Subscribe Now Subscribe Today
Science Alert
Curve Top
Research Journal of Information Technology
  Year: 2012 | Volume: 4 | Issue: 4 | Page No.: 124-139
Facebook Twitter Digg Reddit Linkedin StumbleUpon E-mail

Pixel Authorized by Pixel to Trace with SFC on Image to Sabotage Data Mugger: A Comparative Study on PI Stego

Rengarajan Amirtharajan and John Bosco Balaguru Rayappan

There is a raging moral combat to secure information from nefarious attackers as infringement of data is alarmingly escalating with valuable secret information being sabotaged, manipulated or even sold. This has made it necessary for development of efficacious information hiding algorithm to prevent info-sabotage by undetectable secret sharing. Steganography has gained the limelight in the recent past and is formidable and belligerent as it involves embedding of secret data in either images, audio, video, etc., so unsuspectingly that even when intercepted cannot provide a hint to the hackers. However, to make it fool proof we cerebrate yet another algorithm in this paper which uses a combination of Hilbert and Moore Space Filling Curve (SFC) and the pixel indicator methodology, a steganographic tool to improve the randomness and cloak the scanning path such the adversary does not even spill on the clandestine information by an accident. Pixel Indicator (PI) technique uses the complexity of the color image which would be split into red, green and blue planes, respectively with one acting as an indicator, depending upon whose last two bits, data would be embedded in the other two planes. Thus instead of employing the usual raster scan, a random space filling curves (SFC) is used for embedding data into the pixels, because of which it would be impossible for eavesdropper to determine the path of embedding of data making it a highly robust system. The added advantages and enhancements provided by this technique can be observed by the readings of Mean Square Error (MSE) and Peak Signal to Noise Ratio (PSNR) that have been obtained on implementing this algorithm.
PDF Fulltext XML References Citation Report Citation
  •    Graphical Password Authentication Scheme for Embedded Platform
  •    Least Significant Bit but Quantum Bit: A Quasi Stego
  •    Cryptic Cover for Covered Writing: A Pre-Layered Stego
  •    Why Information Security Demands Transform Domain, Compression and Encryption?
  •    Image Encryption: An Information Security Perceptive
  •    Quantization Based Robust Image Watermarking in DCT-SVD Domain
  •    Arabic Text Steganography using Kashida Extensions with Huffman Code
  •    Hiding Data in Video File: An Overview
  •    Inverted Pattern in Inverted Time Domain for Icon Steganography
  •    Random Image Steganography and Steganalysis: Present Status and Future Directions
How to cite this article:

Rengarajan Amirtharajan and John Bosco Balaguru Rayappan, 2012. Pixel Authorized by Pixel to Trace with SFC on Image to Sabotage Data Mugger: A Comparative Study on PI Stego. Research Journal of Information Technology, 4: 124-139.




Curve Bottom