We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

Article:An Application of Palette Based Steganography

by Prof. Samir Kumar Bandyopadhyay, Indra Kanta Maitra
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 6 - Number 4
Year of Publication: 2010
Authors: Prof. Samir Kumar Bandyopadhyay, Indra Kanta Maitra
10.5120/1067-1395

Prof. Samir Kumar Bandyopadhyay, Indra Kanta Maitra . Article:An Application of Palette Based Steganography. International Journal of Computer Applications. 6, 4 ( September 2010), 24-27. DOI=10.5120/1067-1395

@article{ 10.5120/1067-1395,
author = { Prof. Samir Kumar Bandyopadhyay, Indra Kanta Maitra },
title = { Article:An Application of Palette Based Steganography },
journal = { International Journal of Computer Applications },
issue_date = { September 2010 },
volume = { 6 },
number = { 4 },
month = { September },
year = { 2010 },
issn = { 0975-8887 },
pages = { 24-27 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume6/number4/1067-1395/ },
doi = { 10.5120/1067-1395 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:54:34.172572+05:30
%A Prof. Samir Kumar Bandyopadhyay
%A Indra Kanta Maitra
%T Article:An Application of Palette Based Steganography
%J International Journal of Computer Applications
%@ 0975-8887
%V 6
%N 4
%P 24-27
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Steganography is the art of writing hidden messages in such a way that no one; apart from the sender and intended recipient even understand there is a hidden message. Steganography includes the concealment of information within computer files. One of the most common methods of implementation is Least Significant Bit Insertion, in which the least significant bit of every byte is altered to form the bit-string representing the embedded file. Altering the LSB will only cause minor changes in color. While this technique works well for 24-bit color image files, steganography has not been as successful when using an 8-bit color image file, due to limitations in color variations and the use of a color table. Color table is organized as- the first three bytes correspond to RGB components and the last byte is reserved or unused. The proposed technique is to generate the image from a 24-bit bitmap to an 8-bit bitmap using color quantization resulted in minor variations in the image, which are barely noticeable to the human eye. However, these slight variations aid in hiding the data.

References
  1. Avcibas I, "Steganalysis Using Image Quality Metrics", IEEE Transactions on Image Processing, Vol 12, No. 2, February 2003.
  2. Chandramouli R, Kharrazi M & Memon N, “Image steganography and steganalysis: Concepts and Practice”, Proceedings of the 2nd International Workshop on Digital Watermarking, October 2003
  3. Chandramouli R and Memon N, "Analysis of LSB Based Image Steganography Techniques", IEEE 2001.
  4. Johnson N.F. and Jajodia S, "Exploring steganography: Seeing the Unseen", IEEE Computer, 31(2) (1998) pp 26- 34.
  5. Judge J.C, "Steganography: Past, present, future", SANS Institute publication, http://www.sans.org/ reading_room/whitepapers/stenganography/552.php, 2001.
  6. Krenn, R., “Steganography and Steganalysis”, http://www. krenn.nl/ univ/cry/steg/article.pdf
  7. Kurak C. and McHugh J, "A cautionary note on image downgrading", Proceedings of the IEEE 8th Annual Computer Security Applications Conference, 30 Nov-4 Dec 1992, pp 153-159.
  8. Moerland T, “Steganography and Steganalysis”, Leiden Institute of Advanced Computing Science, www.liacs.nl/home/ tmoerl/privtech.pdf
  9. Moulin P and Koetter R, "Data-hiding codes", Proceedings of the IEEE, 93 (12) (2005) pp 2083-2126.
  10. Provos N and Honeyman P, "Hide and seek: An introduction to steganography", IEEE Security and Privacy, 01 (3) (2003) pp 32-44.
  11. Reference guide: Graphics Technical Options and Decisions, http://www.devx.com/projectcool/Article/19997
  12. Sadkhan S.B, "Cryptography: Current status and future trends", Proceedings of IEEE International Conference on Information & Communication Technologies: From Theory to Applications, Damascus. Syria, April 19-23, 2004, pp 417-418.
  13. Simmons G.J, "The prisoners’ problem and the subliminal channel", Proceedings of International conference on Advances in Cryptology, CRYPTO83, August 22-24, 1984, pp 51-67.
  14. Tucker P, "Hiding secrets in computer files: steganography is the new invisible ink, as codes stow away on images", An article from The Futurist
  15. Xiang Z, "Color Image Quantization by Minimizing the Maximum Intercluster Distance", ACM Transactions on Graphics, Vol 16, No 3, July 1997, pp 260 - 276
Index Terms

Computer Science
Information Sciences

Keywords

Steganography Least significant bit (LSB) color Table Color Quantization Algorithm Euclidean Distance