We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

LSB Steganography based on Variable Key Encryption

by Menka Goswami, Vishal Gupta, Anil Kumar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 78 - Number 2
Year of Publication: 2013
Authors: Menka Goswami, Vishal Gupta, Anil Kumar
10.5120/13465-0937

Menka Goswami, Vishal Gupta, Anil Kumar . LSB Steganography based on Variable Key Encryption. International Journal of Computer Applications. 78, 2 ( September 2013), 41-44. DOI=10.5120/13465-0937

@article{ 10.5120/13465-0937,
author = { Menka Goswami, Vishal Gupta, Anil Kumar },
title = { LSB Steganography based on Variable Key Encryption },
journal = { International Journal of Computer Applications },
issue_date = { September 2013 },
volume = { 78 },
number = { 2 },
month = { September },
year = { 2013 },
issn = { 0975-8887 },
pages = { 41-44 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume78/number2/13465-0937/ },
doi = { 10.5120/13465-0937 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:50:36.812518+05:30
%A Menka Goswami
%A Vishal Gupta
%A Anil Kumar
%T LSB Steganography based on Variable Key Encryption
%J International Journal of Computer Applications
%@ 0975-8887
%V 78
%N 2
%P 41-44
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper we have explored a new dimension in image steganography and propose a deft method for image – secret data – keyword (steg key) based sampling, encryption and embedding the former with a variable bit retrieval function. The keen association of the image, secret data and steg key, varied with a pixel dependent embedding results in a highly secure, reliable L. S. B. substitution. Meticulous statistical analysis has been provided to emphasize the strong immunity of the algorithm to the various steganalysis methods in the later sections of the paper.

References
  1. A. D. Ker, "Steganalysis of LSB matching in grayscale images", IEEE Signal processing letters, vol. 12, no. 6, pp. 441-444, 2005.
  2. C. -K. Chan, L. M. Cheng, "Hiding data in images by simple LSB substitution," Pattern Recognition Vol. 37,Issue 3, pp. 469-474, 2004.
  3. Stefan Hetzl1 and Petra Mutzel2, "A Graph–Theoretic Approach to Steganography" J. Dittmann, S. Katzenbeisser, and A. Uhl (Eds. ): CMS 2005, LNCS 3677, pp. 119–128, 2005( IFIP International Federation for Information Processing 2005).
  4. Jonathan Cummins, Patrick Diskin, Samuel Lau and Robert Parlett, " Steganography and Digital Watermarking," School of Computer Science, The University of Birmingham.
  5. C. Cachin, "An information-theoretic model for steganography," Information and Computation vol. 192, pp. 41–56, July 2004. (Preliminary version appeared in Proc. 2ndWorkshop on Information Hiding, Lecture Notes in Computer Science, vol. 1525, Springer, 1998. ).
  6. B. Pfitzmann, "Information hiding terminology," in Information Hiding, First International Workshop (R. Anderson, ed. ), vol. 1174 of Lecture Notes in Computer Science, pp. 347–350, Springer,1996.
  7. Rajarathnam Chandramouli, Mehdi Kharrazi, and Nasir Memon, "Image Steganography and Steganalysis: Concepts and Practice" T. Kalker et al. (Eds. ): IWDW 2003, LNCS 2939, pp. 35–49, 2004. ( Springer-Verlag Berlin Heidelberg 2004).
  8. R. Chandramouli and N. Memon, "Analysis of lsb image steganography techniques,"IEEE Intnl. Conf. on Image Processing, vol. 3, pp. 1019–1022, 2001.
Index Terms

Computer Science
Information Sciences

Keywords

Encryption L. S. B. Secret data.