We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Adaptive Randomization in Image Steganography Pertaining to Most Significant Nibble

by Ravuru Rakesh, Shantan Devathi, Prashanth Sekhar Chandra Sekaran, Siram Sanath Kumar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 22 - Number 3
Year of Publication: 2011
Authors: Ravuru Rakesh, Shantan Devathi, Prashanth Sekhar Chandra Sekaran, Siram Sanath Kumar
10.5120/2567-3529

Ravuru Rakesh, Shantan Devathi, Prashanth Sekhar Chandra Sekaran, Siram Sanath Kumar . Adaptive Randomization in Image Steganography Pertaining to Most Significant Nibble. International Journal of Computer Applications. 22, 3 ( May 2011), 1-6. DOI=10.5120/2567-3529

@article{ 10.5120/2567-3529,
author = { Ravuru Rakesh, Shantan Devathi, Prashanth Sekhar Chandra Sekaran, Siram Sanath Kumar },
title = { Adaptive Randomization in Image Steganography Pertaining to Most Significant Nibble },
journal = { International Journal of Computer Applications },
issue_date = { May 2011 },
volume = { 22 },
number = { 3 },
month = { May },
year = { 2011 },
issn = { 0975-8887 },
pages = { 1-6 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume22/number3/2567-3529/ },
doi = { 10.5120/2567-3529 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:08:25.540388+05:30
%A Ravuru Rakesh
%A Shantan Devathi
%A Prashanth Sekhar Chandra Sekaran
%A Siram Sanath Kumar
%T Adaptive Randomization in Image Steganography Pertaining to Most Significant Nibble
%J International Journal of Computer Applications
%@ 0975-8887
%V 22
%N 3
%P 1-6
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

With innovations ruling the world, there has been a phenomenal growth of e-commerce leading to a lot of transactions taking place online in Internet. To safely transfer data, an existing technique called steganography is used. The goal of steganography is to insert a message into a carrier signal so that it can’t be detected by unintended recipients. Images, video, and audio being the widespread carrier media steganalysis attempts to discover hidden messages in suspected covers are at the least detectable when they are more randomized. Therefore one of the important considerations in steganography is to have a meliorated randomization technique. To provide better randomization we propose few techniques in image steganography which use adaptive way of randomization by embedding the data in to the bits of “least significant nibble” pertaining to bits in “most significant nibble”.

References
  1. Moerland, T., “Steganography and Steganalysis”, Leiden Institute of Advanced Computing Science,
  2. Silman, J., “Steganography and Steganalysis: An Overview”, SANS Institute, 2001
  3. Jamil, T., “Steganography: The art of hiding information is plain sight”, IEEE Potentials, 18:01, 1999
  4. Wang, H & Wang, S, “Cyber warfare: Steganography vs. Steganalysis”, Communications of the ACM, 47:10, October 2004
  5. Anderson, R.J. &Petitcolas, F.A.P., “On the limits of steganography”, IEEE Journal of selected Areas in Communications, May 1998
  6. Marvel, L.M., Boncelet Jr., C.G. &Retter, C., “Spread Spectrum Steganography”, IEEE Transactions on image processing, 8:08, 1999
  7. Johnson, N.F. &Jajodia, S., “Exploring Steganography: Seeing the Unseen”, Computer Journal, February 1998
  8. C.C. Thien, J.C. Lin, A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function, Pattern Recognition 36 (11) (2003) 2875–2881.
  9. Krenn, R., “Steganography and Steganalysis”,
  10. BruiceSchneier, Applied Cryptography Protocols, Algorithm and Source Code in C. Second edition. Wiley India edition 2007
  11. W. Diffie and M. E. Hellman, ―Exhaustive Cryptanalysis of the NBS Data Encryption Standard,‖ IEEE Computer, Vol.10, 1977, pp. 74-84.
  12. R. L. Rivest, A. Shamir, and L. Adleman, ―A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, vol. 21, no. 2, (1978) 120–126.
  13. Westfeld Space filling curves in steganalysis in E.J Delp III & P.W. Wong (Eds), Security, Steganography and watermarking of multimedia contents VII SPIE 5681, (2005) 28-37.
  14. F.A.P. Petitcolas, R.J. Anderson, M.G. Kuhn, Information hiding—a survey, Proc. IEEE 87 (7) (1999) 1062–1078.
  15. S. Katzenbeisser, F.A.P. Petitcolas, Information Hiding Techniques for Steganography and Digital Watermarking, Artech House, Norwood, MA, 2000.
  16. W. Bender, D. Gruhl, N. Morimoto, A. Lu, Techniques for data hiding, IBM Syst. J. 35 (3&4) (1996) 313–336.
  17. Yuan-Hui Yu , Chin-Chen Chang, Iuon-Chang Lin, A new steganographic method for color and grayscale image hiding, Computer Vision and Image Understanding 107 (2007) 183–194
  18. C.K. Chan, L.M. Chen, Hiding data in images by simple LSB substitution, Pattern Recognition 37 (3) (2004) 469–474.
  19. R.Z. Wang, C.F. Lin, J.C. Lin, Image hiding by optimal LSB substitution and genetic algorithm, Pattern Recognition 34 (3) (2000) 671–683.
  20. Adnan Gutub, "Pixel Indicator Technique for RGB Image Steganography", Journal of Emerging Technologies in Web Intelligence (JETWI) (2010)2(1) 56-64
  21. Hans Sagan, Space-Filling Curves, Springer-Verlag, New York, (1994). ISBN: 0-387-94265-3
  22. Provos, N., Honeyman, P, Hide and seek: An introduction to steganography, IEEE Security & Privacy Magazine 1 (2003) 32-44.
Index Terms

Computer Science
Information Sciences

Keywords

Information hiding Image Steganography Adaptive randomization