|
|
|
|
Research Article
|
|
PVD Based Steganography on Scrambled RGB Cover Images with Pixel Indicator |
|
V. Thanikaiselvan,
S. Subashanthini
and
Rengarajan Amirtharajan
|
|
|
ABSTRACT
|
With the rapid advancements in digital information transmission, technologies need for ensuring high level of data security, has become indispensible. In order to ensure the same, many cryptography and steganography techniques are in use. In the proposed methodology, both the techniques have been used simultaneously for incorporating a near fool proof security. Cryptography renders an image unreadable whereas, steganography aims at hiding secret information in the image. In the scrambled image, adaptive Least Significant Bit (LSB) substitution has been performed using Pixel Value Differencing (PVD) based on Pixel Indicator (PI) method for colour images. Here, secret data is embedded only in R and G planes while, B plane acts as an indicator for embedding. This methodology increases the embedding capacity by 50% compared to the existing methods in addition with a reasonable Peak Signal to Noise Ratio (PSNR) of 42 dB.
|
|
|
|
|
Received: January 22, 2014;
Accepted: April 04, 2014;
Published: July 14, 2014
|
|
INTRODUCTION
With the advancements in information technology, issue of data security comes
hand in hand. Large amount of data transmitted via internet needs to be made
secure against malicious attacks. Secret information particularly sensitive
information needs to be handled with extreme care as its misuse can create great
havoc to the society. So, to make the secret information attack proof, role
of various cryptographic and steganographic techniques come into picture (Cheddad
et al., 2010; Amirtharajan and Rayappan, 2012a-d,
2013; Amirtharajan et al.,
2013a-j; Janakiraman et
al., 2012a, b, 2014a,
b; Luo et al., 2011;
Mohammad et al., 2011; Salem
et al., 2011; Ramalingam et al., 2014a,
b; Thien and Lin, 2003; Zhao
and Luo, 2012).
Cryptography has been in practice from ancient times with its main aim being
making the message unreadable by all except the authorised receiver who has
the key to retain the actual message. It converts the secret information in
un-intelligible form thereby, making it unreadable by a hacker. On the other
hand, steganography aims at hiding data in multimedia such as image (Chan
and Cheng, 2004; Amirtharajan et al., 2010,
2011, 2012, 2013b),
audio or video files, so that secret data is invisible to the naked eye during
transmission called information security (Thenmozhi et al., 2012; Praveenkumar
et al., 2012a, b, 2013a,
b, 2014a-j).
The ideology behind this is, if a certain feature of hidden information becomes
visible, point of attack becomes evident. Various algorithms and methodologies
exist for the same in hardware (Rajagopalan et al.,
2012a, b, 2014a-d;
Janakiraman et al., 2012a, b,
2014a, b).
Three main pillars of steganography are ensuring robustness (Wong
et al., 2007; Qi and Wong, 2005), high embedding
capacity and undetectability (Wu and Tsai, 2003; Zhang
and Wang, 2004; Thanikaiselvan et al., 2012a-c,
2013a, b). This study proposes
use of cryptography and steganography together for hiding text files in colour
images which are used as cover. The RGB colour planes of the image are separated
and scrambled, except the blue plane, using Arnold Cat map. Image scrambling
technology is easy to realized but it is not in accordance with Kirchhoffs
rules and its security is not very high. But when data is embedded in this scrambled
image using steganography algorithms, a high level of security is ensured.
Blue plane of the image is used as indicator for embedding in R and G planes
where the clandestine context gets pushed in the adaptive LSB values so as difference
in the pixel value is not visible to the naked eye. If the pixel value of first
pixel in 2x2 matrix of blue plane is even, then data is embedded in red plane
else, it is embedded in green plane. Data embedding takes place by Pixel Value
Differencing (PVD) method where four pixels of the 2x2 matrix of the cover used
at once for embedding the data (Wu and Tsai, 2003; Zhang
and Wang, 2004). Pixel indicator method (Janakiraman
et al., 2012a, b, 2013)
is a method which can be adapted with PVD and other methods to improve the security
further. In this study, PVD and pixel indicator method are used on a scrambled
cover image, data is embedded adaptively in R and G plane i.e., k bits are embedded
based on the level inwhich the average difference falls based on the pixel value
in B plane. This technique improvises on pixel embedding capacity as well as
ensuring a high level of security.
