We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

Image based Secret Communication using Double Compression

by Chaitanya Kommini, Kamalesh Ellanti, Srinivasulu Asadi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 21 - Number 7
Year of Publication: 2011
Authors: Chaitanya Kommini, Kamalesh Ellanti, Srinivasulu Asadi
10.5120/2526-3437

Chaitanya Kommini, Kamalesh Ellanti, Srinivasulu Asadi . Image based Secret Communication using Double Compression. International Journal of Computer Applications. 21, 7 ( May 2011), 6-9. DOI=10.5120/2526-3437

@article{ 10.5120/2526-3437,
author = { Chaitanya Kommini, Kamalesh Ellanti, Srinivasulu Asadi },
title = { Image based Secret Communication using Double Compression },
journal = { International Journal of Computer Applications },
issue_date = { May 2011 },
volume = { 21 },
number = { 7 },
month = { May },
year = { 2011 },
issn = { 0975-8887 },
pages = { 6-9 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume21/number7/2526-3437/ },
doi = { 10.5120/2526-3437 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:07:51.673437+05:30
%A Chaitanya Kommini
%A Kamalesh Ellanti
%A Srinivasulu Asadi
%T Image based Secret Communication using Double Compression
%J International Journal of Computer Applications
%@ 0975-8887
%V 21
%N 7
%P 6-9
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The Information exchange via any media needs privacy and secrecy. Cryptography is widely used for providing privacy and secrecy between the sender and receiver. But, now, along with Cryptography, we are using Steganography to have more protection to our hidden data. In this paper, we show how a JPEG can be used as an embedding space for a message by adjusting the values in the JPEG Quantization tables (QTs). This scheme also uses some permutation algorithms and it can be widely used for secret communication. This JPEG double compression will give satisfactory decoded results.

References
  1. K. Raja and C. Chowdary, “A secure image steganography using LSB, DCT and compression techniques on raw images,” in 3rd Int. Conf. Intelligent Sensing and Information Processing, 2005, pp. 170–176.
  2. Z. Ni and Y. Shi, “Robust lossless image data hiding designed for semi-fragile image authentication,” IEEE Trans. Circuits Syst. Video Technol., vol. 18, no. 4, pp. 497–509, 2008.
  3. G. Gul and F. Kurugollu, “A novel universal steganalyser design: “LogSv”,” in IEEE Int. Conf. Image Processing (ICIP 2009), Cairo, Egypt, 2009.
  4. H. Farid, “Exposing digital forgeries from JPEG ghosts,” IEEE Trans. Inform. Forensics Security, vol. 4, no. 1, pp. 154–160, Mar. 2009.
  5. W. B. Pennebaker and J. L. Mitchell, JPEG: Still Image Data Compression Standard. New York: Springer, 1993.
  6. [Online].Available: http://www.impulseadventure.com/photo/jpeg-quantization.html
  7. G. Voyatzis and I. Pitas, “Applications of toral auto-morphisms in image watermarking,” in Int. Conf. Image Processing, Proceedings, 1996, vol. 1, pp. 237–240.
  8. H. K. Tso et al., “A lossless secret image sharing method,” in 8th Int. Conf. Intelligent Systems Designs and Application, 2008, pp. 616–619.
  9. [Online]. Available: Detection framework can be found at http://www.citi.umich.edu/u/-provos/papers/detecting.pdf. Supporting technical document and the utility can be downloaded at http://www.outguess.org
  10. S. Lyu and H. Farid, “Steganalysis using color wavelet statistics and one-class support vector machine,” in SPIE Symp. Electronic Imaging, 2004 [Online]. Available: http://www.cs.dartmouth.edu/farid/research/
Index Terms

Computer Science
Information Sciences

Keywords

Quantization Tables JPEG Compression Steganography Double Compression