Open Access Open Access  Restricted Access Subscription or Fee Access

Image Steganography Techniques for Optimized Embedding in Image Processing

R. Manivasagan, Dr. T. Velumani

Abstract


Steganography is one of the methods used for the hidden exchange of information. It is the art and science of invisible communication, which strives to hide the existence of the communicated message. In this way, if successfully it is achieved, the message does not attract attention from eavesdroppers and attackers. Using steganography, information can be hidden in different embedding mediums, known as carriers. These carriers can be images, audio files, video files, and text files. The focus in this paper is on the use of an image file as a carrier, and hence, the taxonomy of current steganographic techniques for image files has been presented. Images are categorized on the basis of size, texture and types that include only jpeg, bmp and png types to determine their impending impact on steganographic methods. Text data to be embedded is classified and selected of varying capacities and domains to determine best suited data compression mechanisms and steganographic techniques. Our results designate the selection of compression and embedding techniques with respect to types of data.

Keywords


Data Compression, Distortion, Embedding Techniques, Spatial Domains.

Full Text:

PDF

References


C. I. Podilchuk, E. J. Delp, Digital watermarking: algorithms and applications, IEEE Signal Process. Mag. 18(4) (2001), pp. 33–46.

J. J. K. O’ Ruanaidh, W. J. Dowling, F. M. Boland, “Watermarking digital images for copyright protection”, IEE Proceedings on Vision, Image and Signal Processing 143(4) (1996), pp. 250–256.

Vijayalakshmi, G. Zayaraz, and V. Nagaraj, “A modulo based LSB steganography method”, IEEE Conference on Control, Automation, Communication and Energy Conservation, August 2009, pp.1-4.

A.M. Fard, M.R Akbarzadeh and A. F Varasteh. “A New Genetic Algorithm Approach for Secure JPEG Steganography,” International Conference on Engineering of Intelligence Systems, 2006, pp 1-6.

D. C. Wu, & W. H. Tsai, “A steganographic method for images by pixel-value differencing”, Pattern Recognition Letters, vol. 24, no. 9-10, 2003, pp. 1613-162

Anjli A. Shejul, Umesh L. Kulkarni, A Secure Skin Tone based Steganography Using Wavelet Transform, International Journal of Computer Theory and Engineering, Vol.3, No.1, February 2011, pp. 16-22.

J. Spaulding, H. Noda, M. N. Shirazi, E. Kawaguchi, BPCS steganography using EZW lossy compressed images, Pattern Recognition Letters 23(13) (2002). Pp.1579– 1587.

Chin-Chen Chang, Chih-Yang Linb, Yi- Hsuan Fan, Lossless data hiding for color images based on block truncation coding, The Journal of Pattern Recognition, Elsevier 41 (2008), pp. 2347–2357.

Mahmud Hasan, Kamruddin Md. Nur, Tanzeem Bin Noor, A Novel Compressed Domain Technique of Reversible Steganography, International Journal of Advanced Research in Computer Science and Software Engineering ISSN: 2277 128X, March 2012, pp. 1-6.

Chin-Chen Chang, Chih-Yang Lin, Yu- Zheng Wang, New image steganographic methods using run-length approach, International Journal of Information Sciences (176), Elsevier, 03 February, 2006, pp. 3393-3408.

J. Kong, H. Jia, X. Li, Z. Qi, A novel content-based information hiding scheme, in: Proceedings of the International Conference on Computer Engineering and Technology, 22–24 January 2009, vol. 1, pp. 436–440.

K. Thilagam, S. Karthikeyan, Optimized Image Resizing using Piecewise Seam Carving, International Journal of Computer Applications (0975 – 8887) Volume 42– No. 14, March 2012, pp. 24-30.

Adnan Gutub and et al., “Pixel indicator high capacity technique for RGB image based Steganography”, WoSPA 2008 – 5th IEEE International Workshop on Signal Processing and its Applications, University of Sharjah, Sharjah, U.A.E. 18 – 20 March 2008.

Paul G. Howard, & Jeffrey Scott Vitter, “Practical Implementations of Arithmetic Coding”, International Conferences on Advances in Communication and Control (COMCON 3), British Columbia, Canada, 16-18 October, 1991, pp. 1-34. Pushpa R. Suri and Madhu Goel, “Ternary Tree and Memory-Efficient Huffman

Decoding Algorithm”, IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 1, ISSN (Online): 1694-0814, pp. 483- 489, January 2011.

Ratankirti Roy, Suvamoy Changder, Anirban Sarkar, Narayan C Debnath, Evaluating Image Steganography Techniques: Future Research Challenges, 978-1-4673-2088-7/13/$31.00 ©2013 IEEE, 2013, pp. 309-314.

Sanjay Bajpai, Kanak Saxena, A High end Capacity in Digital Image Steganography: Empowering Security by Mottling through Morphing, International Journal of Scientific and Engineering Research (IJSER), Volume 5 Issue 2, ISSN 2229-5518, February 2014, pp. 1081-1086.

Chi-Kwong Chan, & L.M. Cheng, “Improved hiding data in images by optimal moderately significant-bit replacement”, IEE Electron Lett. 37 (16), 2001, pp. 1017-1018.

Rosziati Ibrahim and Teoh Suk Kuan, Steganography algorithm to hide secret message inside an image, Journal of Computer Technology and Application 2 (2011), 25 February, 2011, pp. 102-108.

Xin Liao, Qiao-yan Wen, Jie Zhang, A steganographic method for digital images with four-pixel differencing and modified LSB substitution, Journal of Vis. Commun. Image Elsevier R(22) (2011), pp. 1-8.

C. H. Yang, C. Y. Weng, A steganographic method for digital images by multi-pixel differencing, in: Proceedings of International Computer Symposium, Taipei, Taiwan, R.O.C., 2006, pp. 831–836.

Sanjay Bajpai, Kanak Saxena, “Enhancing Embedding Capacity by Compartmentalizing Pixels using LSB Techniques in Steganography”, International Journal of Computers and Applications, ACTA Press, paper-id 202- 3762, submitted – 03 April, 2013.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.