METHODOLOGY
The methods publicized here put forward a secure data hiding technique by using
both cryptography and steganography techniques. The block diagram for the method
is shown in Fig. 1. This technique is aimed to achieve high
security by first scrambling the colour planes of cover file which is a 24 bit
colour image using Arnold algorithm and then embedding the secret data in the
encrypted R and G planes using a steganographic algorithm based on pixel indicator
on the blue plane. For transmission, the R and G planes are descrambled and
merged to form colour stego image and then transmitted thereby hiding the very
essence of any data hidden. As the steganography is performed on the encrypted
cover file, any attempt to search for hidden data in the transmitted file will
result in garbage values. This ensures a highly secure way to transfer sensitive
data as compared to use of cryptography and steganography alone.
At receivers end, the transmitted
image undergoes the encrypting process again using the key. The secret data
is then extracted from the image.
Image encryption algorithm using Arnold Transform method: The colour
planes are separated and Arnold Transform is used as the encryption technique
for scrambling pixels in these R and G planes. Arnold Transform is applied to
the planes in the spatial domain itself. For encryption of the cover image,
Eq. 1 is used:
where:
is the transfromation matrix and MxM pixels is the size of the cover image.
|
Fig. 1: |
Proposed block diagram |
Here, the dimension of the cover image is 512x512 pixels. Also, a, b are the
pixel location of the original image, a', b' as a pixel location of the scrambled
image. The location of one pixel is changed multiple times. The number of times
it is changed is the key 1 for the encryption process and is stored as the number
of iterations. The process is same for both the planes.
The Arnold Transform method of encryption is periodic in nature. It is robust,
quick and has high confidentiality. After Arnold transformation of the image,
the pixels location is transformed
but this transformation will not change the values of the pixel values hence,
the image histogram is the same.
Image steganography: Now, the R and G planes have been encrypted, the
secret data is embedded in an order in the R and G plane depending on whether
the left topmost corner pixel in the 2x2 matrix of blue plane is even or odd.
The secret data can be a text file which has been converted into binary. In
this study, only binary data has been embedded in R and G planes according to
Table 1.
• |
LSB substitution method: It is the technique wherein
the secret data is embedded into encrypted pixel by changing the LSB of
the pixel so that it holds covert bits. Let, C is the original 8-bit R or
G plane of 512x512 pixels represented as shown in Eq. 2: |
Secret (n-bit) is denoted by M as shown in Eq. 3:
Table 1: |
Pixel indicator method |
 |
where, m-bit secret message has to be embedded into the k (k may be 1, 2, 3,
4) rightmost LSBs of the colour planes R and G. This m-bit binary message is
converted to its decimal value by combining k bits together (Zip).
The substitution is done by using the Eq. 4:
The new pixel value, aij, has the secret data embedded in
last k bits. As data gets infixed only in LSBs, the pixel value does not change
significantly and is not visible to the human eye.
• |
Pixel value differencing: The encrypted cover file
is taken and is divided into sub-blocks of 2x2 pixels. An adaptive method
is used to embed the data, i.e., the total bits rooted in each location
is not the same. It is in accordance with a condition. This makes the data
embedding procedure even more robust. |
A threshold value Th is taken for the embedding process. The range of Th is
2kl≤Th≤2kh, where kl and kh are the number of bits
embedded in the lower threshold and upper threshold, respectively.
A sub-block of 2x2 pixels is taken from the image. Out of the 4 pixels, the
minimum (Pmin) is found. Then using formula in Eq.
5, value of delta is estimated. According to the relation of Delta with
Th, either higher level embedding (if Delta>Th) or lower level embedding
(if Delta<Th) is performed, i.e., either kh or kl bits of data is embedded,
respectively.
where, P1, P2, P3, P4 are the four
pixel values of the 2x2 sub-block.
This method for steganography gives higher embedding capacity and better image
quality. The secret data is secure as the key 2 (i.e., the threshold value Th,
kl and kh) needs to be known for the extraction of information. Without the
key, there is no way of extracting the data.
Decryption: Before the transmission of the stego image, the R and G
planes are decrypted so as to get the original cover image. This is done so
that the hackers do not suspect the presence of any information in the image.
