Call for Paper - August 2022 Edition
IJCA solicits original research papers for the August 2022 Edition. Last date of manuscript submission is July 20, 2022. Read More

Design a New Robustness Technique for Image Stegnography

Print
PDF
IJCA Proceedings on National Workshop-Cum-Conference on Recent Trends in Mathematics and Computing 2011
© 2012 by IJCA Journal
RTMC - Number 14
Year of Publication: 2012
Authors:
Monika Gambhir
Amandeep Kaur
Manpreet Kaur

Monika Gambhir, Amandeep Kaur and Manpreet Kaur. Article: Design a New Robustness Technique for Image Stegnography. IJCA Proceedings on National Workshop-Cum-Conference on Recent Trends in Mathematics and Computing 2011 RTMC(14):1-3, June 2012. Full text available. BibTeX

@article{key:article,
	author = {Monika Gambhir and Amandeep Kaur and Manpreet Kaur},
	title = {Article: Design a New Robustness Technique for Image Stegnography},
	journal = {IJCA Proceedings on National Workshop-Cum-Conference on Recent Trends in Mathematics and Computing 2011},
	year = {2012},
	volume = {RTMC},
	number = {14},
	pages = {1-3},
	month = {June},
	note = {Full text available}
}

Abstract

We propose the secret and robust data transmission over the noisy channel. The secret data is encrypted and permutated using the permutation function, further encoded the data using the error detection and correction code. We show that the good quality of the stego-image and resistant against the various noise attacks (Like Salt and Pepper). Although we covered a number of security and capacity and robustness definitions, there has been no work successfully formulating the relationship between the two from the practical point of view. Steganography's ultimate objectives, which are undetectability, robustness (resistance to various image processing methods and compression) and capacity of the hidden data, are the main factors that separate it from related techniques such as watermarking and cryptography. Robustness of steganography is one of the three main goals to be achieved. In this paper we increase the robustness by introducing some error detecting and correcting techniques.

References

  • B. Gladman, "Implementation experience with the AES candidate algorithms," Proc. of 2nd AES candidate conference, March 22-23, 1999, Rome, pp. 7-14. (http://fp. gladman. plus. com/cryptography\_technology/rijndae.
  • Jiwu Huang, Yun Q. Shi, Yi Shi ," Embedding image watermarks in DC components," IEEE Trans. CSVT 10 (6) (2000) 974-979.
  • N. Rajpal, A. Kumar and P. R. Jindal, "Demonstrating the Use of Error Coding Technique in the field of Steganography, along with Linear Feedback shift Register Technique," 2nd Workshop on Computer Vision, Graphics and Image Processing, pp. 22-27, Gwalior, India, February 2004.
  • Y. K. Lee and L. H. Chen, "High Capacity Image Steganographic Model," IEE Proceedings - Vision, Image, and signal processing, vol. 147, No. 3, June 2000, pp. 288-294.
  • Jiwu Huang, Yun Q. Shi, Yi Shi ," Embedding image watermarks in DC components," IEEE Trans. CSVT 10 (6) (2000) 974-979.
  • J. Daemen and V. Rijmen. "The Design of Rijndael," AES - Advanced Encryption Standard}, ISBN 3-540-42580-2 Springer-Verlag Berlin Heidelberg, New York.
  • N. F. Johnson and S. Jajodia, "Exploring Steganography: Seeing the Unseen," IEEE computer, Vol. 31, No. 2, February 1998,pp. 26-34.
  • N. Rajpal, A. Kumar, P. R. Jindal and A. Saroagi, "An Investigation into the use of Linear Feedback Shift Register for Data Encrypting and Data Hiding in the field of Steganography," Conference on e-security, Cyber Crime & Law, pp. , Chandigarh, India, February 2004.
  • Anil Kumar, Deepak Gambhir and Navin Rajpall "Robust and Secret Data Transmission Over the Noisy Channel" IEEE - ICSCN 2007, MIT Campus, Anna University, Chennai, India. Feb. 22-24, 2007. pp. 199-203.