Subscribe Now Subscribe Today
Science Alert
 
FOLLOW US:     Facebook     Twitter
Blue
   
Curve Top
Research Journal of Information Technology
  Year: 2013 | Volume: 5 | Issue: 3 | Page No.: 329-340
DOI: 10.3923/rjit.2013.329.340
Rubik’s Cube: A Way for Random Image Steganography
Rengarajan Amirtharajan, M. Venkata Abhiram, G. Revathi, J. Bharathsimha Reddy, V. Thanikaiselvan and J.B.B. Rayappan

Abstract:
This study proposes an innovative methodology that incorporates the famous Rubik’s cube into steganography. Rubik’s cube is a pivot mechanism that enables each face to turn independently thus allowing mixing up of colors. By using this mechanism to represent the three planes of a color image (Red, Green, and Blue) the randomness of the stego image can be improved. The pixel intensity values can additionally be used as pointers to indicate the type of shift that needs to be done to the pixels in three planes. This study contains the experimental results that validate the superiority of this methodology compared to other existing ones in terms of imperceptibility, robustness and with reasonable embedding capacity. It is also found to be more resistant to steganalysis.
PDF Fulltext XML References Citation Report Citation
 RELATED ARTICLES:
  •    Graphical Password Authentication Scheme for Embedded Platform
  •    Comparative Analysis of (5/3) and Haar IWT Based Steganography
  •    Cryptic Cover for Covered Writing: A Pre-Layered Stego
  •    Why Information Security Demands Transform Domain, Compression and Encryption?
  •    Robust Adaptive Image Watermarking using Visual Models in DWT and DCT Domain
  •    Arabic Text Steganography using Kashida Extensions with Huffman Code
  •    Hiding Data in Video File: An Overview
  •    Brownian Motion of Binary and Gray-Binary and Gray Bits in Image for Stego
How to cite this article:

Rengarajan Amirtharajan, M. Venkata Abhiram, G. Revathi, J. Bharathsimha Reddy, V. Thanikaiselvan and J.B.B. Rayappan, 2013. Rubik’s Cube: A Way for Random Image Steganography. Research Journal of Information Technology, 5: 329-340.

DOI: 10.3923/rjit.2013.329.340

URL: https://scialert.net/abstract/?doi=rjit.2013.329.340

 
COMMENT ON THIS PAPER
 
 
 

 

 
 
 
 
 
 
 
 
 

 
 
 
 
 

       

       

Curve Bottom