CFP last date
20 December 2024
Reseach Article

Article:Optimum Pixel & Bit location for Colour Image Stego- A Distortion Resistant Approach

by Rengarajan Amirtharajan, Aishwarya G, Madhumita Rameshbabu, John Bosco Balaguru Rayappan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 10 - Number 7
Year of Publication: 2010
Authors: Rengarajan Amirtharajan, Aishwarya G, Madhumita Rameshbabu, John Bosco Balaguru Rayappan
10.5120/1494-2011

Rengarajan Amirtharajan, Aishwarya G, Madhumita Rameshbabu, John Bosco Balaguru Rayappan . Article:Optimum Pixel & Bit location for Colour Image Stego- A Distortion Resistant Approach. International Journal of Computer Applications. 10, 7 ( November 2010), 17-24. DOI=10.5120/1494-2011

@article{ 10.5120/1494-2011,
author = { Rengarajan Amirtharajan, Aishwarya G, Madhumita Rameshbabu, John Bosco Balaguru Rayappan },
title = { Article:Optimum Pixel & Bit location for Colour Image Stego- A Distortion Resistant Approach },
journal = { International Journal of Computer Applications },
issue_date = { November 2010 },
volume = { 10 },
number = { 7 },
month = { November },
year = { 2010 },
issn = { 0975-8887 },
pages = { 17-24 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume10/number7/1494-2011/ },
doi = { 10.5120/1494-2011 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:58:37.185096+05:30
%A Rengarajan Amirtharajan
%A Aishwarya G
%A Madhumita Rameshbabu
%A John Bosco Balaguru Rayappan
%T Article:Optimum Pixel & Bit location for Colour Image Stego- A Distortion Resistant Approach
%J International Journal of Computer Applications
%@ 0975-8887
%V 10
%N 7
%P 17-24
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A conventional Secret key Steganography scheme focuses mainly to reduce the distortion when secret information is embedded into the cover image. On the other hand, the transmitted images may be compressed or faces transmitting errors. If such errors occur, the receiver cannot extract the correct information from the stego-image. Furthermore the three main attributes of steganography are capacity, invisibility and Robustness. In the previous models [3, 4] we mainly concentrated on capacity and invisibility but in this method equal importance will be given to robustness. To increase the stochasticity of information hiding we use pixel indicator techniques which are implemented using three methods. Among these the first method enjoins that red channel steers the other two channels and the second method gives us the liberty to select the steering channel which successively increases the robustness of the shrouded message but its limits when MSE is considered. In third method, the steering channel is selected in a cyclic mode which enhances further the capacity along with security of the shrouded message as the MSE gets equally distributed. To increase the robustness here we introduce a factor E which gives us an option to select the position to plant the message to be concealed. The factor E addresses the bit where the embedding can be started. Once an image is compressed the LSBs of the covered media will get affected which defiles the concealed message. The essence of this method rests in the withstanding capability of the carrier media as the factor E is altered. As the value of E increases the MSE gets stepped up and hence the imperceptibility of the carrier image gets diluted. This can be heightened by using Optimal Pixel Adjustment Process (OPAP).

References
  1. Abbas Cheddad, Joan Condell, Kevin Curran, Paul Mc Kevitt, Digital image steganography: Survey and analysis of current methods Signal Processing 90 (2010) 727–752.
  2. Adnan Gutub, Mahmoud Ankeer, Muhammad Abu-Ghalioun, Abdulrahman Shaheen, and Aleem Alvi, “Pixel Indicator high capacity Technique for RGB image Based Steganography”, WoSPA 2008 – 5th IEEE International Workshop on Signal Processing and its Applications, University of Sharjah, Sharjah, U.A.E. 18 – 20 March 2008
  3. R.Amirtharajan, Adharsh.D, Vignesh.V and R.John Bosco Balaguru, “PVD Blend with Pixel Indicator - OPAP Composite for High Fidelity Steganography” IJCA October edition 2010.
  4. R.Amirtharajan, Sandeep Kumar Behera, Motamarri Abhilash Swarup, Mohamed Ashfaaq K and John Bosco Balaguru Rayappan, “ Colour Guided Colour Image Steganography” Universal Journal of Computer Science and Engineering Technology 1 (1) (2010), 16-23.
  5. R.Amirtharajan and Dr. R. John Bosco Balaguru, “Tri-Layer Stego for Enhanced Security – A Keyless Random Approach” - IEEE Xplore, DOI, 10.1109/IMSAA.2009.5439438.
  6. R.Amirtharajan, R. Akila, P.Deepikachowdavarapu, “A Comparative Analysis of Image Steganography”. International Journal of Computer Applications 2(3)(2010):41–47.
  7. R.Amirtharajan, Krishnendra Nathella and J Harish, “Info Hide – A Cluster Cover Approach” International Journal of Computer Applications 3(5)(2010) 11–18.
  8. Bruice Schneier, Applied Cryptography Protocols, Algorithm and Source Code in C. Second edition. Wiley India edition 2007
  9. W. Bender, D. Gruhl, N. Morimoto, A. Lu, “Techniques for data hiding” IBM Syst. J. 35 (3&4) (1996) 313–336.
  10. C.K. Chan, L.M. Chen, Hiding data in images by simple LSB substitution, Pattern Recognition 37 (3) (2004) 469–474.
  11. Chang, C.C., Hsiao, J.Y., Chan, C.S., 2003. Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy. Pattern Recognition 36 (July), 1583–1595.
  12. Chang, C.C., Tseng, H.W., 2004. A steganographic method for digital images using side match. Pattern Recognition Letter 25 (September), 1431–1437.
  13. F.A.P. Petitcolas, R.J. Anderson, M.G. Kuhn, Information hiding—a survey, Proc. IEEE 87 (7) (1999) 1062–1078.
  14. S. Katzenbeisser, F.A.P. Petitcolas, Information Hiding Techniques for Steganography and Digital Watermarking, Artech House, Norwood, MA, 2000.
  15. Peter Wayner, “Disappearing cryptography: information hiding : steganography & watermarking” 2nd. ed. San Francisco: Morgan Kaufmann; 2002.
  16. N. Provos and P. Honeyman, “Hide and seek: An introduction to steganography,” IEEE Security Privacy Mag.,1 (3) (2003) 32–44
  17. C.C. Thien, J.C. Lin, A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function, Pattern Recognition 36 (11) (2003) 2875–2881
  18. Po-Yueh Chen Hung-Ju Lin, “A DWT Based Approach for Image Steganography”, International Journal of Applied Science and Engineering 4(3)(2006): 275-290
  19. R.Z. Wang, C.F. Lin, J.C. Lin, Image hiding by optimal LSB substitution and genetic algorithm, Pattern Recognition 34 (3) (2000) 671–683
Index Terms

Computer Science
Information Sciences

Keywords

Modified LSB Optimal Pixel Adjustment Process (OPAP) Pixel Indicator(PI)