We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Design a New Robustness Technique for Image Stegnography

Published on June 2012 by Monika Gambhir, Amandeep Kaur, Manpreet Kaur
National Workshop-Cum-Conference on Recent Trends in Mathematics and Computing 2011
Foundation of Computer Science USA
RTMC - Number 14
June 2012
Authors: Monika Gambhir, Amandeep Kaur, Manpreet Kaur
11b9a478-dd3e-454c-b3e8-065371744e6e

Monika Gambhir, Amandeep Kaur, Manpreet Kaur . Design a New Robustness Technique for Image Stegnography. National Workshop-Cum-Conference on Recent Trends in Mathematics and Computing 2011. RTMC, 14 (June 2012), 1-3.

@article{
author = { Monika Gambhir, Amandeep Kaur, Manpreet Kaur },
title = { Design a New Robustness Technique for Image Stegnography },
journal = { National Workshop-Cum-Conference on Recent Trends in Mathematics and Computing 2011 },
issue_date = { June 2012 },
volume = { RTMC },
number = { 14 },
month = { June },
year = { 2012 },
issn = 0975-8887,
pages = { 1-3 },
numpages = 3,
url = { /proceedings/rtmc/number14/7131-1057/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Workshop-Cum-Conference on Recent Trends in Mathematics and Computing 2011
%A Monika Gambhir
%A Amandeep Kaur
%A Manpreet Kaur
%T Design a New Robustness Technique for Image Stegnography
%J National Workshop-Cum-Conference on Recent Trends in Mathematics and Computing 2011
%@ 0975-8887
%V RTMC
%N 14
%P 1-3
%D 2012
%I International Journal of Computer Applications
Abstract

We propose the secret and robust data transmission over the noisy channel. The secret data is encrypted and permutated using the permutation function, further encoded the data using the error detection and correction code. We show that the good quality of the stego-image and resistant against the various noise attacks (Like Salt and Pepper). Although we covered a number of security and capacity and robustness definitions, there has been no work successfully formulating the relationship between the two from the practical point of view. Steganography's ultimate objectives, which are undetectability, robustness (resistance to various image processing methods and compression) and capacity of the hidden data, are the main factors that separate it from related techniques such as watermarking and cryptography. Robustness of steganography is one of the three main goals to be achieved. In this paper we increase the robustness by introducing some error detecting and correcting techniques.

References
  1. B. Gladman, "Implementation experience with the AES candidate algorithms," Proc. of 2nd AES candidate conference, March 22-23, 1999, Rome, pp. 7-14. (http://fp. gladman. plus. com/cryptography\_technology/rijndae.
  2. Jiwu Huang, Yun Q. Shi, Yi Shi ," Embedding image watermarks in DC components," IEEE Trans. CSVT 10 (6) (2000) 974-979.
  3. N. Rajpal, A. Kumar and P. R. Jindal, "Demonstrating the Use of Error Coding Technique in the field of Steganography, along with Linear Feedback shift Register Technique," 2nd Workshop on Computer Vision, Graphics and Image Processing, pp. 22-27, Gwalior, India, February 2004.
  4. Y. K. Lee and L. H. Chen, "High Capacity Image Steganographic Model," IEE Proceedings - Vision, Image, and signal processing, vol. 147, No. 3, June 2000, pp. 288-294.
  5. Jiwu Huang, Yun Q. Shi, Yi Shi ," Embedding image watermarks in DC components," IEEE Trans. CSVT 10 (6) (2000) 974-979.
  6. J. Daemen and V. Rijmen. "The Design of Rijndael," AES - Advanced Encryption Standard}, ISBN 3-540-42580-2 Springer-Verlag Berlin Heidelberg, New York.
  7. N. F. Johnson and S. Jajodia, "Exploring Steganography: Seeing the Unseen," IEEE computer, Vol. 31, No. 2, February 1998,pp. 26-34.
  8. N. Rajpal, A. Kumar, P. R. Jindal and A. Saroagi, "An Investigation into the use of Linear Feedback Shift Register for Data Encrypting and Data Hiding in the field of Steganography," Conference on e-security, Cyber Crime & Law, pp. , Chandigarh, India, February 2004.
  9. Anil Kumar, Deepak Gambhir and Navin Rajpall "Robust and Secret Data Transmission Over the Noisy Channel" IEEE - ICSCN 2007, MIT Campus, Anna University, Chennai, India. Feb. 22-24, 2007. pp. 199-203.
Index Terms

Computer Science
Information Sciences

Keywords

Steganography Cryptography Permutation Function Error Correction And Detection Code