Camouflaging in Digital Image for Secure Communication

被引:1
作者
Jindal B. [1 ]
Singh A.P. [2 ]
机构
[1] Yadavindra College of Engineering, Punjabi University, Guru Kashi Campus, Talwandi Sabo District, Bathinda, Punjab
[2] Sant Longowal Institute of Engineering and Technology (Deemed-to-be-University), Longowal, Sangrur, 148106, Punjab
关键词
Least significant bit; Matrix; Moderate-bit; Parity; Security; Steganography;
D O I
10.1007/s40031-013-0050-3
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The present paper reports on a new type of camouflaging in digital image for hiding crypto-data using moderate bit alteration in the pixel. In the proposed method, cryptography is combined with steganography to provide a two layer security to the hidden data. The novelty of the algorithm proposed in the present work lies in the fact that the information about hidden bit is reflected by parity condition in one part of the image pixel. The remaining part of the image pixel is used to perform local pixel adjustment to improve the visual perception of the cover image. In order to examine the effectiveness of the proposed method, image quality measuring parameters are computed. In addition to this, security analysis is also carried by comparing the histograms of cover and stego images. This scheme provides a higher security as well as robustness to intentional as well as unintentional attacks. © 2013, The Institution of Engineers (India).
引用
收藏
页码:85 / 92
页数:7
相关论文
共 25 条
[1]  
Petitcolas F.A.P., Anderson R.J., Kuhn M.G., Information hiding—a survey, Proc. IEEE, 87, pp. 1062-1078, (1999)
[2]  
Wu N.-I., Hwang M.S., Data hiding: current status and key issues, Int. J. Netw. Security, 4, 1, pp. 1-9, (2007)
[3]  
Provos N., Honeyman P., Hide and seek—an introduction to steganography, IEEE Secur priv, 1, 3, pp. 32-44, (2003)
[4]  
Amin M.M., Salleh M., Ibrahim S., Katmin M.R., Shamsuddin M.Z.I., Information hiding using steganography, IEEE 0-7803-7773-March, (2003)
[5]  
Balkrishan A.P., Singh, Java implementation of least significant bit embedding for hiding data. IE(I) J, CP, 89, pp. 28-31, (2008)
[6]  
Bolle R., Connel J., Ratha N., Secure data hiding in wavelet compressed fingerprint images. in Proceedings of the, ACM workshops on Multimedia, Los Angeles, California (ACM Press, New York NY, 2000, pp. 127-130, (2000)
[7]  
Anderson R.J., Petitcolas F.A.P., On the limits of the steganography, IEEE J. Sel. Areas Commun., 16, 4, pp. 474-481, (2001)
[8]  
Cvejic N., Seppanen T., Increasing robustness of LSB audio steganography using a novel embedding method, in Proc. IEEE Int. Conf. Info. Tech. Coding and, Computing, 2, pp. 533-537, (2004)
[9]  
Cvejic N., Seppanen T., Increasing the capacity of LSB-based audio steganography, In IEEE Workshop on Multimedia Signal Processing, pp. 336-338, (2002)
[10]  
Mohammad P., Ahmad D., LSB-based audio steganography method based on lifting wavelet transform, Proceedings of IEEE International Symposium on Signal Processing and Information Technology, 15–18, pp. 600-603, (2007)