CFP last date
20 December 2024
Reseach Article

A Pictorial Block Steganography based Secure Algorithm for Data Transfer

Published on March 2013 by Anupam Mondal, Sudipta Sahana, Sainik Kumar Mahata
International Conference on Computing, Communication and Sensor Network
Foundation of Computer Science USA
CCSN2012 - Number 4
March 2013
Authors: Anupam Mondal, Sudipta Sahana, Sainik Kumar Mahata
9f635677-4f77-4a8b-bfa9-75ff8ba55da5

Anupam Mondal, Sudipta Sahana, Sainik Kumar Mahata . A Pictorial Block Steganography based Secure Algorithm for Data Transfer. International Conference on Computing, Communication and Sensor Network. CCSN2012, 4 (March 2013), 12-15.

@article{
author = { Anupam Mondal, Sudipta Sahana, Sainik Kumar Mahata },
title = { A Pictorial Block Steganography based Secure Algorithm for Data Transfer },
journal = { International Conference on Computing, Communication and Sensor Network },
issue_date = { March 2013 },
volume = { CCSN2012 },
number = { 4 },
month = { March },
year = { 2013 },
issn = 0975-8887,
pages = { 12-15 },
numpages = 4,
url = { /specialissues/ccsn2012/number4/10871-1035/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Special Issue Article
%1 International Conference on Computing, Communication and Sensor Network
%A Anupam Mondal
%A Sudipta Sahana
%A Sainik Kumar Mahata
%T A Pictorial Block Steganography based Secure Algorithm for Data Transfer
%J International Conference on Computing, Communication and Sensor Network
%@ 0975-8887
%V CCSN2012
%N 4
%P 12-15
%D 2013
%I International Journal of Computer Applications
Abstract

The growth of high speed communication networks and that of the Internet, in particular, has increased the ease of Information Communication. Steganography is the art and science of writing hidden messages in such a way that no one apart from the sender and intended recipient even realizes there is a hidden message. Steganography is mainly used to embed important information within images for encryption. This approach is better than cryptography in secure data Transfer. Original message is being hidden within a carrier like images or video in such a way that the change in image or video is not observable. So the hidden message is difficult to detect without retrieval. In today's world, with the advancement of science and technology, we have plenty of security tools which are developed to protect the transmission of multimedia objects. But the development of security approaches for text messages are comparatively less. For hiding secret information in images, there exists a large variety of steganography techniques some are more complex than others and all of them have respective strong and weak points. In this paper, a secure pictorial block steganography based encryption and decryption algorithm is proposed to impose the concept of secrecy over privacy for transferring text messages.

References
  1. Ali Daneshkhah, Hassan Aghaeinia and Seyed Hamed Seyedi, "A More Secure Steganography Method in Spatial Domain", Second International Conference on Intelligent Systems, Modelling andSimulation, 2011.
  2. E. Ghasemi, J. Shanbehzadeh , N. Fassihi, "High Capacity Image Steganography using Wavelet Transform and Genetic Algorithm," International MultiConference of Engineers and Computer Scientists, vol. 1, 2011.
  3. A. Nag, S. Biswas, D. Sarkar, P. P. Sarkar, "A Novel Technique for Image Steganography Based on DWT and Huffman Encoding," International Journal of Computer Science and Security, (IJCSS), Volume (4): Issue (6),pp. 497-610,2011.
  4. Qinhua Huang and Weimin Ouyang, "Protect Fragile Regions in Steganography LSB Embedding", 3rd International Symposium on Knowledge Acquisition and Modelling, 2010.
  5. Piyush Marwaha, Paresh Marwaha, "Visual Cryptographic Steganography in images", 2nd International conference on Computing, Communication and Networking Technologies, 2010.
  6. Adel Almohammad and Gheorghita Ghinea, "Image Steganography and Chrominance Components", 10th IEEE International Conferenceon Computer and Information Technology, 2010.
  7. S. Sarreshtedari , S. Ghaemmaghami, "High Capacity Image Steganography in Wavelet Domain," International Conference on Consumer Communications and Networking,pp. 1-6, 2010.
  8. K. H. Jung, K. Y. Yoo, Data hiding method using image interpolation, Computer Standards and Interfaces 31 (2) (2009) 465-470.
  9. P. Tsai, Y. C. Hu, H. L. Yeh, Reversible image hiding scheme using predictive coding and histogram shifting, Signal Processing 89 (6) (2009) 1129-1143.
  10. Z. Li, X. Chen, X. Pan, X. Zeng, Lossless data hiding scheme based on adjacent pixel difference, in: Proceedings of the International Conference on Computer Engineering and Technology, 2009, pp. 588-592.
  11. Y. C. Li, P. Tsai, C. H. Lin, H. L. Yeh, C. T. Huang ,"Palette Partition Based Data Hiding for Color Images," Intelligent Information Hiding and Multimedia Signal Processing, 2009. lIH-MSP '09. Fifth International Conference, pp. 620-623, 12- 14 Sept. 2009.
  12. M. C Chen, S. Agaian, P. Chen, "Generalized Collage Steganography on Images ", IEEE International Conference on Systems, Man and Cybernetics (SMC), IEEE, 2008.
Index Terms

Computer Science
Information Sciences

Keywords

Steganography Security Cryptography Encryption Decryption