An Adequate Image Stegnography Method based on Bit Reversed Technique

Authors

  • A. Rakesh  Department of Computer Science, Alagappa University, Karaikudi, Tamil Nadu, India
  • Dr. K. Kuppusamy  Department of Computer Science, Alagappa University, Karaikudi, Tamil Nadu, India

Keywords:

Steganography, LSB Technique, Information Hiding, Secret Image, Cover Image.

Abstract

The concept of information hiding is nothing new inside the history, as early as in ancient Greece there have been tries to hide a message in a depended medium to deliver it across the enemy territory. Within the modern-day world of digital conversation, there are numerous techniques used for hiding information in any medium. Certainly one of such method is steganography [9] wherein digital media specifically digital pictures are used as a medium for hiding data and the facts within the shape text, virtual photograph, video or audio record may be used as secret message. The phrase steganography derived from two Greek words: steganos way covered and graphos approach writing and often refers to secret writing or facts hiding [10]. The main goal of steganography is to increase conversation protection via placing secret message into the virtual picture.In this paper Proposed the Least Significant bit (LSB) method is the simple steganographic technique to conceal the secret data in an image and it is commonly used. This method maintains the quality of the image. Steganography using LSB hides out the bits of the message image into the LSB of the cover image. The advantage of LSB steganography is that it is very simple, easy to employ and the final image obtained will be almost similar to the cover image, meaning that the quality of cover image remains same.

References

  1. Mork el, T., Eloff, J. H. P. and Oliver, M. S.; “An Overview of Image Steganography”, Proceedings of the Fifth Annual Information Security South Africa Conference (ISSA), 2005.
  2. Zhang, T., Li, W., Zhang,Y. and Ping, X. ;“ Detection of LSB Matching Steganography Based on Distribution of Pixel Difference in Natural Images”, International Conference on Image Analysis and Signal Processing (IASP), pp.629-632, 2010.
  3. Wang, H & Wang, S, “Cyber warfare: Steganography vs. Steganalysis”, Communications of the ACM, 47:10, October 2004.
  4. Anderson, R.J. & Petitcolas, F.A.P., “On the limits of steganography”, IEEE Journal of selected Areas in Communications, May 1998
  5. Marvel, L.M., Boncelet Jr., C.G. & Retter, C., “Spread Spectrum Steganography”, IEEE Transactions on image processing, 8:08, 1999
  6. Stefan Katzenbeiser & Fabien A.P.Petitcolas(1999), Information HidingTechniques for Steganography and Digital Watermarking, Artech House, Computer Security series, Boston, London.
  7. Currie, D.L. & Irvine, C.E., “Surmounting the effects of lossy compression on Steganography”, 19th National Information Systems Security Conference, 1996.
  8. M. M Amin, M. Salleh, S. Ibrahim, M.R.K atmin, and M.Z.I. Shamsuddin “Information Hiding using Steganography” 4* National Conference on Telecommunication Technology Proceedings, Shah Alam, Malaysia. 2003 IEEE.
  9. Moerland, T., “Steganography and Steganalysis”, Leiden Institute of Advanced Computing Science, www.liacs.nl/home/ tmoerl/privtech.pdf
  10. Niels Provos and Peter Honeyman, "Detecting Steganographic Content on the Internet," August 2001. [NDSS '02, San Diego (February 2002)]
  11. Neil R. Bennett, JPEG STEGANALYSIS & TCP/IP STEGANOGRAPHY, University of Rhode Island , 2009.
  12. F.A.P Peticolas, R.J. Anderson and M.G. Kuhn, “Information Hiding – A Survey”, in proceeding of IEEE, pp. 1062-1078, July 1999
  13. A. Mishra, A. Gupta, and D. K. Vishwakarma, “Proposal of a new steganography approach”, in Proceedings of International Conference on Advances in Computing, Control, and Telecommunication Technologies, 2009, pp.175-178.
  14. M. A. B. Younes, and A. Jantan, “A new steganography approach for image encryption exchange by using least significant bit insertion”, International Journal of Computer Science and Network Security, vol.8, no.6, pp.247-254, 2008.
  15. H. J. Zhang, and H. J. Tang, “A novel image steganography algorithm against statistical analysis”, in Proceedings of Sixth International Conference on Machine Learning and Cybernetics, 2007, pp.3884-3888.
  16. H. Mathkour, G. M. R. Assassa, A. A. Muharib, and I. Kiady, “A novel approach for hiding messages in images”, in Proceedings of International Conference on Signal Acquisition and Processing, 2009, pp.89-93
  17. Furuta, T,.Noda, H., Niimi, M., Kawaguchi E,”Bit-plane decomposition steganography using wavelet compressed video”, Joint Conference of the Fourth International Conference, 2(5): 970 - 974, 2003.
  18. V.Karthekayani and kammalakan, “Conversion grayscale image to color image with and without texture synthesis”, International journal of computer science and network security, 7(4):11-16, 2007.
  19. Brisbane, G., Safavi-Naini, R.&Ogunbona, P. (2005). High-capacity steganography using a shared colour palette. Vision, Image and Signal Processing, IEE Proceedings, 152 (6), 787-792.
  20. Nameer N. EL-Emam, “Hiding a Large Amount of Data with High Security Using Steganography Algorithm” Jordan Journal of Science publications, 3 (4): 223-232,2007.
  21. Mamta Juneja and Parvinder Singh Sandhu, (2013) “A New Approach for Information security using an Improved Steganography Technique”, Journal of Info.Pro.Systems, Vol 9, No:3, pp.405-424.
  22. P.Thiyagarajan, V.Natarajan, G.Aghila, V.Pranna Venkatesan, R.Anitha, (2013) “Pattern Based 3D Image Steganography”, 3D Research center, Kwangwoon University and Springer 2013, 3DR Express., pp.1-8.
  23. Shamim Ahmed Laskar and Kattamanchi Hemachandran, (2013) “Steganography Based OnRandom Pixel Selection For Efficient Data Hiding”, International Journal of Computer Engineering and Technology, Vol.4, Issue 2, pp.31-44.
  24. M. Juneja, and P.S. Sandhu, “Designing of robust image steganography technique based on LSB insertion and encryption”, in Proceedings of International Conference on Advances in Recent Technologies in Communication and Computing, 2009, pp.302-305.
  25. S.Shanmuga Priya, K.Mahesh and Dr.K.Kuppusamy, (2012) “Efficient Steganography Method To Implement Selected Least Significant Bits in Spatial Domain”, International Journal of Engineering Research and Applications,, Vol2, Issue 3, pp. 2632-2637.
  26. G. Swain, and S. K. Lenka, “LSB array based image steganography technique by exploring the four least significant bits”, CCIS vol 270, part II, 2012, pp.479-488.
  27.  G. Swain, D. R. Kumar, A. Pradhan, and S. K. Lenka, “A technique for secure communication using message dependent steganography”, International Journal of Computer and Communication Technology, vol.2, no. 2- 4, pp.177-181, 2010.

Downloads

Published

2018-04-30

Issue

Section

Research Articles

How to Cite

[1]
A. Rakesh, Dr. K. Kuppusamy, " An Adequate Image Stegnography Method based on Bit Reversed Technique, International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011, Volume 4, Issue 5, pp.1685-1697, March-April-2018.