CFP last date
20 January 2025
Call for Paper
February Edition
IJCA solicits high quality original research papers for the upcoming February edition of the journal. The last date of research paper submission is 20 January 2025

Submit your paper
Know more
Reseach Article

Securing Web Communication using Three Layer Image Shielding

Published on December 2013 by Kamal Pradhan, Gaurav Gohil
International Conference on Distributed Computing and Internet Technology 2014
Foundation of Computer Science USA
ICDCIT2014 - Number 1
December 2013
Authors: Kamal Pradhan, Gaurav Gohil
e7f17d61-b48c-4881-a0b9-354fcb58ab7b

Kamal Pradhan, Gaurav Gohil . Securing Web Communication using Three Layer Image Shielding. International Conference on Distributed Computing and Internet Technology 2014. ICDCIT2014, 1 (December 2013), 8-13.

@article{
author = { Kamal Pradhan, Gaurav Gohil },
title = { Securing Web Communication using Three Layer Image Shielding },
journal = { International Conference on Distributed Computing and Internet Technology 2014 },
issue_date = { December 2013 },
volume = { ICDCIT2014 },
number = { 1 },
month = { December },
year = { 2013 },
issn = 0975-8887,
pages = { 8-13 },
numpages = 6,
url = { /proceedings/icdcit2014/number1/14378-1302/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Distributed Computing and Internet Technology 2014
%A Kamal Pradhan
%A Gaurav Gohil
%T Securing Web Communication using Three Layer Image Shielding
%J International Conference on Distributed Computing and Internet Technology 2014
%@ 0975-8887
%V ICDCIT2014
%N 1
%P 8-13
%D 2013
%I International Journal of Computer Applications
Abstract

Communication security has taken an important role with the advancement in digital communication. The difficulties in ensuring an individual's privacy has become increasingly challenging. Techniques such as digital watermarking, cryptography and Steganography are used for information hiding. This paper introduces a new Steganography algorithm to hide data inside images using three layer image shielding. Steganography is the art and science of hiding the existence of data in another transmission medium. It helps in achieving a secure and safe communication. The proposed algorithm uses spatial domain Steganography technique in the transformed color space. Here the three layers RGB (red, green, blue) of the cover image are transformed to HSV (hue, saturation, value) layers. The pixels of any two HSV layers are used to embed the message inside it. The remaining layer act as an indicator to store and retrieve the message from the other two layers efficiently. The final image is the stego image. Different sizes of data are stored inside the images and the PSNR (Peak signal-to-noise ratio) is also captured for each of the tested images. Based on the PSNR value of tested images, the stego image has a higher PSNR value.

References
  1. Stefan katzenbeisser, Fabien a. p. petitcolas, "Information hiding techniques for steganography and digital watermarking", 2000, pp.
  2. Coron, J. -S. , "what is cryptography? IEEE Security and Privacy, 2006. 4(1): p. 70-73"
  3. Akhil khare, Meenu kumarl, J Palla vi khare , "Efficient Algorithm for Digital Image Steganography". Journal of information, knowledge and research in computer science applications.
  4. T. Morkel, j. h. p. eloff and M. s. olivier, "An Overview of Image Steganography",information and computer security architecture (icsa) research group.
  5. Jarno mielikainen, "lsb matching revisited", Signal Processing Letters, IEEE, Publication date: may 2006 Volume: 13, issue: 5, pp. 285- 287.
  6. Kanzariya nitin k. and Nimavat ashish v, "Comparison of Various Images Steganography Techniques", vol 2 issue 1 jan13.
  7. Gandharba swain and Saroj Kumar lenka , "A novel Approach to RGB Channel Based Image Steganography Technique". International Arab journal of e-technology, vol. 2 no. 4 , june 2012.
  8. S. agaian1 and Juan p. perez2, "New Pixel Sorting Method for Palette Based Steganography and Color Model Selection.
  9. Mei-ching Chen, S. agaian, and C. L. philip chen,"Generalized collage steganography on images", IEEE, 2008.
  10. Chandramouli, r. & Memon, n. (2001). proceedings of ICPC '01: IEEE International conference on image processing. thessaloniki: Institute of electrical and electronics engineers computer society.
  11. Fridrich, j. , Goljan, m. , &Du, r. (2001). "Detecting lsb steganography in color and gray-scale images. " IEEE multimedia, 8(4), 22-28.
  12. Wen chen1, Yun q. shi1, Guorong xuan2 , "Identifying computer graphics using hsv color model and statistical moments of characteristic functions. "
  13. Adnan Gutub, Mahmoud Ankeer, Muhammad Abu- Ghalioun, Abdulrahman Shaheen, and Aleem Alvi, Pixel indicator high capacity technique for RGB image based Steganography, WoSPA 2008 – 5th IEEE International Workshop on Signal Processing and its Applications, University of Sharjah, Sharjah, U. A. E. 18 – 20 March 2008.
  14. N. N. El-Emam, Hiding a large amount of data with high security using steganography algorithm, Journal of Computer Science 3 (2007) 223-232.
  15. Mohammed tanver parver and Adnan Abdul Aziz-gutub, RGB intensity based variable-bits image Steganography, IEEE Asia-Pacific services computing conference.
Index Terms

Computer Science
Information Sciences

Keywords

Steganography Spatial Domain Psnr Cover Image Stego Image.