We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Snake and Ladder based Algorithm for Steganographic Application of Specific Streamline Bits on Prime Gap Method

by Jas R Sheth
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 94 - Number 3
Year of Publication: 2014
Authors: Jas R Sheth
10.5120/16320-5567

Jas R Sheth . Snake and Ladder based Algorithm for Steganographic Application of Specific Streamline Bits on Prime Gap Method. International Journal of Computer Applications. 94, 3 ( May 2014), 1-5. DOI=10.5120/16320-5567

@article{ 10.5120/16320-5567,
author = { Jas R Sheth },
title = { Snake and Ladder based Algorithm for Steganographic Application of Specific Streamline Bits on Prime Gap Method },
journal = { International Journal of Computer Applications },
issue_date = { May 2014 },
volume = { 94 },
number = { 3 },
month = { May },
year = { 2014 },
issn = { 0975-8887 },
pages = { 1-5 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume94/number3/16320-5567/ },
doi = { 10.5120/16320-5567 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:16:34.705081+05:30
%A Jas R Sheth
%T Snake and Ladder based Algorithm for Steganographic Application of Specific Streamline Bits on Prime Gap Method
%J International Journal of Computer Applications
%@ 0975-8887
%V 94
%N 3
%P 1-5
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Steganography is the art of hiding data in a particular form of media and making it accessible for the recipient. This process of encrypting data can be embedded in media like image and audio. This paper represents a snake and ladder based algorithm for encrypting a streamline of bits in a greyscale image.

References
  1. N. F. Johnson, S. Jajodia, Exploring Steganography: seeing the unseen, IEEE Computer 31 (2) (1998) 26–34.
  2. J. Tian, "Reversible Data Embedding using a Difference Expansion," IEEE Trans. Circuits Syst. Video Technol. , vol. 13, no. 8, pp. 890–896, Aug. 2003
  3. T Morkel, J. H. P Eloff, M. S Olivier, "AN OVERVIEW OF IMAGE STEGANOGRAPHY Proceedings of the Fifth Annual Information Security South Africa Conference (ISSA2005), 2005
  4. Z. Ni, Y. Q. Shi, N. Ansari and W. Su, "Reversible Data Hiding", IEEE Trans. on Circuits and Systems for Video Technology, vol. 16, no. 3 , pp. 354-362,Mar 2006.
  5. D. M. Thodi and J. J. Rodriguez, "Expansion EmbeddingTechniques for G. K. Wallace, "The JPEG still-picture compression standard," Commun. ACM, vol. 34, pp. 30–44, Apr. 1991.
  6. W. B. Pennebaker and J. L. Mitchell, JPEG Still Image Data Compression Standard. New York: Van Nostrand Reinhold, 1992.
  7. "MPEG-2 video," ITU-T Recommendation H. 262-ISO/IEC 13818-2, Jan. 1995.
  8. "Video coding for low bitrate communication," ITU-T Recommendation H. 263, Dec. 1995. Reversible Watermarking, " IEEE Trans. on Image Processing, vol. 16, no. 3, pp. 721–730, Mar. 2007.
  9. K. L. chung, Y. H. Huang, W. M. Yen, W. C. Teng "Distortion Reduction for Histogram Modification Based Reversible Data Hiding" Applied Mathematics and computation, vol. 218, no. 22, pp. 5819-5826, Dec 2011.
  10. R. Chandramouli, Nasir Memon, "Analysis of LSB based Image Steganography Techniques",Proc. International Conference on Image Processing, 2001, Vol. 3, pp. 1019-1022, 2001.
  11. Mehdi Kharrazi, Husrev T. Sencar,Nasir Memon, "Image Steganography: Concepts and Practice", WPSC/Lecture Note Series,pp. 3,April,2004. Source: www2. ims. nus. edu. sg/preprints/ab2004-25. pdf.
Index Terms

Computer Science
Information Sciences

Keywords

Image Stegnography Snake and Ladder Algorithm LSB bit plane Stenography Edge encryption Prime Gap.