HOME JOURNALS CONTACT

Research Journal of Information Technology

Year: 2012 | Volume: 4 | Issue: 4 | Page No.: 124-139
DOI: 10.17311/rjit.2012.124.139
Pixel Authorized by Pixel to Trace with SFC on Image to Sabotage Data Mugger: A Comparative Study on PI Stego
Rengarajan Amirtharajan and John Bosco Balaguru Rayappan

Abstract: There is a raging moral combat to secure information from nefarious attackers as infringement of data is alarmingly escalating with valuable secret information being sabotaged, manipulated or even sold. This has made it necessary for development of efficacious information hiding algorithm to prevent info-sabotage by undetectable secret sharing. Steganography has gained the limelight in the recent past and is formidable and belligerent as it involves embedding of secret data in either images, audio, video, etc., so unsuspectingly that even when intercepted cannot provide a hint to the hackers. However, to make it fool proof we cerebrate yet another algorithm in this paper which uses a combination of Hilbert and Moore Space Filling Curve (SFC) and the pixel indicator methodology, a steganographic tool to improve the randomness and cloak the scanning path such the adversary does not even spill on the clandestine information by an accident. Pixel Indicator (PI) technique uses the complexity of the color image which would be split into red, green and blue planes, respectively with one acting as an indicator, depending upon whose last two bits, data would be embedded in the other two planes. Thus instead of employing the usual raster scan, a random space filling curves (SFC) is used for embedding data into the pixels, because of which it would be impossible for eavesdropper to determine the path of embedding of data making it a highly robust system. The added advantages and enhancements provided by this technique can be observed by the readings of Mean Square Error (MSE) and Peak Signal to Noise Ratio (PSNR) that have been obtained on implementing this algorithm.

Fulltext PDF Fulltext HTML

How to cite this article
Rengarajan Amirtharajan and John Bosco Balaguru Rayappan, 2012. Pixel Authorized by Pixel to Trace with SFC on Image to Sabotage Data Mugger: A Comparative Study on PI Stego. Research Journal of Information Technology, 4: 124-139.

Related Articles:
© Science Alert. All Rights Reserved