If the hackers try to get information then, it will result in garbage values
as the decryption process has changed the sequence inwhich data was stored.
Equation 6 is used for the decryption process; it is the inverse
of the Arnold Transform Matrix:
where:
is the inverse transformation matrix and MxM is the covers
dimension which is 512x512. Also, a, b are the pixel location of the scrambled
image, a', b' as a pixel location of the descrambled image. The multiplication
i.e., pixel location change is performed as many times as when it was scrambled.
The decrypted image is now ready for transmission and the colour planes are
merged after descrambling.
Stego extraction: The first step of the stego extraction process is
to scramble the individual R and G planes again using Arnold Transform and the
key 1 as described above. The key 2 contains the information about the Threshold
Th and the kl and kh, i.e., bits inserted at different levels. A sub-block of
2x2 pixels is taken from the R, G and B planes. Out of the 4 pixels, find the
minimum pixel value for the R and G planes and find the delta value using Eq.
5, separately for the R and G planes. If the remainder after dividing the
left topmost pixel in sub-block in B plane be 0, then bits are primarily extracted
from the R plane followed by the G plane. On the other hand, if the remainder
is 1, bits are first extracted from the G plane and
then from R plane. According to the relation of the individual delta of the
R and G planes with THz, either kh bits of information (if Delta>Th) or kl
bits (if Delta<Th) is extracted. Thus, the information embedded has been
successfully extracted.
EMBEDDING ALGORITHM
EXTRACTION ALGORITHM
Thus, the binary information that was embedded has been successfully extracted.
Now, convert the binary information to the string format.
RESULTS AND DISCUSSION
Experiments using Matlab software have been performed on 5 colour images with
size 512x512. PSNR values for each red and Green plane along with number of
bits embedded in each scrambled image has been calculated. A text file has been
used as surreptitious content that gets rehabilitated from its ASCII value to
binary to make it suitable for embedding in the scrambled cover image. The PSNR
is used for estimating scrambled stego images quality. For a PxQ gray
scale image, PSNR is calculated as shown in Eq. 7:
where, ai,j pixels in ith row and jth column of cover whereas, bi,j
is the same as that of stego.
Stego images generated for this proficiency are shown from Fig.
2-7. Figure 2 shows five colour images
of size 512x512 which are the original images. Figure 3 and
4 shows the result after scrambling the R and G plane using
Arnold Algorithm. The scrambling can be performed n number of times. Figure
5 and 6 shows stego R and G images with data embedded
inside using PVD and LSB substitution. Figure 7 shows descrambled
stego colour images obtained after merging the RGB planes transmitted through
a suitable channel. As can be seen, no significant difference can be noticed
in original images and descrambled stego images.
Table 2 contains the capacity and the PSNR for five different
images for varied threshold and levels of embedding.
|
Fig. 2(a-e): |
Cover images of size 512x512, (a) Peppers, (b) Baboon, (c)
Castle, (d) Barbara and (e) Boat |
|
Fig. 3(a-e): |
R plane scrambled images
with size 512×512, (a) Peppers, (b) Baboon, (c) Castle, (d) Barbara
and (e) Boat |
|
Fig. 4(a-e): |
G plane scrambled images
of size 512×512, (a) Peppers, (b) Baboon, (c) Castle, (d) Barbara
and (e) Boat |
|
Fig. 5(a-e): |
Stego.R plane scrambled
images of size 512×512, (a) Peppers, (b) Baboon, (c) Castle, (d)
Barbara and (e) Boat |
|
Fig. 6(a-e): |
Stego. G plane scrambled
images with size 512×512, (a) Peppers, (b) Baboon, (c) Castle, (d)
Barbara and (e) Boat |
|
Fig. 7(a-e): |
Descrambled Stego colour
images with size 512x512, (a) Peppers, (b) Baboon, (c) Castle, (d) Barbara
and (e) Boat |
In Table 2, various threshold values as Th = 5, 6, 12, 18
with various kl-kh values have been taken and PSNR value for Red and Green planes
along with bit embedding capacity has been calculated. For example, at Th =
5, if Delta<=Th, 2 bits are embedded and at Delta>Th, 3 bits are embedded
in a 4 pixel block. It can be observed that with the increase in threshold value,
PSNR reduces but the embedding capacity (in bits) increases at the same time.
