Subscribe Now Subscribe Today
Science Alert
 
FOLLOW US:     Facebook     Twitter
Blue
   
Curve Top
Research Journal of Information Technology
  Year: 2013 | Volume: 5 | Issue: 2 | Page No.: 87-99
DOI: 10.3923/rjit.2013.87.99
Pixel Indicated Triple Layer: A Way for Random Image Steganography
R. Amirtharajan, R. Subrahmanyam, Jasti Nithin Teja, Katkuri Mahendar Reddy and J.B.B. Rayappan

Abstract:
In this study, a secure mode of steganography is projected in which three main entities are exercised. They are Pseudo random generator, Least Significant Bit (LSB) substitution and Optimal Pixel Adjustment Process (OPAP). A popular cliché “All roads lead to Rome” says that there endure countless ways to attain a target. Likewise, this goes very well with Steganography than any other things. Digital epoch of steganography embraces numerous trials to surmount the universal hitch of concealment and refuge in every form of computer communication. This study reveals one more methodology for the same but with unique characteristics. Here, cyclic pixel indicator technique is used wherein two channels are used as data channels and the remaining channel is used as an indicator channel. Red plane is taken as the indicator channel for the first pixel for the subsequent pixels the indicator channels follows a periodic cycle of R, G, B. barring the indicator channel, the other two channels act as the data channels for the corresponding pixels. The pixel intensity determines the bits to be embedded. i.e., LSB’s of the indicator channel. If the LSB’s of indicator channel say R channel are 00 Embed 1 bit in G and 2 bits in B; in case of 01, embed 2 bits in G and B each. If LSB(R) is 10, 2 are inlayed in G and 3 bits in B. Finally id LSB(R) equals 11 and then 3 bits are ingrained in G and 3 bits in B. A novel 2-key based pseudo random generator is employed which is used to embed data completely in a unique random fashion based on user’s choice. Thus, it introduces obscurity, while composite embedding of secret bits will result in additional intricacy. Therefore, this study is yet another practical cum unassailable means for secret sharing. Justification for this study is provided by the analytical results.
 [Fulltext PDF]   [Fulltext HTML]   [XML: Abstract + References]   [References]   [View Citation]  [Report Citation]
 RELATED ARTICLES:
  •    Graphical Password Authentication Scheme for Embedded Platform
  •    Least Significant Bit but Quantum Bit: A Quasi Stego
  •    Comparative Analysis of (5/3) and Haar IWT Based Steganography
  •    Cryptic Cover for Covered Writing: A Pre-Layered Stego
  •    Robust Adaptive Image Watermarking using Visual Models in DWT and DCT Domain
  •    Arabic Text Steganography using Kashida Extensions with Huffman Code
  •    Hiding Data in Video File: An Overview
  •    Brownian Motion of Binary and Gray-Binary and Gray Bits in Image for Stego
How to cite this article:

R. Amirtharajan, R. Subrahmanyam, Jasti Nithin Teja, Katkuri Mahendar Reddy and J.B.B. Rayappan, 2013. Pixel Indicated Triple Layer: A Way for Random Image Steganography. Research Journal of Information Technology, 5: 87-99.

DOI: 10.3923/rjit.2013.87.99

URL: https://scialert.net/abstract/?doi=rjit.2013.87.99

 
COMMENT ON THIS PAPER
 
 
 

 

 
 
 
 
 
 
 
 
 

 
 
 
 

Curve Bottom