We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Robust Steganography based on Matching Pixel Locations

by Aminou Halidou, Youssoufa Mohamadou, Georges Delort Olle O.
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 168 - Number 12
Year of Publication: 2017
Authors: Aminou Halidou, Youssoufa Mohamadou, Georges Delort Olle O.
10.5120/ijca2017914252

Aminou Halidou, Youssoufa Mohamadou, Georges Delort Olle O. . Robust Steganography based on Matching Pixel Locations. International Journal of Computer Applications. 168, 12 ( Jun 2017), 3-10. DOI=10.5120/ijca2017914252

@article{ 10.5120/ijca2017914252,
author = { Aminou Halidou, Youssoufa Mohamadou, Georges Delort Olle O. },
title = { Robust Steganography based on Matching Pixel Locations },
journal = { International Journal of Computer Applications },
issue_date = { Jun 2017 },
volume = { 168 },
number = { 12 },
month = { Jun },
year = { 2017 },
issn = { 0975-8887 },
pages = { 3-10 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume168/number12/27925-2017914252/ },
doi = { 10.5120/ijca2017914252 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:15:56.376784+05:30
%A Aminou Halidou
%A Youssoufa Mohamadou
%A Georges Delort Olle O.
%T Robust Steganography based on Matching Pixel Locations
%J International Journal of Computer Applications
%@ 0975-8887
%V 168
%N 12
%P 3-10
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Steganography consist of concealing secret information in a cover object to be sent over a public communication channel. It allows two parties to share hidden information in a way that no intruder can detect the presence of hidden information. This paper presents a novel steganography approach based on pixel location matching of the same cover image. Here the information is not directly embedded within the cover image but a sequence of 4 bits of secret data is compared to the 4 most significant bits (4MSB) of the cover image pixels. The locations of the matching pixels are taken to substitute the 2 least significant bits (2LSB) of the cover image pixels. Since the data are not directly hidden in cover image, the proposed approach is more secure and difficult to break. Intruders cannot intercept it by using common LSB techniques.

References
  1. D. Wall, Cybercrime: The transformation of crime in the information age vol. 4: Polity, 2007.
  2. T. J. Holt and M. G. Turner, "Examining risks and protective factors of on-line identity theft," Deviant Behavior, vol. 33, pp. 308-323, 2012.
  3. S. A. Laskar and K. Hemachandran, "High Capacity data hiding using LSB Steganography and Encryption," International Journal of Database Management Systems, vol. 4, p. 57, 2012.
  4. B. Schneier, Schneier's Cryptography Classics Library: Applied Cryptography: Protocols, Algorithms, and Source Code in C, 1996.
  5. L. Ji, X. Li, B. Yang, and Z. Liu, "A further study on a PVD-based steganography," in Multimedia Information Networking and Security (MINES), 2010 International Conference on, 2010, pp. 686-690.
  6. S. Bhattacharyya, A. P. Kshitij, and G. Sanyal, "A novel approach to develop a secure image based steganographic model using integer wavelet transform," in Recent Trends in Information, Telecommunication and Computing (ITC), 2010 International Conference on, 2010, pp. 173-178.
  7. C.-C. Chang, J.-Y. Hsiao, and C.-S. Chan, "Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy," Pattern Recognition, vol. 36, pp. 1583-1595, 2003.
  8. A. Martin, G. Sapiro, and G. Seroussi, "Is image steganography natural?," IEEE Transactions on Image processing, vol. 14, pp. 2040-2050, 2005.
  9. E. Ghasemi, J. Shanbehzadeh, and N. Fassihi, "High capacity image steganography based on genetic algorithm and wavelet transform," in Intelligent Control and Innovative Computing, ed: Springer, 2012, pp. 395-404.
  10. G. Swain and S. K. Lenka, "Classification of image steganography techniques in spatial domain: a study," Int. J. Comput. Sci. Eng. Tech.(IJCSET), vol. 5, pp. 219-232, 2014.
  11. C. Chen and Y. Q. Shi, "JPEG image steganalysis utilizing both intrablock and interblock correlations," in Circuits and Systems, 2008. ISCAS 2008. IEEE International Symposium on, 2008, pp. 3029-3032.
  12. K. S. Kumar, K. Raja, R. Chhotaray, and S. Pattanaik, "Bit length replacement steganography based on dct coefficients," International Journal of Engineering Science and Technology, vol. 2, pp. 3561-3570, 2010.
  13. S. Bhattacharyya and G. Sanyal, "A robust image steganography using dwt difference modulation (DWTDM)," International Journal of Computer Network and Information Security, vol. 4, p. 27, 2012.
  14. C.-K. Chan and L.-M. Cheng, "Hiding data in images by simple LSB substitution," Pattern recognition, vol. 37, pp. 469-474, 2004.
  15. R. Chandramouli and N. Memon, "Analysis of LSB based image steganography techniques," in Image Processing, 2001. Proceedings. 2001 International Conference on, 2001, pp. 1019-1022.
  16. C.-S. Hsu and S.-F. Tu, "Finding optimal LSB substitution using ant colony optimization algorithm," in Communication Software and Networks, 2010. ICCSN'10. Second International Conference on, 2010, pp. 293-297.
  17. D.-C. Wu and W.-H. Tsai, "A steganographic method for images by pixel-value differencing," Pattern Recognition Letters, vol. 24, pp. 1613-1626, 2003.
  18. P. K. Panjabi and P. Singh, "An Enhanced Data Hiding Approach Using Pixel Mapping Method with Optimal Substitution Approach," International Journal of Computer Applications, vol. 74, 2013.
  19. H. Motameni, M. Norouzi, M. Jahandar, and A. Hatami, "Labeling method in Steganography," in Proceedings of world academy of science, engineering and technology, 2007, pp. 349-354.
  20. B. Karthikeyan, V. Vaithiyanathan, B. Thamotharan, M. Gomathymeenakshi, and S. Sruti, "LSB replacement steganography in an image using pseudorandomised key generation," Research Journal of Applied Sciences, Engineering and Technology, vol. 4, pp. 491-494, 2012.
  21. W. Luo, F. Huang, and J. Huang, "Edge adaptive image steganography based on LSB matching revisited," IEEE transactions on information forensics and security, vol. 5, pp. 201-214, 2010.
  22. D. Rawat and V. Bhandari, "A steganography technique for hiding image in an image using lsb method for 24 bit color image," International Journal of Computer Applications, vol. 64, 2013.
  23. K. M. Singh, L. S. Singh, A. B. Singh, and K. S. Devi, "Hiding secret message in edges of the image," in Information and Communication Technology, 2007. ICICT'07. International Conference on, 2007, pp. 238-241.
  24. C.-H. Yang, C.-Y. Weng, S.-J. Wang, and H.-M. Sun, "Adaptive data hiding in edge areas of images with spatial LSB domain systems," IEEE Transactions on Information Forensics and Security, vol. 3, pp. 488-497, 2008.
  25. A. Nag, J. P. Singh, S. Biswas, D. Sarkar, and P. P. Sarkar, "A Huffman code based image steganography technique," in International Conference on Applied Algorithms, 2014, pp. 257-265.
  26. N. Pandian, "An Image Steganography Algorithm Using Huffman and Interpixel Difference Encoding," International Journal of Computer Science & Security (IJCSS), vol. 8, p. 202, 2014.
Index Terms

Computer Science
Information Sciences

Keywords

Steganography 4MSB 2LSB Matching Pixel Locations.