We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

Steganography using the Technique of Orderly Changing of Pixel Components

by Madhu Bahl, Akshay Girdhar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 58 - Number 6
Year of Publication: 2012
Authors: Madhu Bahl, Akshay Girdhar
10.5120/9285-3477

Madhu Bahl, Akshay Girdhar . Steganography using the Technique of Orderly Changing of Pixel Components. International Journal of Computer Applications. 58, 6 ( November 2012), 14-17. DOI=10.5120/9285-3477

@article{ 10.5120/9285-3477,
author = { Madhu Bahl, Akshay Girdhar },
title = { Steganography using the Technique of Orderly Changing of Pixel Components },
journal = { International Journal of Computer Applications },
issue_date = { November 2012 },
volume = { 58 },
number = { 6 },
month = { November },
year = { 2012 },
issn = { 0975-8887 },
pages = { 14-17 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume58/number6/9285-3477/ },
doi = { 10.5120/9285-3477 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:01:44.856579+05:30
%A Madhu Bahl
%A Akshay Girdhar
%T Steganography using the Technique of Orderly Changing of Pixel Components
%J International Journal of Computer Applications
%@ 0975-8887
%V 58
%N 6
%P 14-17
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A new proposed scheme is presented for digital image steganography which is a kind of spatial domain technique, works with the orderly replacement of the pixel components with the text data that is to be embedded . Proposed work is concentrated on 8 bits of a pixel (8 bits of Red or Green or blue component of a pixel in a 24 bit image), resulting better image quality. The proposed scheme shows higher PSNR and lower MSE than those generated by the reported schemes. To prove this scheme, several experiments are performed and compared the experimental results with the related previous works [6].

References
  1. Anderson, R. and Kuhn, M. , "Information Hiding - A Survey", Proceedings of IEEE Conference IEEE International Conference (IEEE, 1999), pp. 1062-1078.
  2. Caldwell,J. , "Steganography", Software Engineering Technology, pp. 25-27 (2003).
  3. Chen, Chen,M. ,Agaian,S. and Chen,C. ,"Generalized Collage Steganography on Images" Proceedings of IEEE International Conference (IEEE,2008), pp. 1043-1047.
  4. Cummins, J. Diskin, Patrick and Parlett, R. ,School of Computer Science, The University of Birmingham, "Steganography and Digital Watermarking" (2004).
  5. Johnson, N. and Jajodia, S. , "Exploring Steganography: Seeing the Unseen", Proceedings of IEEE International Conference on Computing Practices (IEEE, 1999), pp. 26-34.
  6. Kaur,A. ,Dhir,R. and Sikka,G. ,"A New Steganography Based on First Component Alteration Technique", International Journal of Computer Science and Information Security (IJCSIS,2009) , pp. 53-56 .
  7. Lie, W. and Chang, W. ," Data hiding in images with adaptive number of least significant bits based on the human visual system", Proceedings of IEEE International Conference, (IEEE, 1999), pp. 286–290.
  8. Moon, S. and Kawitkar, R. ,"Data Security using Data Hiding", Proceedings of IEEE International Conference on Computational Intelligence and Multimedia Applications, (IEEE, 2007), pp. 247-251.
  9. Swanson, M. and Zhu, B. , "Robust Data Hiding for Images", IEEE Digital Signal Processing Workshop (IEEE, 1996), pp. 37-40.
  10. Thampi, S. ,"Information Hiding Techniques: A Tutorial Review", ISTE-STTP onNetwork Security & Cryptography, LBSCE (2004).
  11. Yang, C. ,"Color Image Steganography based on Module Substitutions", Third International Conference on International Information Hiding and Multimedia Signal Processing (IEEE,2007), pp. 118-121.
  12. Yu1, J. Yoon2, E. and Yoo, K. ," A New Image Steganography Based on 2k Correction and Edge-Detection", ITNG Proceedings of the Fifth International Conference on Information Technology: New Generations (IEEE,2008), pp. 563-568.
  13. H. -C. Wu, N. -I. and Hwang, M. -S. ," Image steganographic scheme based on pixel-value differencing and LSB replacement methods", Proceedings of IEEE International Conference on Vis. Image Signal Process. , (IEEE,2005) pp. 611-615.
Index Terms

Computer Science
Information Sciences

Keywords

Steganography Stego image Cover image Peak Signal to Noise Ratio Mean Square Error