We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Working and Comparative Analysis of Various Spatial Based Image Steganography Techniques

by Dimple Anandpara, Amit Kothari
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 113 - Number 12
Year of Publication: 2015
Authors: Dimple Anandpara, Amit Kothari
10.5120/19876-1880

Dimple Anandpara, Amit Kothari . Working and Comparative Analysis of Various Spatial Based Image Steganography Techniques. International Journal of Computer Applications. 113, 12 ( March 2015), 8-12. DOI=10.5120/19876-1880

@article{ 10.5120/19876-1880,
author = { Dimple Anandpara, Amit Kothari },
title = { Working and Comparative Analysis of Various Spatial Based Image Steganography Techniques },
journal = { International Journal of Computer Applications },
issue_date = { March 2015 },
volume = { 113 },
number = { 12 },
month = { March },
year = { 2015 },
issn = { 0975-8887 },
pages = { 8-12 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume113/number12/19876-1880/ },
doi = { 10.5120/19876-1880 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:50:44.198373+05:30
%A Dimple Anandpara
%A Amit Kothari
%T Working and Comparative Analysis of Various Spatial Based Image Steganography Techniques
%J International Journal of Computer Applications
%@ 0975-8887
%V 113
%N 12
%P 8-12
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Steganography is the technique to the fact that communication is taking place, by hiding secure information in other information. Secret data can embed in different types of objects like text file, audio, image or video but image is commonly used as carrier file for steganography. For hiding secret information a large variety of image steganography techniques are available with their respective pros and cons. Some algorithm provides more payload capacity while some provide more robustness against attack. This paper provides working and comparative analysis of some of the existing spatial based image steganography techniques.

References
  1. Potdar, V. , and Chang, E "Gray Level Modification Steganography for Secret Communication" IEEE International Conference on Industrial Informatics, Berlin, Germany, 2004.
  2. W. Bender, D. Gruhl,N. Morimoto and A. Lu "Techniques for data Hiding" IEEE IBM System Journals, Vol. 35, 1996.
  3. E. Kawaguchi, R. O. Eason "Principal and Applications of BPCS Steganography", Proc of SPIE, Vol. 3528, pp. 464-473, 1998.
  4. Chin-Chen Chang, Min-Hui Lin, Yu-Chen Hu "A Fast And Secure Image Hiding Scheme Based on LSB Substitution" International Journal of Pattern Recognition and Artificial Intelligence, 2002.
  5. Omer Kurtulud ,Nafiz Arica "A New Steganography Method Using Image Layers" IEEE Computer and Information Sciences, 2008.
  6. Morteza Bashardoost, Ghazali Bin Sulong and Parisa Gerami "Enhanced LSB Image Steganography Method By Using Knight Tour Algorithm, Vigenere Encryption and LZW Compression" International Journal of Computer Science, 2013.
  7. Lip Yee Por, Delina Beh,Tan Fong Ang and Sim Ying Ong "An Enhanced Mechanism for Image Steganography Using Sequential Color Cycle Algorithm" The International Arab Journal of Information Technology, 2013.
  8. Juan José Roque, Jesús María Minguet "SLSB: Improving the Steganographic Algorithm LSB" Universidad Nacional de Educación a Distancia (Spain).
  9. T. Mokel, J. H. P. Eloff, M. S. Olivier "An Overview Of Image Steganography" in proceedings of the fifth annual Information Security, South Africa , 2005.
  10. Shang-Kuan Chen, Ja-Chen Lin "Image hiding by LSB matching of higher payload" IEEE, Sixth International Conference on Genetic and Evolutionary Computing, 2012.
  11. Vinit Agham, Tareek Pattewar "A Novel Approach Towards Separable Reversible Data Hiding Technique" IEEE, 2014.
  12. B. Karthikeyan, V. Vaithiyanathan, B. Thamotharan, M. Gomathymeenakshi and S. Sruti "LSB Replacement Steganography Using Psudoranomise Key Generation" Research Journal of Applied Sciences, Engineering and Technology, 2012.
  13. J. K. Mandal, AKhamrui "A Data-Hiding Scheme for Digital Image Using Pixel Value Differencing (DHPVD)" IEEE Electronic System Design (ISED), 2011.
  14. X. Liao, Q. Y. Wen, and J. Zhang "A steganographic method for digital images with four-pixel differencing and modified LSB substitution" journal homepage: www. elsevier. com/ locate/ jvci.
  15. Himakshi, Harsh Kumar Verma, Ravindra Kumar Singh, Charan Kamaljit Singh "Bi-Directional pixel-value differencing approach for RGB Color Image" IEEE 2013.
  16. Youssef Bassil "Image Steganography based on a Parameterized Canny Edge Detection Algorithm" International Journal of Computer Applications, Vol. 16, No. 4, December 2012.
  17. Wen-Jan Chen, Chin-Chen Chang, T. Hoang Ngan Le "High payload steganography mechanism using hybrid edge detector" journal homepage www. elsevier. com/locate/eswa.
  18. Gandharba Svalin, Saroj Kumar Lenka "A Novel Approach to RGB Channel Based Image Steganography technique" International Arab Journal of Technology, 2012.
  19. P. Mahimah, Mrs. R. Kurinji "Zigzag Pixel Indicator based Secret Data Hiding Method" IEEE International Conference on Computational Intelligence and Computing Research, 2013.
  20. M. Shobana, R. Manikandan "Efficient Method for hiding data using color intensity" International Journal of Engineering and Technology (IJET), Vol 5 No 1, Feb-Mar 2013.
  21. Xuefeng Wang, Zhen Yao and Chang-Tsun Li "Palette Based Image Steganographic Method Using Color Quantization" IEEE Image Processing, 2005.
Index Terms

Computer Science
Information Sciences

Keywords

Steganography spatial domain LSB