CFP last date
20 January 2025
Reseach Article

An Image based Steganography Scheme Implying Pseudo-Random Mapping of Text Segments to Logical Region of Cover Image using a New Block Mapping Function and Randomization Technique

by Shiladitya Pujari, Sripati Mukhopadhyay
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 50 - Number 2
Year of Publication: 2012
Authors: Shiladitya Pujari, Sripati Mukhopadhyay
10.5120/7746-0799

Shiladitya Pujari, Sripati Mukhopadhyay . An Image based Steganography Scheme Implying Pseudo-Random Mapping of Text Segments to Logical Region of Cover Image using a New Block Mapping Function and Randomization Technique. International Journal of Computer Applications. 50, 2 ( July 2012), 40-46. DOI=10.5120/7746-0799

@article{ 10.5120/7746-0799,
author = { Shiladitya Pujari, Sripati Mukhopadhyay },
title = { An Image based Steganography Scheme Implying Pseudo-Random Mapping of Text Segments to Logical Region of Cover Image using a New Block Mapping Function and Randomization Technique },
journal = { International Journal of Computer Applications },
issue_date = { July 2012 },
volume = { 50 },
number = { 2 },
month = { July },
year = { 2012 },
issn = { 0975-8887 },
pages = { 40-46 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume50/number2/7746-0799/ },
doi = { 10.5120/7746-0799 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:47:19.015326+05:30
%A Shiladitya Pujari
%A Sripati Mukhopadhyay
%T An Image based Steganography Scheme Implying Pseudo-Random Mapping of Text Segments to Logical Region of Cover Image using a New Block Mapping Function and Randomization Technique
%J International Journal of Computer Applications
%@ 0975-8887
%V 50
%N 2
%P 40-46
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper presented a new scheme of image based Steganography where the secret message is divided or segmented into random number of units holding equal number of characters and the cover image is logically divided into a random number of square blocks. Each logical block of image is used to hide each unit of message in a pseudo-random fashion. These mappings are done by using a new mapping function.

References
  1. Huang W, Zhao Y and Rong-Rong Ni, Block-based Adaptive Image Steganography using LSB Matching Revisited, Journal of Electronic Science and Technology, Vol. 9 (4), 2011
  2. Luo W, Huang F and Huang J, Edge Adaptive Image Steganography Based on LSB Matching Revisited, IEEE Transaction on Information Forensics and Security, Vol. 5 (4), June 2010.
  3. Yang C and Wang S, Transforming LSB Substitution for Image-based Steganography in Matching Algorithms, Journal of Information Science and Engineering 26, 1199-1212, 2010.
  4. Shiva Kumar K B, Raja K B, Chhotaray R K, Pattanaik S, Bit Length Replacement Steganography Based On DCT Coefficients, International Journal of Engineering Science and Technology, Vol. 2 (8), 3561-3570, 2010.
  5. T Mrkel, JHP Eloff and MS Olivier. "An Overview of Image Steganography," in proceedings of the fifth annual Information Security South Africa Conference, 2005.
  6. L. Y. Por and B. Delina, "Information Hiding: A New Approach in Text Steganography", 7th WSEAS International Conference on Applied Computer & Applied Computational Science, April 2008, pp- 689-695.
  7. Analysis of LSB Based Image Steganography Techniques ,R. Chandramouli, Nasir Memon, Proc. IEEE ICIP, 2001.
  8. J. Y. Hsiao. C. C. Chang. and C. -S. Chan. Finding optimal least significant- bit substitution in image hiding by dynamic programming strategy. Pattern Recognition, 36:1583–1595, 2003.
  9. Potdar V. and Chang E. Gray level modification steganography for secret communication. In IEEE International Conference on Industria lInformatics, pages 355–368, Berlin, Germany, 2004.
  10. Potdar V. and Chang E. Gray level modification steganography for secret communication. In IEEE International Conference on Industria lInformatics, pages 355–368, Berlin, Germany, 2004.
Index Terms

Computer Science
Information Sciences

Keywords

Image-based steganography pseudo-random sequence secret message block mapping randomization