Subscribe Now Subscribe Today
Science Alert
Curve Top
Research Journal of Information Technology
  Year: 2013 | Volume: 5 | Issue: 3 | Page No.: 304-316
Facebook Twitter Digg Reddit Linkedin StumbleUpon E-mail

Kubera Kolam: A Way for Random Image Steganography

Rengarajan Amirtharajan, Krishnamourthy Karthikeyan, Malligaraj Malleswaran and J.B.B. Rayappan

The developments in expertise and internet fruition have amplified dependence on systems and IT abided by the demand to secure the same. This intriguing effort in electronic world has unfolded a new boulevard called cyber defense. In this world of cyber hacking, information security plays a vital role. Primitive techniques though are old but are very helpful in giving a perfect outline of things away from human thoughts. One such technique is the Magic Square Method, wherein the brilliant orientation of the numbers leads to a perfect matrix useful for any mathematical developments. Block Segmentation in this study involves two kolams firstly the Kubera Kolam is the magic square that is employed and incorporated for introducing the randomization. Further is the Pulli Kolam, square for acting as the symmetric key for giving the precise bits to be hidden. Further on, modifiable pixel indicator gets slightly altered from the rudiments and is used to accomplish a much efficient and effective indicator liken the conventional one.
PDF Fulltext XML References Citation Report Citation
  •    Graphical Password Authentication Scheme for Embedded Platform
  •    Least Significant Bit but Quantum Bit: A Quasi Stego
  •    Comparative Analysis of (5/3) and Haar IWT Based Steganography
  •    Cryptic Cover for Covered Writing: A Pre-Layered Stego
  •    Why Information Security Demands Transform Domain, Compression and Encryption?
  •    Robust Adaptive Image Watermarking using Visual Models in DWT and DCT Domain
  •    Arabic Text Steganography using Kashida Extensions with Huffman Code
  •    Hiding Data in Video File: An Overview
  •    Brownian Motion of Binary and Gray-Binary and Gray Bits in Image for Stego
  •    Inverted Pattern in Inverted Time Domain for Icon Steganography
How to cite this article:

Rengarajan Amirtharajan, Krishnamourthy Karthikeyan, Malligaraj Malleswaran and J.B.B. Rayappan, 2013. Kubera Kolam: A Way for Random Image Steganography. Research Journal of Information Technology, 5: 304-316.


20 July, 2015
Hi All,
Hats off on your work. I am an avid kolam lover and regularly follow the practice of drawing kolams in our front yard. Being a communications engineer myself, I was amazed at the fact that Kolams could be a basis of secure patterns generation algorithm. The one person who to whom i could speak about this research would be my grandmother who is almost 90 and would certainly be happy to know that her practice of drawing kolams till date is not trivial and has contributed to incredible research studies like this.
Thank you so much and keep up your good work!
22 July, 2015
Karthikeyan Krishnamourthy:

Hi Aparna, Thanks for your kind words. This would surely encourage us all. The idea of using Kolam for information security was inspired by our work of our Mentors, Dr. Rengarajan and Dr. Rayappan. Thanks again and we are happy that we could make your grandmother happy. Regards, Karthik

22 July, 2015
Dr Rengarajan Amirtharajan:

Thanks a lot madam. Inspiration for this work is my mother.Hats off to her



Curve Bottom