The comparative analysis for the difference in the levels of embedding when
the scrambled R and G planes are used for embedding versus when original R and
G planes are used is shown in Table 3. As can be seen, the
capacity increases with the scrambling of R and G planes as compared to using
original R and G planes.
Table 4 shows the comparative analysis between proposed and
other spatial domain steganography methods. Scrambled cover image is well suitable
for PVD based steganography because it offers high capacity and high PSNR over
other methods. For the comparative analysis, a 256x256 RGB baboon image is taken
as a cover image. In RGB images one pixel value takes 24 bits for showing all
color combinations. In the proposed method, total 393158 bits are embedded in
a single image with PSNR of 42.5 dB (average). This shows that the proposed
method has high capacity with high imperceptibility than the other methods.
Moreover, Red and Green planes are only used for embedding process and the Blue
plane is used as an indicator for embedding process.
Table 2: |
Capacity and PSNR values for various T, kl and kh |
 |
Table 3: |
Comparative analysis between with and without scrambling cover
image |
 |
Table 4: |
Comparative analysis for determination of cover image of baboon
between other spatial domain methods |
 |
CONCLUSION
This study recommends a steganographic data security algorithm for ensuring
high level of data security. First, the Cover Image has been scrambled using
Arnold algorithm and data has been embedded in the scrambled image to incorporate
high degree of randomness using PVD and k-bit LSB substitution according to
pixel indicator which is blue plane in this case. It has been observed that
as the threshold value goes up, the embedding capacity increases significantly
but there is a decrease in PSNR value that is the picture quality degrades.
It is vivid that the embedding competence increases through the use of scrambling
R and G planes as compared to using original R and G planes, in addition to
increasing security. This scheme majors in the grounds of entrenching capability
and making secret data fool proof. However, there is a tradeoff between PSNR
and embedding capacity at high threshold values. Improving the same will be
our future endeavor.
|
REFERENCES |
1: Amirtharajan, R. and J.B.B. Rayappan, 2012. Brownian motion of binary and gray-binary and gray bits in image for stego. J. Applied Sci., 12: 428-439. CrossRef | Direct Link |
2: Amirtharajan, R., J. Qin and J.B.B. Rayappan, 2012. Random image steganography and steganalysis: Present status and future directions. Inform. Technol. J., 11: 566-576. CrossRef | Direct Link |
3: Amirtharajan, R. and J.B.B. Rayappan, 2012. An intelligent chaotic embedding approach to enhance stego-image quality. Inform. Sci., 193: 115-124. CrossRef | Direct Link |
4: Amirtharajan, R. and J.B.B. Rayappan, 2012. Inverted pattern in inverted time domain for icon steganography. Inform. Technol. J., 11: 587-595. CrossRef | Direct Link |
5: Amirtharajan, R. and J.B.B. Rayappan, 2012. Pixel authorized by pixel to trace with SFC on image to sabotage data mugger: A comparative study on PI stego. Res. J. Inform. Technol., 4: 124-139. CrossRef | Direct Link |
6: Amirtharajan, R. and J.B.B. Rayappan, 2013. Steganography-time to time: A review. Res. J. Inform. Technol., 5: 53-66. CrossRef | Direct Link |
7: Amirtharajan, R., K. Karthikeyan, M. Malleswaran and J.B.B. Rayappan, 2013. Kubera kolam: A way for random image steganography. Res. J. Inform. Technol., 5: 304-316. CrossRef | Direct Link |
