CFP last date
20 December 2024
Reseach Article

Steganalysis Technique on Gray Scale Image by Varying Message Length using Adaptive Histogram Equalization Attack

by Anuj Kumar, Shivani Khurana
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 90 - Number 14
Year of Publication: 2014
Authors: Anuj Kumar, Shivani Khurana
10.5120/15790-4540

Anuj Kumar, Shivani Khurana . Steganalysis Technique on Gray Scale Image by Varying Message Length using Adaptive Histogram Equalization Attack. International Journal of Computer Applications. 90, 14 ( March 2014), 33-36. DOI=10.5120/15790-4540

@article{ 10.5120/15790-4540,
author = { Anuj Kumar, Shivani Khurana },
title = { Steganalysis Technique on Gray Scale Image by Varying Message Length using Adaptive Histogram Equalization Attack },
journal = { International Journal of Computer Applications },
issue_date = { March 2014 },
volume = { 90 },
number = { 14 },
month = { March },
year = { 2014 },
issn = { 0975-8887 },
pages = { 33-36 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume90/number14/15790-4540/ },
doi = { 10.5120/15790-4540 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:11:35.806673+05:30
%A Anuj Kumar
%A Shivani Khurana
%T Steganalysis Technique on Gray Scale Image by Varying Message Length using Adaptive Histogram Equalization Attack
%J International Journal of Computer Applications
%@ 0975-8887
%V 90
%N 14
%P 33-36
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Steganography considered as a technique for secret communication without knowing the others and only an authorized user can access the information which is embedding in the cover medium. Steganalysis is the process to detect of presence of Steganography and to destroy, extract it. In this Paper There is Adaptive Histogram Equalization Technique that performed on the Stego Image that is category of the Histogram Equalization attack and measuring the quality of Image after applying the Attack.

References
  1. Atallah M. Al-Shatnawi(2012) "A New Method in Image Steganography with Improved Image Quality. " Al-albayt University, Vol. 6, 2012, no. 79, 3907 - 3915. http://www. m-hikari. com/ams/ams-2012/ams-77-80-2012/alshatnawiAMS77-80-2012. pdf
  2. Ankita Agarwal(2012)" Security Enhancement Scheme for Image Steganography using S-DES Technique ". International Journal of Advanced Research in Computer Science and Software Engineering , April 2012/volume 2 issue 4/V2I400162. http://www. ijarcsse. com/docs/papers/April2012/Volume_2_issue_4/V2I400162. pdf
  3. Nazanin Zaker , Ali Hamzeh(2011)"A novel steganalysis for TPVD steganographic method based on differences of pixel difference histogram"Shiraz University, 25 january 2011. http://connection. ebscohost. com/c/articles/73762949/novel-steganalysis-tpvd-steganographic-method-based-differences-pixel-difference-histogram
  4. Arpan Ghorai, Dibyendu Chowdhury, Satyajit Das(2011)," Design and Implementation of Public Key Steganography," International Journal of Soft Computing and Engineering (IJSCE) http://digitalcommons. unl. edu/cgi/viewcontent. cgi?article=1095&context=computerelectronicfacpub&sei
  5. Dr. N. Meghanathan, " Least Significant Based (LSB) Steganography ,''Jackson State University. http://www. jsums. edu/cms/tues/docs/Steganography/LSB-Steganography. pdf
  6. "Peak signal to noise ratio". http://en. wikipedia. org/wiki/Peak_signal-to-noise_ratio
  7. V. Sharma, S. kumar, "A New Approach to Hide Text in Images Using Steganography"ijarcsse, 4 april 2013, V3I40401 volume 3. http://www. ijarcsse. com/docs/papers/Volume_3/4_April2013/V3I4-0401. pdf
  8. A. Kumar and Km. Pooja, "Steganography : A Data Hiding technique," International journal of computer Application(0975-8887),vol-9 no. 7,november 2010. http://citeseerx. ist. psu. edu/viewdoc/download?rep=rep1&type=pdf&doi=10. 1. 1. 206. 5754
  9. Kevin O'Bryant, "Principle of steganography". http://www. math. ucsd. edu/~crypto/Projects/MaxWeiss/steganography. pdf
  10. Introduction to Stegnography. http://io. acad. athabascau. ca/~grizzlie/Comp607/menu. htm
Index Terms

Computer Science
Information Sciences

Keywords

Least Significant Bit Steganography Secret Information Adaptive histogram equalization.