CFP last date
20 December 2024
Reseach Article

Auto Key Generation and Minimal Image Distortion Mechanism for Image Steganography

by Yuvraj Hembade, Nikita Bhanose, Grishma Kulkarni, Utkarsha Memane, Jayashree Patil
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 179 - Number 17
Year of Publication: 2018
Authors: Yuvraj Hembade, Nikita Bhanose, Grishma Kulkarni, Utkarsha Memane, Jayashree Patil
10.5120/ijca2018916294

Yuvraj Hembade, Nikita Bhanose, Grishma Kulkarni, Utkarsha Memane, Jayashree Patil . Auto Key Generation and Minimal Image Distortion Mechanism for Image Steganography. International Journal of Computer Applications. 179, 17 ( Feb 2018), 36-40. DOI=10.5120/ijca2018916294

@article{ 10.5120/ijca2018916294,
author = { Yuvraj Hembade, Nikita Bhanose, Grishma Kulkarni, Utkarsha Memane, Jayashree Patil },
title = { Auto Key Generation and Minimal Image Distortion Mechanism for Image Steganography },
journal = { International Journal of Computer Applications },
issue_date = { Feb 2018 },
volume = { 179 },
number = { 17 },
month = { Feb },
year = { 2018 },
issn = { 0975-8887 },
pages = { 36-40 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume179/number17/28962-2018916294/ },
doi = { 10.5120/ijca2018916294 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:55:41.331804+05:30
%A Yuvraj Hembade
%A Nikita Bhanose
%A Grishma Kulkarni
%A Utkarsha Memane
%A Jayashree Patil
%T Auto Key Generation and Minimal Image Distortion Mechanism for Image Steganography
%J International Journal of Computer Applications
%@ 0975-8887
%V 179
%N 17
%P 36-40
%D 2018
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Nowadays, due to extensive usage of internet for communication, the possibility, threat to data being communicated can’t be neglected. Wherever there is a need to have secrecy of the data, there must be a strong technique of encryption.To improve the security features in case of data transfers over the internet, the techniques that have been known till now are like Cryptography, Steganography, etc. Where Cryptography is defined as the method to conceal information by encrypting plaintexts to cipher texts and later transmitting it to the intended recipient using an unknown key, on the other hand Steganography provides or extends security further to a high level by hiding the cipher text into text, image or other formats. For hiding secret information in images, there are many steganography techniques. Each of them has strong and weak points. The methods used before, were having limitations of payload capacity, specific image formats to be used, and more distortion of image quality. The major advantages of this work are having maximum payload capacity, minimum kind of distortion in actual image quality, negligible change into original covert medium and encrypted file.

References
  1. Rupali Jain, Jayashree Boradh, Advances in digital image steganography, IEEE 2016.
  2. Saha, B. and Sharma, S., Steganographic Techniques of Data Hiding using Digital Images Defence Science Journal, Vol. 62, No. 1, January, pp. 11-18, DESIDOC, 2012.
  3. Bhatacharya, A., Banerjee, I., and Sanyal, G., A survey of steganography and steganalysis techniques in image, text, audio and video cover carrier”, Journal of Global Research in Computer Science, vol.2, no.4, pp.1-16, 2011.
  4. Morkel, J.H.P. Eloff, M.S. Olivier, “An overview of image steganography”, http://mo.co.za/openistegoverview.pdf.
  5. Sellars, Duncan, “Introduction to steganography”,http://www.cs.uct.ac.za/courses/CS400WINIS/papers99/dsellars/stego.html.
  6. Moerland, T., Steganography and Steganalysis, Leiden Institute of Advanced Computing Science, www.liacs.nl /home/ tmoerl/privtech.
  7. Rafael C. Gonzalez and Richard E. Woods, “Digital Image Processing”, Pearson Education India, 2009.ISBN- 8131726959, 9788131726952.
  8. Gandharba Swain,Saroj Kumar Lenka,Classification of Image Steganography Techniques in Spatial Domain: A Study,Vol. No.5,IJCSET 2014.
  9. Chan, C. K. and Chang, L. M.,hiding data images by simple LSB substitution, Pattern recognition, vol 37 pp 469-474,2004.
  10. Wu, C., Tsai, W.H.,Asteganographic method for images by pixel-value differencing,Pattern Recognition Letters vol 24,pp1613-1626,2003.
  11. Kaur, J., Duhan, M., Kumar, A., Yadav, R.K.,Matrix matching method for secret communication using image steganography, Fascicule 3. ISSN 1584 – 2673, 2012
  12. William Stallings, “Cryptography and Network Security Principles and Practices”, Fifth Edition, (2005).
  13. Mahendra Kumar,“ Steganography and steganalysis of JPEG images” ,2011.
Index Terms

Computer Science
Information Sciences

Keywords

Covert image Plaintext Payload Capacity