8: Amirtharajan, R., M.V. Abhiram, G. Revathi, J.B. Reddy, V. Thanikaiselvan and J.B.B. Rayappan, 2013. Rubik's cube: A way for random image steganography. Res. J. Inform. Technol., 5: 329-340. CrossRef | Direct Link |
9: Amirtharajan, R., P. Archana and J.B.B. Rayappan, 2013. Why image encryption for better steganography. Res. J. Inform. Technol., 5: 341-351. CrossRef | Direct Link |
10: Amirtharajan, R., S. Sulthana and J.B.B. Rayappan, 2013. Seeing and believing is a threat: A visual cryptography schemes. Res. J. Inform. Technol., 5: 435-441. CrossRef | Direct Link |
11: Amirtharajan, R., K.M. Ashfaaq, A.K. Infant and J.B.B. Rayappan, 2013. High performance pixel indicator for colour image steganography. Res. J. Inform. Technol., 5: 277-290. CrossRef | Direct Link |
12: Amirtharajan, R., R. Subrahmanyam, J.N. Teja, K.M. Reddy and J.B.B. Rayappan, 2013. Pixel indicated triple layer: A way for random image steganography. Res. J. Inform. Technol., 5: 87-99. CrossRef | Direct Link |
13: Amirtharajan, R., S.D. Roy, N. Nesakumar, M. Chandrasekar, R. Sridevi and J.B.B. Rayappan, 2013. Mind game for cover steganography: A refuge. Res. J. Inform. Technol., 5: 137-148. CrossRef | Direct Link |
14: Amirtharajan, R., V. Rajesh, P. Archana and J.B.B. Rayappan, 2013. Pixel indicates, standard deviates: A way for random image steganography. Res. J. Inform. Technol., 5: 383-392. CrossRef | Direct Link |
15: Amirtharajan, R., P.S. Priya and J.B.B. Rayappan, 2013. Pixel indicated user indicator: A muxed stego. Res. J. Inform. Technol., 5: 73-86. CrossRef | Direct Link |
16: Amirtharajan, R., G. Devipriya, V. Thanikaiselvan and J.B.B. Rayappan, 2013. High capacity triple plane embedding: A colour stego. Res. J. Inform. Technol., 5: 373-382. CrossRef | Direct Link |
17: Chan, C.K. and L.M. Cheng, 2004. Hiding data in images by simple LSB substitution. Pattern Recognit., 37: 469-474. CrossRef | Direct Link |
18: Cheddad, A., J. Condell, K. Curran and P. McKevitt, 2010. Digital image steganography: Survey and analysis of current methods. Signal Process., 90: 727-752. CrossRef | Direct Link |
19: Wu, D.C. and W.H. Tsai, 2003. A steganographic method for images by pixel-value differencing. Pattern Recognit. Lett., 24: 1613-1626. CrossRef | Direct Link |
20: Janakiraman, S., J. Chakravarthy, B. Radhakrishnan, K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Cover as key and key as data: An inborn stego. Inform. Technol. J., 13: 1969-1976. CrossRef | Direct Link |
21: Janakiraman, S., K.V.S.K. Kumar, R.R.K. Reddy, A. Srinivasulu, R. Amirtharajan, K. Thenmozhi and J.B.B. Rayappan, 2014. Humming bird with coloured wings: A feedback security approach. Inform. Technol. J., 13: 2022-2026. CrossRef | Direct Link |
22: Janakiraman, S., R. Amirtharajan, K. Thenmozhi and J.B.B. Rayappan, 2012. Pixel forefinger for gray in color: A layer by layer stego. Inform. Technol. J., 11: 9-19. CrossRef | Direct Link |
23: Janakiraman, S., R. Amirtharajan, K. Thenmozhi and J.B.B. Rayappan, 2012. Firmware for data security: A review. Res. J. Inform. Technol., 4: 61-72. CrossRef | Direct Link |
24: Janakiraman, S., S. Rajagopalan, K. Thenmozhi, H.N. Upadhyay and J. Ramanathan et al., 2013. Captivating CODEC Stego (CCS): A cover on camouflage. Res. J. Inform. Technol., 5: 160-170. CrossRef | Direct Link |
25: Luo, H., Z. Zhao and Z.M. Lu, 2011. Joint secret sharing and data hiding for block truncation coding compressed image transmission. Inform. Technol. J., 10: 681-685. CrossRef | Direct Link |
26: Mohammad, N., X. Sun and H. Yang, 2011. An excellent Image data hiding algorithm based on BTC. Inform. Technol. J., 10: 1415-1420. CrossRef | Direct Link |
