tech. Appl. , Vol 2 (3), 626-630.
  4. I. Cox, M. Miller, J. Bloom, J. Fridrich, and T. Kalker, "Digital Watermarking and Steganography (Second Edition)", Morgan Kaufmann Publishers, ISBN: 978-0-12-372585-1, 2007.
  5. Philip Bateman, Dr. Hans Georg Schaathun,"Image Steganography and Steganalysis", Department of Computing, University of Surrey, 2008.
  6. J. Fridrich, M. Goljan, and D. Hogea. "Attacking the OutGuess", Proceedings of the 3rd Information Hiding Workshop on Multimedia and Security 2002, Juan-les-Pins, France, 2002.
  7. Ismail Avc?bas¸Nasir Memon and Bülent Sankur "Steganalysis Using Image Quality Metrics", IEEE Transactions on Image processing Vol. 12
  8. Huynh-Thu, Q. ;Psytechnics Ltd. , Ipswich ; Ghanbari, M. "Scope of validity of PSNR in image/video quality assessment", IEEE xplore.
  9. Zhou Wang, Alan C. Bovik, Hamid R. Sheikh and Eero P. Simoncelli "The SSIM Index for Image QualityAssessment",http://www. cns. nyu. edu/lcv/ssim/
Index Terms

Computer Science
Information Sciences

Keywords

Steganography Steganalysis Hiding Semi-blind Blind Image-in-image Steganography