CFP last date
20 January 2025
Reseach Article

Hybrid Domain in LSB Steganography

by K B Shiva Kumar, K B Raja, Sabyasachi Pattnaik
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 19 - Number 7
Year of Publication: 2011
Authors: K B Shiva Kumar, K B Raja, Sabyasachi Pattnaik
10.5120/2371-3121

K B Shiva Kumar, K B Raja, Sabyasachi Pattnaik . Hybrid Domain in LSB Steganography. International Journal of Computer Applications. 19, 7 ( April 2011), 35-40. DOI=10.5120/2371-3121

@article{ 10.5120/2371-3121,
author = { K B Shiva Kumar, K B Raja, Sabyasachi Pattnaik },
title = { Hybrid Domain in LSB Steganography },
journal = { International Journal of Computer Applications },
issue_date = { April 2011 },
volume = { 19 },
number = { 7 },
month = { April },
year = { 2011 },
issn = { 0975-8887 },
pages = { 35-40 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume19/number7/2371-3121/ },
doi = { 10.5120/2371-3121 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:06:23.716064+05:30
%A K B Shiva Kumar
%A K B Raja
%A Sabyasachi Pattnaik
%T Hybrid Domain in LSB Steganography
%J International Journal of Computer Applications
%@ 0975-8887
%V 19
%N 7
%P 35-40
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The maintenance of privacy and secrecy of information in modern communication is accomplished through steganographic technique. Spatial domain techniques are popular ones in image steganography. In this paper, we propose hybrid steganography (HDLS) which is an integration of both spatial and transform domains. The cover image as well as the payload is divided into two cells each. The RGB components of cover image cell I are separated and then transformed individually from spatial to transform domain using DCT/DWT/FFT and embedded in a special manner, the components of cell II retained in spatial domain itself. The proposed algorithm has better PSNR and security as compared to existing techniques.

References
  1. Takimoto, H Yoshimori, S Mitsukura, Y Fukumi and M Okayama, “Invisible Calibration Pattern Based on Human Visual Perception Characteristics,” International Conference on Pattern Recognition(ICPR), pp.4210-4213, 2010
  2. Zhi-Min He Ng, Wing W Y Chan, Patrick P K Yeung and Daniel S “Steganography Detection using Localized Generation Error Model,” International Conference on System Man and Cybernetics(SMS), pp.1544-1549, 2010
  3. Yifeng Sun Fenlin Liu, “Selecting Cover for Image Steganography by Correlation Coefficient,” International Workshop on Education Technology and Computer Science(ETCS), pp.159-162, vol 2 ,2010
  4. Sun, Qiudong Qiu, Yongping Ma, Wenxin Yan, Wenying Dai, Hong “Image Steganography Based on Sub-Band Coefficient Adjustment in BDCT Domain,” International conference on Multimedia Technology(ICMT), pp.1-4,2010
  5. Gallegos-Funes, F J Carvajal-Gamez, B E Lopez-Bonilla, J L Ponomaryov,, “SteganograpHic Method Based on Wavelets and Center Weighted Median Filter,” International Kharkov Symposium on Physics and Engineering of Microwaves, Millimeter and Submillimeter Waves(MSMW),pp.1-3,2010
  6. Weiqi Luo Fangjun Huang Jiwu Huang Guangdong, Sun Yat-Sen., Guangzhou, China “Edge Adaptive Image Steganography Based on LSB Matching Revisited,” IEEE Transactions on Information Forensics and Security, pp. 201 – 214, vol 5, 2010
  7. Shejul, A.A. Kulkarni,” A DWT Based Approach for Steganography Using Biometrics.” International Conference on Data Storage and Data Engineering (DSDE), pp.39 – 43,201
  8. Qinhua Huang Weimin Ouyang , Shanghai “Protect fragile regions in steganography LSB embedding,” 3rd International Symposium on Knowledge Acquisition and Modeling (KAM), pp.175 – 178,2010
  9. Ba noci, V Buga r, G Levicky , “Information hiding using pseudo-random number sequences with error correction,” 20th International Conference Radio elektronika ,pp. 1 – 4, 2010
  10. Jing-Ming Guo Thanh-Nam Le, Taipei “Secret communication Using JPEG Double Compression,” Signal Processing Letters, pp. 879 – 882, 2010
  11. Shirali-Shahreza, M.H. Shirali-Shahreza, S. Amirkabir, “Real-time and MPEG-1 layer III compression Resistant Steganography in Speech,” Information Security,IET, vol.4, pp. 1-7, January 2010
  12. Djebbar, Fatiha Abed-Meraim, Karim Guerchi, Driss Hamam and Habib, “Dynamic Energy Based Text-in-Speech Spectrum Hiding Using Speech Masking,” International conference on Industrial Mechatronics and Automation(ICIMA), vol.2, pp. 422-426, May 2010
  13. Yargi c og lu and A U I lk, “Hidden Data transmission in mixed excitation Linear Prediction Coded Speech using Quantisation Index Modulation,” Information Security IET, vol.4, pp. 158-166, September 2010
  14. Al-Nabhani, Y Zaidan B B , “A New System for Hidden Data Within Header space for EXE-File using Object Oriented Technique,” International Conference on Computer Science and Information Technology(ICCSIT), vol.7, pp. 9-13, 2010
  15. Zhao, Hong Shi, Yun Q Ansari and Nirwan, “Hiding Data in Multimedia Streaming Over Network,” Communication Networks and Services Research Conference (CNSR), pp. 50-55, 2010
  16. Hongmei Wang Limin Qu Fengru Wang, “A Triangular Algorithm of Image-Hiding,” World Congress on Intelligent Control and Automation (WCICA), pp. 1012-1016, July 2010
  17. Elshoura and Megherbi, “High Capacity Blind Information Hiding Scheme s Using Tchebichef Moments,” International Conference on Future Computer and Communication (ICFCC), vol 1, pp. 649-653, May 2010
  18. Jinsuk Baek Kim, Cheonshik Fisher and Paul S Hongyag Chao, “(N,1) Secret Sharing Approach Based on Steganography With Gray Digital Images,” International Conference on Wireless Communications, Networking and Information Security(WCNIS), pp. 325-329, June 2010
  19. Almohammad and A Ghinea, “Image Steganography and Chrominance Components,” International Conference on Computer and Information Technology(CIT), pp. 996-1001, July 2010
  20. Chi-Shiang Chan Ching-Yun Chang, “Hiding Secret in Parity Check Bits by Applying XOR Function,” International Conference on Cognitive Informatics (ICCI)), pp. 835-839, July 2010
Index Terms

Computer Science
Information Sciences

Keywords

Steganography Cover Image Payload Stego Image DCT FFT DWT LSB