We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Binary in Binary for Secret Writing ñ A Crypticís Cousin Approach

by Dr. R.John Bosco Balaguru, Venkata Abhiram Murarisetty, R. Amirtharajan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 5 - Number 11
Year of Publication: 2010
Authors: Dr. R.John Bosco Balaguru, Venkata Abhiram Murarisetty, R. Amirtharajan
10.5120/951-1328

Dr. R.John Bosco Balaguru, Venkata Abhiram Murarisetty, R. Amirtharajan . Binary in Binary for Secret Writing ñ A Crypticís Cousin Approach. International Journal of Computer Applications. 5, 11 ( August 2010), 41-47. DOI=10.5120/951-1328

@article{ 10.5120/951-1328,
author = { Dr. R.John Bosco Balaguru, Venkata Abhiram Murarisetty, R. Amirtharajan },
title = { Binary in Binary for Secret Writing ñ A Crypticís Cousin Approach },
journal = { International Journal of Computer Applications },
issue_date = { August 2010 },
volume = { 5 },
number = { 11 },
month = { August },
year = { 2010 },
issn = { 0975-8887 },
pages = { 41-47 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume5/number11/951-1328/ },
doi = { 10.5120/951-1328 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:54:04.192403+05:30
%A Dr. R.John Bosco Balaguru
%A Venkata Abhiram Murarisetty
%A R. Amirtharajan
%T Binary in Binary for Secret Writing ñ A Crypticís Cousin Approach
%J International Journal of Computer Applications
%@ 0975-8887
%V 5
%N 11
%P 41-47
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Binary images, like cartoons, text documents, signatures captured by signing pads and/or 2-color images are very commonly used in our daily life. The JPEG compression method which was designed to efficiently compress color images do not do a good job on a monochromatic (binary) image. Changing the pixel values in these images for hiding the data, may produce a noticeable change in the cover media. Embedding capacity and preservation of visible artifacts are the potential problems of this technique. This paper proposes several methods for hiding data in binary images (including fax). The proposed algorithms alter pixels of the embeddable blocks of cover image depending on the characteristic values of the block. In addition, the new algorithm deals with statistical embedding for each block, which enhances the security of embedded data and the capacity of the embedding method. The performances of the algorithms are tested over various sizes of binary cover images by embedding various sizes of secured data. The effectiveness of the stego process proposed has been studied by estimating the number of errors, Bit error rate and Relative entropy.

References
  1. R.Amirtharajan, Krishnendra Nathella and J Harish, “Info Hide – A Cluster Cover Approach” International Journal of Computer Applications 3(5) (2010)11–18.
  2. W. Bender, D. Gruhl, N. Morimoto, A. Lu, Techniques for data hiding, IBM Syst. J. 35 (3&4) (1996) 313–336.
  3. Bruice Schneier, Applied Cryptography Protocols, Algorithm and Source Code in C. Second edition. Wiley India edition 2007
  4. J. Chen; T. S. Chen & M. W Cheng, “A New Data Hiding Method in Binary Image”, in proceedings of 5th IEEE international symposium on multimedia software engineering 2003
  5. K. F. Hwang and C. C. Chang, “A Run Length Mechanism for Hiding Data into Binary Images”, In proceedings of pacific rim workshop on digital steganography 2002, 71-74.
  6. S. Katzenbeisser, F.A.P. Petitcolas, Information Hiding Techniques for Steganography and Digital Watermarking, Artech House, Norwood, MA, 2000
  7. M. Wu and J. Lee, "A Novel Data Embedding Method for Two-Color Facsimile Images", International Symposium on Multimedia Information Processing, Taiwan, December 1998.
  8. Min Wu; Bede Liu; “Data hiding in binary image for authentication and annotation” in proceedings of IEEE Transactions on multimedia, 6(2004)528 – 538.
  9. H.K. Pan, Y.Y. Chen and Y.C. Tseng, “A Secure Data Hiding Scheme for Two-Color Images”, in proceedings of 5th IEEE Symposium on computers and communication, (2000)750-755.
  10. Yu-Chee Tseng; Hsiang-Kuang Pan, “Secure and invisible data hiding in 2-color images”, in proceedings of 20th IEEE Computer and Communications Societies, INFOCOM (2001) 2887 - 896.
Index Terms

Computer Science
Information Sciences

Keywords

Image steganography Block based embedding