Open Access Open Access  Restricted Access Subscription or Fee Access

An Efficient, High Secure Steganography Algorithm

S. Anila, Dr.N. Devarajan

Abstract


Steganography (from Greek steganos, or "covered," and graphie, or "writing") is the hiding of a secret message within an ordinary message and the extraction of it at its destination. The new steganography algorithm which is constructed and implemented hides a large amount of data (image, audio, text) file into color BMP image. Adaptive image segmentation with bits replacement on the appropriate pixels has been used. These pixels are selected randomly rather than sequentially by using new concept defined by main cases with their sub cases for each byte in one pixel. Some specific image based steganography techniques show that an observer can indeed distinguish between images carrying a hidden message and images which do not carry a message. In this algorithm, 16 main cases with their sub cases cover all aspects of the input data into color bitmap image. High security layers have been proposed through three layers to make it difficult to break through the encryption of the input data.  Comparison is made with the previous steganography algorithms like S-Tools and factors like the amount of data that could be hidden, the nature of the image and the length of the password have also been discussed. The proposed algorithm can embed efficiently a large amount of data with high quality of the output.

Keywords


AES Algorithm, Decryption, Embed, Encryption, Hiding with High Security, Steganography

Full Text:

PDF

References


Nameer N. EL-Emam (2007), ‘Hiding a Large Amount of Data with High Security Using Steganography Algorithm’, Journal of Computer Science 3 (4): 223-232, 2007, Philadelphia University, Jordan

Chandramouli, R. and N. Memon, 2001. Analysis of LSB based image steganography techniques. Proc. of ICIP, Thessaloniki, Greece.

Dumitrescu, S., W. Xiaolin and Z. Wang, 2003.Detection of LSB steganography via sample pair analysis. In: LNCS, Vol. 2578, Springer-Verlag, New York, pp: 355–372.

Ahn, L.V. and N.J. Hopper, 2004. Public-key steganography. In Lecture Notes in Computer Science. Vol. 3027 / 2004 of Advances in Cryptology - EUROCRYPT 2004, pp: 323–341.Springer-Verlag Heidelberg.

Pang, H.H., K.L. Tan and X. Zhou, 2004.Steganographic schemes for file system and b-tree. IEEE Trans. on Knowledge and Data Engineering, 16: 701–713.

Dobsicek, M., 2004. Extended steganographic system. In: 8th Intl. Student Conf. on Electrical Engineering. FEE CTU.

Mittal, U. and N. Phamdo, 2002. Hybrid digital analog joint source-channel codes for broadcasting and robust communications. IEEE Trrans. on Info. Theory, 48: 1082 –1102.

Pavan, S., S. Gangadharpalli and V. Sridhar, 2005.Multivariate entropy detector based hybrid image registration algorithm. IEEE Intl. Conf. on Acoustics, Speech and Signal Processing, pp: 18-23.

Moulin, P. and J.A. O’Sullivan, 2003. Information theoretic analysis of information hiding. IEEE Trans. on Info. Theory, 49: 563–593.

Amin, P., N. Liu and K. Subbalakshmi, 2005. Statistically secure digital image data hiding. IEEE Multimedia Signal Processing MMSP05, China.

Jackson, J., G. Gunsch, R. Claypoole and G. Lamont, 2004. Detecting novel steganography with an anomaly- based strategy. J. Electr. Imag., 13:860– 870.

S-Tools (http:// digitalforensics. champlain. edu/download/s-tools 4.zip).


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.