We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Information Hiding using KIMLA, KAMLA and KAMLAC for increasing Cover Image Capacity

Published on None 2011 by H. B. Kekre, A.A. Athawale, U. A. Athawale
journal_cover_thumbnail
International Conference and Workshop on Emerging Trends in Technology
Foundation of Computer Science USA
ICWET - Number 3
None 2011
Authors: H. B. Kekre, A.A. Athawale, U. A. Athawale
d8105e5f-3144-4f34-bdbf-25e2302e020a

H. B. Kekre, A.A. Athawale, U. A. Athawale . Information Hiding using KIMLA, KAMLA and KAMLAC for increasing Cover Image Capacity. International Conference and Workshop on Emerging Trends in Technology. ICWET, 3 (None 2011), 11-18.

@article{
author = { H. B. Kekre, A.A. Athawale, U. A. Athawale },
title = { Information Hiding using KIMLA, KAMLA and KAMLAC for increasing Cover Image Capacity },
journal = { International Conference and Workshop on Emerging Trends in Technology },
issue_date = { None 2011 },
volume = { ICWET },
number = { 3 },
month = { None },
year = { 2011 },
issn = 0975-8887,
pages = { 11-18 },
numpages = 8,
url = { /proceedings/icwet/number3/2079-aca551/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference and Workshop on Emerging Trends in Technology
%A H. B. Kekre
%A A.A. Athawale
%A U. A. Athawale
%T Information Hiding using KIMLA, KAMLA and KAMLAC for increasing Cover Image Capacity
%J International Conference and Workshop on Emerging Trends in Technology
%@ 0975-8887
%V ICWET
%N 3
%P 11-18
%D 2011
%I International Journal of Computer Applications
Abstract

This paper describes the methods to increase the capacity of the cover image for information hiding. In this paper we have proposed three novel multiple least significant bit replacement techniques KIMLA and KAMLA and KAMLAC to increase the information hiding capacity of the cover image. Comparative results of KIMLA, KAMLA, KAMLAC and their previous version KMLA [1] are also shown. These novel techniques use multiple LSB’S bit replacement technique to hide the secret information. The proposed methods KAMLA and KIMLA and KAMLAC have shown better results for AFCPV, PBC ratios and they have been tested for secret information in image as well as text form.

References
  1. Dr. H. B. Kekre, Ms. Archana A. Athawale, “Information Hiding using LSB Technique with Increased Capacity”, International Journal of Cryptography and Security, Special issue on Steganography, Oct 2008
  2. http://www.eurojournals.com/ejsr_31_2_01.pdf
  3. N. Johnson and S. Jajodia, “Exploring steganography: seeing the unseen,” IEEE Computer, pp. 26-34, February 1998
  4. T. Sharp, “An implementation of key-based digital signal steganography,” in Proc. Information Hiding Workshop, vol. 137, Springer LNCS, 2001, pp. 13–26.
  5. Johnson, Neil F, “Steganography”, 2000: www.jjtc.com/stegdoc/index2.htm
  6. H. B. Kekre, Archana A. Athawale, Pallavi N. Halarnkar , “Increased Capacity of Information Hiding in LSB’s method for text and Image” , International Journal of Electrical, Computer and Systems Engineering , volume 2, No. 4 http://www.waset.org/ijecse/v2/ v2-4-34.pdf (Europe)
  7. H. B. Kekre, Archana A. Athawale, Pallavi N. Halarnkar , “Polynomial Transformation to improve Capacity of Cover Image for Information Hiding in Multiple LSB’s”, International Journal of Engineering Research and Industrial Applications (IJERIA),Ascent Publications, Volume II, March 2009.Pune (India)
  8. H. B. Kekre, Archana Athawale and Pallavi N. Halarnkar, “Performance Evaluation of Pixel Value Differencing And Kekre’s Modified Algorithm For Information Hiding In Images”, ACM International Conference on Advances in Computing, Communication and Control (ICAC3).2009 (Available on ACM Portal: http://portal.acm.org/citation.cfm?id=1523103.1523172)
  9. J. Mielikainen, “LSB Matching Revisited,” IEEE Signal Processing Letters, vol. 13, no.5, May 2006.
  10. D. C. Wu and W. H. Tsai, “A steganographic method for images by pixel-value differencing,” Pattern Recognition Letters, vol. 24, no. 9-10, pp. 1613-1626, June 2003
  11. H.B. Kekre, Archana A. Athawale, Pallavi N. Halarnkar, “High Payload using High Boost Filtering in Kekre’s Multiple LSB’s Algorithm”, 2nd International Conference on Advances in Computer Vision and Information Technology ACVIT 2009, 16th -19th December 2009, Aurangabad
  12. H. B. Kekre, Archana A. Athawale, Sudeep D. Thepade, “Clandestine Data Entrenching and Salvaging “National Conference on Information and Communication Technology 29th Feb and 1st Mar, NCICT-08.
  13. H. B. Kekre, Archana A. Athawale, “Personal Data Ingrain and Regain”, NCA, FCRCE, Bandra (W), Mumbai, 16th -17th May 2008.
  14. H.C. Wu, N.I Wu, C.S. Tsai and M.S. Hwang, “Image Steganographic scheme based on pixel-value differencing and LSB replacement methods”, VISP(152), No. 5, October 2005
  15. H. B. Kekre, Archana A. Athawale, Uttara A. Athawale, “Increased Capacity for Information Hiding using Walsh Transform“,ICWET-10 International Conference and Workshop on Emerging Trends in Technology (ICWET 2010), 26-27 Feb 2010, Available on ACM Portal at http://portal.acm.org/citation.cfm?id=1741906.1741923
  16. H. B. Kekre, Archana A. Athawale, Pallavi N. Halarnkar, “Increased Capacity and High Security for Embedding Secret Message in Transform Domain using Discrete Cosine Transform”, (Technopath)
  17. H. B. Kekre, Archana A. Athawale, Pallavi N. Halarnkar, “Performance Comparison of DCT and Walsh Transform for Steganography”, International Conference and Workshop on Emerging Trends in Technology (ICWET 2010), 26-27 Feb2010.Site: http:// portal.acm.org / citation.cfm? id = 1741906 . 1741921 & coll = GUIDE & dl = GUIDE & CFID = 91821685 & CFTOKEN = 15950099
  18. H. B. Kekre, Archana A. Athawale, Dipali Sadavarti , “A Novel Steganographic Scheme using Discrete Sine Transform based on Energy Distribution” Springer-International Conference on Contours of Computing Technology (Thinkquest-2010), 13-14th Mar 2010 (to be uploaded on Online Springer Link )
  19. H. B. Kekre, Archana A. Athawale, Dipali Sadavarti, “ Algorithm to Generate Kekre’s Wavelet Transform from Kekre’s Transform”, International Journal of Engineering, Science and Technology, (IJEST) ISSN:0975-5462, Vol. 2(5), 2010, 756-767 website- http://www.ijest.info/docs/IJEST10-02-05-22.pdf (India)
  20. H. B. Kekre, Archana A. Athawale, Uttara A. Athawale, “Increased Cover Capacity using Advanced Multiple LSB Algorithms“,ICWET-11 International Conference and Workshop on Emerging Trends in Technology (ICWET 2011), Feb 2011 (accepted for publication)
Index Terms

Computer Science
Information Sciences

Keywords

Steganography Steganalysis LSB matching LSB substitution AFCPV PBC KMLA KIMLA KAMLA