Call for Paper - November 2019 Edition
IJCA solicits original research papers for the November 2019 Edition. Last date of manuscript submission is October 21, 2019. Read More

A Pictorial Block Steganography based Secure Algorithm for Data Transfer

Print
PDF
IJCA Special Issue on International Conference on Computing, Communication and Sensor Network
© 2013 by IJCA Journal
CCSN2012 - Number 4
Year of Publication: 2013
Authors:
Anupam Mondal
Sudipta Sahana
Sainik Kumar Mahata

Anupam Mondal, Sudipta Sahana and Sainik Kumar Mahata. Article: A Pictorial Block Steganography based Secure Algorithm for Data Transfer. IJCA Special Issue on International Conference on Computing, Communication and Sensor Network CCSN2012(4):12-15, March 2013. Full text available. BibTeX

@article{key:article,
	author = {Anupam Mondal and Sudipta Sahana and Sainik Kumar Mahata},
	title = {Article: A Pictorial Block Steganography based Secure Algorithm for Data Transfer},
	journal = {IJCA Special Issue on International Conference on Computing, Communication and Sensor Network},
	year = {2013},
	volume = {CCSN2012},
	number = {4},
	pages = {12-15},
	month = {March},
	note = {Full text available}
}

Abstract

The growth of high speed communication networks and that of the Internet, in particular, has increased the ease of Information Communication. Steganography is the art and science of writing hidden messages in such a way that no one apart from the sender and intended recipient even realizes there is a hidden message. Steganography is mainly used to embed important information within images for encryption. This approach is better than cryptography in secure data Transfer. Original message is being hidden within a carrier like images or video in such a way that the change in image or video is not observable. So the hidden message is difficult to detect without retrieval. In today's world, with the advancement of science and technology, we have plenty of security tools which are developed to protect the transmission of multimedia objects. But the development of security approaches for text messages are comparatively less. For hiding secret information in images, there exists a large variety of steganography techniques some are more complex than others and all of them have respective strong and weak points. In this paper, a secure pictorial block steganography based encryption and decryption algorithm is proposed to impose the concept of secrecy over privacy for transferring text messages.

References

  • Ali Daneshkhah, Hassan Aghaeinia and Seyed Hamed Seyedi, "A More Secure Steganography Method in Spatial Domain", Second International Conference on Intelligent Systems, Modelling andSimulation, 2011.
  • E. Ghasemi, J. Shanbehzadeh , N. Fassihi, "High Capacity Image Steganography using Wavelet Transform and Genetic Algorithm," International MultiConference of Engineers and Computer Scientists, vol. 1, 2011.
  • A. Nag, S. Biswas, D. Sarkar, P. P. Sarkar, "A Novel Technique for Image Steganography Based on DWT and Huffman Encoding," International Journal of Computer Science and Security, (IJCSS), Volume (4): Issue (6),pp. 497-610,2011.
  • Qinhua Huang and Weimin Ouyang, "Protect Fragile Regions in Steganography LSB Embedding", 3rd International Symposium on Knowledge Acquisition and Modelling, 2010.
  • Piyush Marwaha, Paresh Marwaha, "Visual Cryptographic Steganography in images", 2nd International conference on Computing, Communication and Networking Technologies, 2010.
  • Adel Almohammad and Gheorghita Ghinea, "Image Steganography and Chrominance Components", 10th IEEE International Conferenceon Computer and Information Technology, 2010.
  • S. Sarreshtedari , S. Ghaemmaghami, "High Capacity Image Steganography in Wavelet Domain," International Conference on Consumer Communications and Networking,pp. 1-6, 2010.
  • K. H. Jung, K. Y. Yoo, Data hiding method using image interpolation, Computer Standards and Interfaces 31 (2) (2009) 465-470.
  • P. Tsai, Y. C. Hu, H. L. Yeh, Reversible image hiding scheme using predictive coding and histogram shifting, Signal Processing 89 (6) (2009) 1129-1143.
  • Z. Li, X. Chen, X. Pan, X. Zeng, Lossless data hiding scheme based on adjacent pixel difference, in: Proceedings of the International Conference on Computer Engineering and Technology, 2009, pp. 588-592.
  • Y. C. Li, P. Tsai, C. H. Lin, H. L. Yeh, C. T. Huang ,"Palette Partition Based Data Hiding for Color Images," Intelligent Information Hiding and Multimedia Signal Processing, 2009. lIH-MSP '09. Fifth International Conference, pp. 620-623, 12- 14 Sept. 2009.
  • M. C Chen, S. Agaian, P. Chen, "Generalized Collage Steganography on Images ", IEEE International Conference on Systems, Man and Cybernetics (SMC), IEEE, 2008.