CFP last date
20 June 2024
Call for Paper
July Edition
IJCA solicits high quality original research papers for the upcoming July edition of the journal. The last date of research paper submission is 20 June 2024

Submit your paper
Know more
Reseach Article

Analysis of Random Bit Image Steganography Techniques

Published on May 2013 by Dipesh Agrawal, Samidha Diwedi
International Conference on Recent Trends in Engineering and Technology 2013
Foundation of Computer Science USA
ICRTET - Number 1
May 2013
Authors: Dipesh Agrawal, Samidha Diwedi
05b90659-a92d-4abd-ad05-0cdba0821240

Dipesh Agrawal, Samidha Diwedi . Analysis of Random Bit Image Steganography Techniques. International Conference on Recent Trends in Engineering and Technology 2013. ICRTET, 1 (May 2013), 1-4.

@article{
author = { Dipesh Agrawal, Samidha Diwedi },
title = { Analysis of Random Bit Image Steganography Techniques },
journal = { International Conference on Recent Trends in Engineering and Technology 2013 },
issue_date = { May 2013 },
volume = { ICRTET },
number = { 1 },
month = { May },
year = { 2013 },
issn = 0975-8887,
pages = { 1-4 },
numpages = 4,
url = { /proceedings/icrtet/number1/11758-1302/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Recent Trends in Engineering and Technology 2013
%A Dipesh Agrawal
%A Samidha Diwedi
%T Analysis of Random Bit Image Steganography Techniques
%J International Conference on Recent Trends in Engineering and Technology 2013
%@ 0975-8887
%V ICRTET
%N 1
%P 1-4
%D 2013
%I International Journal of Computer Applications
Abstract

Steganography is an art of hiding information in some media. This paper describes various image Steganography techniques, based on spatial domain and by considering pixel values in binary format. Spatial domain is based on physical location of pixels in an image. Generally 8 bit gray level or color images can be used as a cover to hide data. Again binary representations of these pixels are considered to hide secret information. Random bits from these bytes are used to replace the bits of secret. In this paper, many steganography techniques can be used like Least Significant Bit (LSB), layout management schemes, replacing only 1's or only zero's from lower nibble from the byte are considered for hiding secret message in an image. Along with these techniques, some more methods are proposed. By considering many parameters of an image are considered like physical location of pixels, intensity value of pixel, etc.

References
  1. Abbas Cheddad, Joan Condell, Kevin Curran, Paul Mc Kevitt. "Digital image steganography: Survey and analysis of current methods". In Signal Processing 90, (2010) 727–752.
  2. R. Amirtharajan, R. Akila, P. Deepikachowdavarapu. "A Comparative Analysis of Image Steganography". In International Journal of Computer Applications, (0975 8887) Volume 2 – No. 3, May 2010.
  3. Sanjiv Manchanda, Mayank Dave and S. B. Singh, "Customized and Secure Image Steganography Through Random Numbers Logic". In Signal Processing: An International Journal, Volume 1: Issue (1).
  4. Mohammad Tanyir, Parvez and Adnan Abdul-Aziz Gutub, "RGB Intensity Based Variable Bits Image Steganography", 2008 IEEE Asia-Pacific Services Computing Conference.
  5. Rengarajan Amirtharjan, Jiaohua Qin and John Bosco Balaguru Rayappan "Random Image Steganography and Steganalysis: Present Status and Future Directions". Information Technology Journal 11(5), pp. 566-576, 2012
Index Terms

Computer Science
Information Sciences

Keywords

Lsb Steganography Intensity Value Of A Pixel Physical Location Of A Pixel