We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

Transmission of Hidden Cipher Text over a Binary Symmetric Channel

by Arun Rana, Nitin Sharma, Parveen Malik
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 53 - Number 15
Year of Publication: 2012
Authors: Arun Rana, Nitin Sharma, Parveen Malik
10.5120/8501-2451

Arun Rana, Nitin Sharma, Parveen Malik . Transmission of Hidden Cipher Text over a Binary Symmetric Channel. International Journal of Computer Applications. 53, 15 ( September 2012), 40-43. DOI=10.5120/8501-2451

@article{ 10.5120/8501-2451,
author = { Arun Rana, Nitin Sharma, Parveen Malik },
title = { Transmission of Hidden Cipher Text over a Binary Symmetric Channel },
journal = { International Journal of Computer Applications },
issue_date = { September 2012 },
volume = { 53 },
number = { 15 },
month = { September },
year = { 2012 },
issn = { 0975-8887 },
pages = { 40-43 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume53/number15/8501-2451/ },
doi = { 10.5120/8501-2451 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:54:13.215529+05:30
%A Arun Rana
%A Nitin Sharma
%A Parveen Malik
%T Transmission of Hidden Cipher Text over a Binary Symmetric Channel
%J International Journal of Computer Applications
%@ 0975-8887
%V 53
%N 15
%P 40-43
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A new high capacity and robust image steganography method based on human vision sensitivity is introduced. Kohonen Neural network is trained according to the contrast sensitivity of pixels present in cover image. Trained network classify the pixels of cover image in different levels of sensitivity. Data embedding is performed by LSB substitution method, which replaces the least significant bits of cover image with secret information that would be embedded. But prior to embedding, cryptography is applied on text. We used Optimal Pixel Adjustment Process (OPAP) to obtain an optimal mapping function to reduce the difference error between the original image and the stego-image, therefore improving the hiding capacity with low distortions. On the destination side, the original image is not needed for extracting the embedded data. Convolution Code are also used to improve performance of existing algorithm over binary symmetric channel (BSC). It is observed that the capacity and security is increased with acceptable PSNR in the proposed algorithm compared to the existing algorithm.

References
  1. Li Zhi,Sui Ai Fen and Yang Yi Xian,2003, " A LSB Steganography Detection algorithm" in Proceeding of 14th International Symposium on Personal Indoor and Mobile Radio Communication, pp. 2780-2783.
  2. M. Niimi, H. Noda and B. Segee. 2005. A Robust BPCS-Steganography against Visual Attacks: 5th International Conference on Information Communication and Signal Processing (IICSP), pp. 1116-1120 .
  3. Dr. Fadhil Salman Abed, Nada Abdul Aziz Mustafa,"A proposed Technique for Information Hiding Based on DCT" International Journal of Advancements in Computing Technology Vol. 2, Number 5, 201, pp. 184-188.
  4. Anil et. al. 2007, Robust and Secret Data Transmission Over the Noisy Channel in proceeding of International conference on signal processing and Networking, IEEE, pp. 199-203
  5. Zhang Jiajia et. al, 2009, "A Steganographic Method based on SOM and Wavelet Contrast" in proceeding of International Conference on Artificial Intelligence and Computational Intelligence, pp. 481-484.
  6. K B Raja et. al, "Performance Comparison of Robust Steganography Based on Multiple Transformation Techniques" International Journal of Computer Technology and Applications, 2011. pp. 1035-1048.
  7. Chi-Kwong Chan, L. M. Cheng. 2001, "Improved hiding data in images by optimal moderately significant-bit replacement" IEEE Electron. Letter 37 (16)) 1017–1018.
  8. H. Ritter, K. Schulten. 1988. Kohonen's Self Organizing maps: exploring their Computational Capabilities in proceeding of IEEE International Conference on Neural Networks, ICNN, pp. 109-116.
  9. Arun Rana et. al,"Image Steganography Method Based on Kohonen Neural Network" International Journal of Engineering Research, 2012, pp. 2234-2237.
Index Terms

Computer Science
Information Sciences

Keywords

OPAP BSC Convolution Codes