CFP last date
20 January 2025
Reseach Article

High Imperceptible Data Hiding using Remainder Method

by Biswajita Datta, Samir K. Bandyopadhyay, Anurag Kedia
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 95 - Number 18
Year of Publication: 2014
Authors: Biswajita Datta, Samir K. Bandyopadhyay, Anurag Kedia
10.5120/16693-6817

Biswajita Datta, Samir K. Bandyopadhyay, Anurag Kedia . High Imperceptible Data Hiding using Remainder Method. International Journal of Computer Applications. 95, 18 ( June 2014), 12-19. DOI=10.5120/16693-6817

@article{ 10.5120/16693-6817,
author = { Biswajita Datta, Samir K. Bandyopadhyay, Anurag Kedia },
title = { High Imperceptible Data Hiding using Remainder Method },
journal = { International Journal of Computer Applications },
issue_date = { June 2014 },
volume = { 95 },
number = { 18 },
month = { June },
year = { 2014 },
issn = { 0975-8887 },
pages = { 12-19 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume95/number18/16693-6817/ },
doi = { 10.5120/16693-6817 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:19:45.981115+05:30
%A Biswajita Datta
%A Samir K. Bandyopadhyay
%A Anurag Kedia
%T High Imperceptible Data Hiding using Remainder Method
%J International Journal of Computer Applications
%@ 0975-8887
%V 95
%N 18
%P 12-19
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper we will propose a high quality image steganography technique which can hide secret data within an image in such a way so that it is imperceptible to human eye. This method solves the overlapping problem of remainder and use modulo operator efficiently for hiding purpose. First, we calculate the base eight equivalent of target string. That increases the hiding capacity as well as robustness of the stego image. Then the secret data can be hidden by remainder method. In our proposed work we alter the remainder of pixels in such a way so as to greatly reduce the image distortion caused by the hiding of the secret data. Experimental result checks the quality of stego image as well as compared with standard LSB technique and 3 LSB multi-bit image steganography technique. Experimental results have also demonstrated that the proposed scheme is secure against StirMark Benchmark 4. 0.

References
  1. Diffie, W. and Hellman, M. E. 1977. "Exhaustive Cryptanalysis of the NBS Data Encryption Standard". IEEE Computer, Vol. 10, pp. 74- 84.
  2. Provos, N. , Honeyman, P. 2003. "Hide and seek: An introduction to steganography". IEEE Security & Privacy Magazine 1, pp. 32-44.
  3. Anderson, R. J. , Petitcolas, F. A. P. , "On the limits of steganography", IEEE Journal of selected Areas in Communications, May 1998.
  4. Jamil, T. 1999. "Steganography: The art of hiding information is plain sight", IEEE Potentials, Vol. 18, No. 01.
  5. Silman, J. 2001. "Steganography and Steganalysis: An Overview". SANS Institute.
  6. Johnson, N. F. , Jajodia, S. , "Exploring Steganography: Seeing the Unseen", Computer Journal, Feb. 1998.
  7. Zhang, X. , Wang, S. , Zhou, Z. 2008. "Multibit Assignment Steganography in Palette Images". IEEE Signal Processing Letters, Vol. 15.
  8. Luo, W. , Huang, F. , Huang, J. "Edge Adaptive Image Steganography Based on LSB Matching Revisited". IEEE Transactions on Information Forensics And Security, Vol. 5, No. 2, Jun. 2010.
  9. Kurak, C. , McHugh, J. , "A Cautionary Note on Image Downgrading". In Proc. of IEEE 8thAnnual Computer Security Applications Conference. San Antonio, USA, Nov. /Dec. 1992, pp. 153-155.
  10. Chan, C. K. , Cheng, L. M. , "Hiding data in images by simple LSB substitution", Pattern Recognition, pp. 469–474, Mar. 2004.
  11. Wang, R. Z. , Lin, C. F. , Lin, J. C. , "Image hiding by optimal LSB substitution and genetic algorithm". Pattern Recognition 34, pp. 671–683, Mar. 2001.
  12. Roque, J. J. , Minguet, J. M. 2009. "SLSB: Improving the Steganographic Algorithm LSB". Workshop on Security in Information Systems WOSIS.
  13. Kumari, L. , Goyal, D. , Gyan, S. "Analysis and Design of 3 LSB Techniques for Secure Audio Steganography". International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Vol. 2, No. 8, Aug. 2013.
  14. Nguyen B. C. , Yoon S. M. , Lee H. K. 2006. "Multi Bit Plane Image Steganography". IWDW, LNCS 4283, pp. 61–70.
  15. Tripathi A. , Nair J. S. "Steganography Using Segmenting Mosaic Images with Embedding Data by 3 LSB S-Type Scanning". International Journal of Latest Trends in Engineering and Technology (IJLTET) Vol. 2, No. 4 Jul. 2013.
  16. Zhang X. , Wang S. , Zhou Z. 2008. "Multibit Assignment Steganography In Palette Images". IEEE Signal Processing Letters, Vol. 15.
  17. Kawaguchi E. , Eason R. O. "Principle and applications of bpcs steganography". In Proc. of SPIE 3528, Multimedia Systems and Applications Conference Vol. 3528, Nov. 01, 1998.
  18. Thien, C. C. , Lin, J. C. "A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function". Pattern Recognition 36, 2875–2881, Dec. 2003.
  19. Wang, C. M. , Wu, N. I. , Tsai, C. S. , Hwang, M. S. 2008. "A high quality steganographic method with pixel-value differencing and modulus function". The Journal of Systems and Software, pp. 150–158.
  20. Wang, S. J. , "Steganography of capacity required using modulo operator for embedding secret image", Applied Mathematics and Computation 164, pp. 99–116, May. 2005.
Index Terms

Computer Science
Information Sciences

Keywords

Steganography Embedding Extraction Remainder method Pre-processing Post-Processing