A NOVEL RGB BASED STEGANOGRAPHY USING PRIME COMPONENT ALTERATION TECHNIQUE

被引:0
作者
Sathyan, Anil [1 ]
Thirugnanam, Mythili [1 ]
Hazra, Sumit [1 ]
机构
[1] VIT Univ, Sch Comp Sci & Engn, Vellore, Tamil Nadu, India
关键词
Steganography; RGB; First Component Alternate; LSB; Steganalysis;
D O I
暂无
中图分类号
Q5 [生物化学]; Q7 [分子生物学];
学科分类号
071010 ; 081704 ;
摘要
Steganography is the science with the help of which secret or confidential data is hidden within any media like text, images, audio or video and protocol-based network. As privacy concerns continue to develop, it is in widespread use because it enables to hide the secret data in cover images. Steganographic techniques are best suited for digital image processing. In general, Steganography is classified into spatial and transform domain techniques. This paper presents a new RGB based algorithm in spatial domain called Prime Pixel Alternation technique. In the present scenario, many spatial domain algorithms like LSB, first component alternate, pixel indicator are usually used for steganography since they are easier to implement and less complex. Even though their hiding capacity is high, they are more prone to steganalysis. A new RGB-based algorithm is designed to store data in Random prime numbered multiple pixel locations and the encrypted key is also stored along with the data in a co-prime location (co-prime to the aforesaid 3 numbers). This algorithm requires to choose 3 random numbers to store data in R(Red), G(Green) and B(Blue) components of the cover image(24 bit image). Blue component is given the priority to store more data (lowest prime no: multiple pixel location) because a research was conducted by Hecht [14], which reveals that the blue objects, if visually perceived, are intense and are comparatively less distinct than the red and green objects. Since the key size is fixed, it is stored in coprime pixel locations, which will be least in number. Key bits will be stored in R, G, B components one at a time in a cyclic manner, in the above mentioned co-prime locations, in which the security is improved. A null terminator bit pattern may be used to indicate end of key or data. The reverse process of the encoding algorithm is used to decode the message.
引用
收藏
页码:58 / 73
页数:16
相关论文
共 14 条
  • [1] Amanpreet Kaur, 2010, ARXIV100119722010
  • [2] Divya M, 2014, ACCELERATION LSB ALG
  • [3] Adaptive Steganalysis of Least Significant Bit Replacement in Grayscale Natural Images
    Fillatre, Lionel
    [J]. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2012, 60 (02) : 556 - 569
  • [4] Gouthamanaath MG, INT J COMPUTER APPL
  • [5] Hecht E, 1987, OPTICS
  • [6] Hemalatha S, 2013, SPEED UP IMPROVEMENT
  • [7] A Novel Data Embedding Method Using Adaptive Pixel Pair Matching
    Hong, Wien
    Chen, Tung-Shou
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (01) : 176 - 184
  • [8] Kumar Archana, ENHANCED STEGANOGRAP
  • [9] Edge Adaptive Image Steganography Based on LSB Matching Revisited
    Luo, Weiqi
    Huang, Fangjun
    Huang, Jiwu
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2010, 5 (02) : 201 - 214
  • [10] Mahimah P, 2013, COMP INT COMP RES IC