Subscribe Now Subscribe Today
Science Alert
Curve Top
Research Journal of Information Technology
  Year: 2013 | Volume: 5 | Issue: 3 | Page No.: 263-276
DOI: 10.3923/rjit.2013.263.276
Facebook Twitter Digg Reddit Linkedin StumbleUpon E-mail

Horse Communication against Harsh Attack: A Stego Ride

V. Thanikaiselvan and P. Arulmozhivarman

The common techniques used to implement image steganography are: One-Modified Least Significant Bits (LSB) substitution techniques with the readjustment procedure to reduce the Mean Square Error (MSE); Two-Pixel Indicator (PI) to increase the complexity of embedding procedure; Three-random path inside the file. These techniques, when used without making much compromise on the critical parameters, ensure enhanced security of the secret data. In this study, we propose to effectuate the knight’s tour for random walk without altering the quality of the image. To ensure full security, randomization of the Red, Green and Blue (RGB) planes of the cover image using row vector is implemented and the obtained image is divided into four pixel blocks. Then, knight’s tour to choose successive block follows the Pixel Value Differencing (PVD) to embed data optimally. Thus, this method assures a highly imperceptible and complex steganography with higher capacity.
PDF Fulltext XML References Citation Report Citation
  •    Brownian Motion of Binary and Gray-Binary and Gray Bits in Image for Stego
  •    Inverted Pattern in Inverted Time Domain for Icon Steganography
  •    Pixel Authorized by Pixel to Trace with SFC on Image to Sabotage Data Mugger: A Comparative Study on PI Stego
  •    Random Image Steganography and Steganalysis: Present Status and Future Directions
How to cite this article:

V. Thanikaiselvan and P. Arulmozhivarman, 2013. Horse Communication against Harsh Attack: A Stego Ride. Research Journal of Information Technology, 5: 263-276.

DOI: 10.3923/rjit.2013.263.276






Curve Bottom