Subscribe Now Subscribe Today
Science Alert
 
Blue
   
Curve Top
Information Technology Journal
  Year: 2014 | Volume: 13 | Issue: 12 | Page No.: 1969-1976
DOI: 10.3923/itj.2014.1969.1976
 
Facebook Twitter Digg Reddit Linkedin StumbleUpon E-mail

Cover as Key and Key as Data: An Inborn Stego

Siva Janakiraman, Jagannathan Chakravarthy, Badrinath Radhakrishnan, K. Thenmozhi, J.B.B. Rayappan and Rengarajan Amirtharajan

Abstract:
Communication playing the key role of daily lives has created revolutions since the Stone Age. In this fast-paced technological world, the utilization of information has gained towering momentum. Furthermore, information while transmitted over the internet with the swift escalation in the mass media and digital communication technology, the requirement for impregnable covert channel arises especially when critical information has to be communed. Over the years, Information hiding techniques have evolved to conceal any critical data in cover files like images, audios and videos and thus, certifying the genuineness and secrecy of the transmitted data. Steganography is one such method where the very existence of the data in the cover image is hidden and thereby, provides for security by making the hidden data unconceivable. The cover file may include audio, video or image files. In this study, two methods have been proposed to embed image within an image with two and three layers of security, respectively. A decoder circuit is used in one of the layers to embed the data not only in the LSB bits but also in the other bits of the lower nibble. Moreover, two bits of data are embedded in a pixel by changing only one bit of the pixel. These methods show improved security without compromising on the PSNR and MSE values.
PDF Fulltext XML References Citation Report Citation
 RELATED ARTICLES:
  •    Light Weight Steganography on RISC Platform-Implementation and Analysis
  •    Comparative Analysis of (5/3) and Haar IWT Based Steganography
  •    Image Encryption: An Information Security Perceptive
  •    Galois Field Proficient Product for Secure Image Encryption on FPGA
  •    Random Image Steganography and Steganalysis: Present Status and Future Directions
  •    Firmware for Data Security: A Review
  •    Steganalysis Based on Difference Statistics for LSB Matching Steganography
  •    On the Differences between Hiding Information and Cryptography Techniques: An Overview
How to cite this article:

Siva Janakiraman, Jagannathan Chakravarthy, Badrinath Radhakrishnan, K. Thenmozhi, J.B.B. Rayappan and Rengarajan Amirtharajan, 2014. Cover as Key and Key as Data: An Inborn Stego. Information Technology Journal, 13: 1969-1976.

DOI: 10.3923/itj.2014.1969.1976

URL: https://scialert.net/abstract/?doi=itj.2014.1969.1976

COMMENT ON THIS PAPER
 
 
 

 

 
 
 
 
 
 
 
 
 

 
 
 
 
 

Curve Bottom