Subscribe Now Subscribe Today
Science Alert Home Journals at Science Alert For Authors For Subscribers Contact Us
   
Research Journal of Information Technology
  Year: 2013 | Volume: 5 | Issue: 3 | Page No.: 304-316
DOI: 10.3923/rjit.2013.304.316
Kubera Kolam: A Way for Random Image Steganography
Rengarajan Amirtharajan, Krishnamourthy Karthikeyan, Malligaraj Malleswaran and J.B.B. Rayappan

Abstract:
The developments in expertise and internet fruition have amplified dependence on systems and IT abided by the demand to secure the same. This intriguing effort in electronic world has unfolded a new boulevard called cyber defense. In this world of cyber hacking, information security plays a vital role. Primitive techniques though are old but are very helpful in giving a perfect outline of things away from human thoughts. One such technique is the Magic Square Method, wherein the brilliant orientation of the numbers leads to a perfect matrix useful for any mathematical developments. Block Segmentation in this study involves two kolams firstly the Kubera Kolam is the magic square that is employed and incorporated for introducing the randomization. Further is the Pulli Kolam, square for acting as the symmetric key for giving the precise bits to be hidden. Further on, modifiable pixel indicator gets slightly altered from the rudiments and is used to accomplish a much efficient and effective indicator liken the conventional one.
 [Fulltext PDF]   [Fulltext HTML]   [XML: Abstract + References]   [References]   [View Citation]  [Report Citation]
 RELATED ARTICLES:
  •    Graphical Password Authentication Scheme for Embedded Platform
  •    Least Significant Bit but Quantum Bit: A Quasi Stego
  •    Comparative Analysis of (5/3) and Haar IWT Based Steganography
  •    Cryptic Cover for Covered Writing: A Pre-Layered Stego
  •    Robust Adaptive Image Watermarking using Visual Models in DWT and DCT Domain
  •    Arabic Text Steganography using Kashida Extensions with Huffman Code
  •    Hiding Data in Video File: An Overview
  •    Brownian Motion of Binary and Gray-Binary and Gray Bits in Image for Stego
How to cite this article:

Rengarajan Amirtharajan, Krishnamourthy Karthikeyan, Malligaraj Malleswaran and J.B.B. Rayappan, 2013. Kubera Kolam: A Way for Random Image Steganography. Research Journal of Information Technology, 5: 304-316.

DOI: 10.3923/rjit.2013.304.316

URL: http://scialert.net/abstract/?doi=rjit.2013.304.316

COMMENTS
20 July, 2015
Aparna:
Hi All, Hats off on your work. I am an avid kolam lover and regularly follow the practice of drawing kolams in our front yard. Being a communications engineer myself, I was amazed at the fact that Kolams could be a basis of secure patterns generation algorithm. The one person who to whom i could speak about this research would be my grandmother who is almost 90 and would certainly be happy to know that her practice of drawing kolams till date is not trivial and has contributed to incredible research studies like this. Thank you so much and keep up your good work! Cheers
22 July, 2015
Karthikeyan Krishnamourthy:

Hi Aparna, Thanks for your kind words. This would surely encourage us all. The idea of using Kolam for information security was inspired by our work of our Mentors, Dr. Rengarajan and Dr. Rayappan. Thanks again and we are happy that we could make your grandmother happy. Regards, Karthik

22 July, 2015
Dr Rengarajan Amirtharajan:

Thanks a lot madam. Inspiration for this work is my mother.Hats off to her

 
COMMENT ON THIS PAPER
.
 
 
 
 

 

 
 
 
 
 
 
 
 
 

 
 
 
 
 
 

                 home       |       journals        |       for authors       |       for subscribers       |       asci
          © Science Alert. All Rights Reserved