27: Praveenkumar, P., R. Amirtharajan, K. Thenmozhi and J.B.B. Rayappan, 2013. Can we reduce PAPR? OFDM+PTS+SLM+STEGO: A novel approach. Asian J. Sci. Res., 6: 38-52. CrossRef | Direct Link |
28: Praveenkumar, P., M. Nagadinesh, P. Lakshmi, K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2013. Convolution and viterbi EN (DE) coders on OFDM hides, rides and conveys message-A neural STEGO. Proceedings of the International Conference on Computer Communication and Informatics, January 4-6, 2013, Coimbatore, pp: 1-5 CrossRef |
29: Praveenkumar, P., R. Amirtharajan, K. Thenmozhi and J.B.B. Rayappan, 2012. Regulated OFDM-role of ECC and ANN: A review. J. Applied Sci., 12: 301-314. CrossRef | Direct Link |
30: Praveenkumar, P., R. Amirtharajan, K. Thenmozhi and J.B.B. Rayappan, 2012. Phase for face saving-a multicarrier stego. Procedia Eng., 30: 790-797. CrossRef | Direct Link |
31: Praveenkumar, P., R. Amirtharajan, K. Thenmozhi and J.B.B. Rayappan, 2014. Sub carriers carry secret: An absolute stego approach. J. Applied Sci., 14: 1728-1735. CrossRef | Direct Link |
32: Praveenkumar, P., R. Amirtharajan, K. Thenmozhi and J.B.B. Rayappan, 2014. Double layer encoded encrypted data on multicarrier channel. J. Applied Sci., 14: 1689-1700. CrossRef | Direct Link |
33: Praveenkumar, P., K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Purposeful error on OFDM: A secret channel. Inform. Technol. J., 13: 1985-1991. CrossRef | Direct Link |
34: Praveenkumar, P., G.S. Hemalatha, B. Reddy, K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Secret link through simulink: A stego on OFDM channel. Inform. Technol. J., 13: 1999-2004. CrossRef | Direct Link |
35: Praveenkumar, P., K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Stego in multicarrier: A phase hidden communication. Inform. Technol. J., 13: 2011-2016. CrossRef | Direct Link |
36: Praveenkumar, P., K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Inserted embedding in OFDM channel: A multicarrier stego. Inform. Technol. J., 13: 2017-2021. CrossRef | Direct Link |
37: Praveenkumar, P., K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Data puncturing in OFDM channel: A multicarrier stego. Inform. Technol. J., 13: 2037-2041. CrossRef | Direct Link |
38: Praveenkumar, P., R. Deepak, K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Reversible steganography on OFDM channel: A role of cyclic codes. Inform. Technol. J., 13: 2047-2051. CrossRef | Direct Link |
39: Praveenkumar, P., K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Reversible steganography on OFDM channel-a role of RS coding. Inform. Technol. J., 13: 2052-2056. CrossRef | Direct Link |
40: Praveenkumar, P., K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Spread and hide-a stego transceiver. Inform. Technol. J., 13: 2061-2064. CrossRef | Direct Link |
41: Salem, Y., M. Abomhara, O.O. Khalifa, A.A. Zaidan and B.B. Zaidan, 2011. A review on multimedia communications cryptography. Res. J. Inform. Technol., 3: 146-152. CrossRef | Direct Link |
42: Ramalingam, B., R. Amirtharajan and J.B.B. Rayappan, 2014. LCC-LSB-FPGA stego-A reconfigurable security. J. Applied Sci., 14: 2139-2148. CrossRef | Direct Link |
43: Ramalingam, B., R. Amirtharajan and J.B.B. Rayappan, 2014. Stego on FPGA: An IWT approach. Sci. World J. CrossRef | Direct Link |
44: Rajagopalan, S., R. Amirtharajan, H.N. Upadhyay and J.B.B. Rayappan, 2012. Survey and analysis of hardware cryptographic and steganographic systems on FPGA. J. Applied Sci., 12: 201-210. CrossRef | Direct Link |
45: Rajagopalan, S., S. Janakiraman, H.N. Upadhyay and K. Thenmozhi, 2012. Hide and seek in silicon: Performance analysis of Quad block Equisum Hardware Steganographic systems. Procedia Eng., 30: 806-813. CrossRef | Direct Link |
