CFP last date
20 December 2024
Reseach Article

Secure BMP Image Steganography Using Dual Security Model (I.D.E.A, image intensity and Bit Randomization)and Max-Bit Algorithm.

by Nabarun Bagchi
journal cover thumbnail
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 1 - Number 21
Year of Publication: 2010
Authors: Nabarun Bagchi
10.5120/67-657

Nabarun Bagchi . Secure BMP Image Steganography Using Dual Security Model (I.D.E.A, image intensity and Bit Randomization)and Max-Bit Algorithm.. International Journal of Computer Applications. 1, 21 ( February 2010), 18-22. DOI=10.5120/67-657

@article{ 10.5120/67-657,
author = { Nabarun Bagchi },
title = { Secure BMP Image Steganography Using Dual Security Model (I.D.E.A, image intensity and Bit Randomization)and Max-Bit Algorithm. },
journal = { International Journal of Computer Applications },
issue_date = { February 2010 },
volume = { 1 },
number = { 21 },
month = { February },
year = { 2010 },
issn = { 0975-8887 },
pages = { 18-22 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume1/number21/67-657/ },
doi = { 10.5120/67-657 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:47:28.717883+05:30
%A Nabarun Bagchi
%T Secure BMP Image Steganography Using Dual Security Model (I.D.E.A, image intensity and Bit Randomization)and Max-Bit Algorithm.
%J International Journal of Computer Applications
%@ 0975-8887
%V 1
%N 21
%P 18-22
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A new BMP image based steganography algorithm is proposed based on image intensity, added extended encryption algorithm and a more superior insertion technique of encrypted data bit to increase data insertion level in a BMP image. Image size, clarity, noise is also taken care of in this algorithm.

References
  1. Adnan Gutub, Mahmoud Ankeer, Muhammad Abu-Ghalioun, Abdulrahman Shaheen, and Aleem Alvi, “Pixel Indicator high capacity Technique for RGB image Based Steganography”, WoSPA 2008 – 5th IEEE International Workshop on Signal Processing and its Applications, University of Sharjah, Sharjah, U.A.E. 18 – 20 March 2008.
  2. Donovan Artz, Los Alamos National Laboratory, “Digital Steganography: Hiding Data within Data”, IEEE Internet Computing: May, 2001
  3. Neil F. Johnson. Sushil Jajodia, "Exploring Steganography: Seeing the Unseen", IEEE computer, 1998.
  4. Kevin Curran, Karen Bailey, “An Evaluation of Image Based Steganography Methods”, Multimedia Tools and Applications, Vol. 30, No. 1, Pages: 55 – 88, July 2006.
  5. Mohammad Tanvir Parvez and Adnan Gutub, “RGB Intensity Based Variable-Bits Image Steganography”, APSCC 2008 – Proceedings of 3rd IEEE Asia-Pacific Services Computing Conference, Yilan, Taiwan, 9-12 December 2008.
  6. Adnan Gutub, Ayed Al-Qahtani, Abdulaziz Tabakh “Triple-A: Secure RGB Image Steganography Based on Randomization” aiccsa, pp.400-403, 2009 IEEE/ACS International Conference on Computer Systems and Applications, Rabat, Morocco May 10-13, 2009
  7. C. Kurak and J. McHugh, “A Cautionary Note On Image Downgrading,” Proc. IEEE Eighth Ann. Computer Security Applications Conf., IEEE Press, Piscataway, N.J., 1992, pp. 153-159.
  8. B. Pfitzmann, “Information Hiding Terminology,” Proc. First Int’l Workshop Information Hiding, Lecture Notes in Computer Science No. 1,174, Springer-Verlag, Berlin, 1996, pp. 347-356.
  9. T. Aura, “Invisible Communication,” EET 1995, technical report, Helsinki Univ. of Technology, Finland, Nov. 1995; http://deadlock.hut.fi/ste/ste_html.html.
  10. I. Cox et al., “A Secure, Robust Watermark for Multimedia,”Proc. First Int’l Workshop Information Hiding, Lecture Notes in Computer Science No. 1, 174, Springer- Verlag, Berlin, 1996, pp. 185-206.
  11. A. Brown, S-Tools for Windows, 1994, ftp://idea.sec.dsi.unimi.it/pub/security/crypt/code/s-tools3.zip.
  12. E. Koch, J. Rindfrey, and J. Zhao, “Copyright Protection for Multimedia Data,” Proc. Int’l Conf. Digital Media and Electronic Publishing, Leeds, UK, 1994.
  13. W. Brown and B.J. Shepherd, Graphics File Formats: Reference and Guide, Manning Publications, Greenwich, Conn., 1995.
  14. X-G. Xia, C.G. Boncelet, and G.R. Arce, “A Multiresolution Watermark for Digital Images,” IEEE Int’l Conf. Image Processing, IEEE Press, Piscataway, N.J., 1997.
  15. W. Bender et al., “Techniques for Data Hiding,” IBM Systems J., Vol. 35, Nos. 3 and 4, 1996, pp. 313-336.
  16. I.J. Cox et al., “Secure Spread Spectrum Watermarking for Multimedia,” Tech. Report 95-10, NEC Research Inst., Princeton, N.J., 1995.
  17. M.P. Leong, O.Y.H. Cheung, K.H. Tsoi and P.H.W. Leong, “A Bit-Serial Implementation of the International Data Encryption Algorithm IDEA,” 2000 IEEE Symposium on Field-Programmable Custom Computing Machines, IEEE (2000), pp. 122-131.
Index Terms

Computer Science
Information Sciences

Keywords

Algorithms Hiding data behind image Cryptography Steganography Max-Bit Algorithm