Asian Science Citation Index is committed to provide an authoritative, trusted and significant information by the coverage of the most important and influential journals to meet the needs of the global scientific community.  
ASCI Database
308-Lasani Town,
Sargodha Road,
Faisalabad, Pakistan
Fax: +92-41-8815544
Contact Via Web
Suggest a Journal
Information Technology Journal
Year: 2014  |  Volume: 13  |  Issue: 12  |  Page No.: 1969 - 1976

Cover as Key and Key as Data: An Inborn Stego

Siva Janakiraman, Jagannathan Chakravarthy, Badrinath Radhakrishnan, K. Thenmozhi, J.B.B. Rayappan and Rengarajan Amirtharajan    

Abstract: Communication playing the key role of daily lives has created revolutions since the Stone Age. In this fast-paced technological world, the utilization of information has gained towering momentum. Furthermore, information while transmitted over the internet with the swift escalation in the mass media and digital communication technology, the requirement for impregnable covert channel arises especially when critical information has to be communed. Over the years, Information hiding techniques have evolved to conceal any critical data in cover files like images, audios and videos and thus, certifying the genuineness and secrecy of the transmitted data. Steganography is one such method where the very existence of the data in the cover image is hidden and thereby, provides for security by making the hidden data unconceivable. The cover file may include audio, video or image files. In this study, two methods have been proposed to embed image within an image with two and three layers of security, respectively. A decoder circuit is used in one of the layers to embed the data not only in the LSB bits but also in the other bits of the lower nibble. Moreover, two bits of data are embedded in a pixel by changing only one bit of the pixel. These methods show improved security without compromising on the PSNR and MSE values.

Cited References   |    Fulltext    |   Related Articles   |   Back
 
 
   
 
 
 
  Related Articles

 
 
 
 
 
 
 
 
 
Copyright   |   Desclaimer   |    Privacy Policy   |   Browsers   |   Accessibility