46: Rajagopalan, S., Y. Ravishankar, H.N. Upadhyay, J.B.B. Rayappan and R. Amirtharajan, 2014. Modeling combo PR generator for Stego Storage Self Test (SSST). Inform. Technol. J., 13: 1936-1944. CrossRef | Direct Link |
47: Rajagopalan, S., P.J.S. Prabhakar, M.S. Kumar, N.V.M. Nikhil, H.N. Upadhyay, J.B.B. Rayappan and R. Amirtharajan, 2014. MSB based embedding with integrity: An adaptive RGB Stego on FPGA platform. Inform. Technol. J., 13: 1945-1952. CrossRef | Direct Link |
48: Rajagopalan, S., K. Pravallika, R. Radha, H.N. Upadhyay, J.B.B. Rayappan and R. Amirtharajan, 2014. Stego on song-an amalgam of VI and FPGA for hardware info hide. Inform. Technol. J., 13: 1992-1998. CrossRef | Direct Link |
49: Rajagopalan, S., H.N. Upadhyay, S. Varadarajan, J.B.B. Rayappan and R. Amirtharajan, 2014. Gyratory assisted info hide-a nibble differencing for message embedding. Inform. Technol. J., 13: 2005-2010. CrossRef | Direct Link |
50: Thenmozhi, K., P. Praveenkumar, R. Amirtharajan, V. Prithiviraj, R. Varadarajan and J.B.B. Rayappan, 2012. OFDM+CDMA+Stego = Secure communication: A review. Res. J. Inform. Technol., 4: 31-46. CrossRef | Direct Link |
51: Thanikaiselvan, V., P. Arulmozhivarman, J.B.B. Rayappan and R. Amirtharajan, 2012. Graceful graph for graceful security-towards a STE (G) Raph. Res. J. Inform. Technol., 4: 220-227. CrossRef | Direct Link |
52: Thanikaiselvan, V., P. Arulmozhivarman, R. Amirtharajan and J.B.B. Rayappan, 2012. Wavelet Pave the Trio travel for a secret mission: A stego vision. Global Trends Inform. Syst. Software Applic., 270: 212-221. CrossRef | Direct Link |
53: Thanikaiselvan, V., P. Arulmozhivarman, R. Amirtharajan and J.B.B. Rayappan, 2012. Horse riding and hiding in image for data guarding. Proc. Eng., 30: 36-44. CrossRef | Direct Link |
54: Thanikaiselvan, V., P. Arulmozhivarman, S. Subashanthini and R. Amirtharajan, 2013. A graph theory practice on transformed image: A random image steganography. Scient. World J. CrossRef |
55: Thanikaiselvan, V., K. Santosh, D. Manikanta and R. Amirtharajan, 2013. A new steganography algorithm against chi square attack. Res. J. Inform. Technol., 5: 363-372. CrossRef | Direct Link |
56: Thien, C.C. and J.C. Lin, 2003. A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function. Pattern Recognit., 36: 2875-2881. CrossRef | Direct Link |
57: Qi, X. and K. Wong, 2005. An adaptive DCT-based mod-4 steganographic method. Proceedings of the IEEE International Conference on Image Processing, Volume 2, September 11-14, 2005, Genoa, Italy, pp: II-297-II-300
58: Wong, K., X. Qi and K. Tanaka, 2007. A DCT-based Mod4 steganographic method. Signal Process., 87: 1251-1263. CrossRef | Direct Link |
59: Zhang, X. and S. Wang, 2004. Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security. Pattern Recognit. Lett., 25: 331-339. CrossRef | Direct Link |
60: Zhao, Z. and H. Luo, 2012. Reversible data hiding based on Hilbert curve scan and histogram modification. Inform. Technol. J., 11: 209-216. CrossRef | Direct Link |
61: Amirtharajan, R., D. Adharsh, V. Vignesh and R.J.B. Balaguru, 2010. PVD blend with pixel indicator-OPAP composite for high fidelity steganography. Int. J. Comput. Applic., 7: 31-37. CrossRef | Direct Link |
62: Amirtharajan, R., R.R. Subrahmanyam, P.J.S. Prabhakar, R. Kavitha and J.B.B. Rayappan, 2011. MSB over hides LSB: A dark communication with integrity. Proceedings of the IEEE 5th International Conference on Internet Multimedia Systems Architecture and Application, December 12-14, 2011, Bangalore, Karnataka, India, pp: 1-6 CrossRef |
|
|
|
 |