HOME JOURNALS CONTACT

Journal of Artificial Intelligence

Year: 2014 | Volume: 7 | Issue: 2 | Page No.: 54-68
DOI: 10.3923/jai.2014.54.68
PVD Based Steganography on Scrambled RGB Cover Images with Pixel Indicator
V. Thanikaiselvan, S. Subashanthini and Rengarajan Amirtharajan

Abstract: With the rapid advancements in digital information transmission, technologies need for ensuring high level of data security, has become indispensible. In order to ensure the same, many cryptography and steganography techniques are in use. In the proposed methodology, both the techniques have been used simultaneously for incorporating a near fool proof security. Cryptography renders an image unreadable whereas, steganography aims at hiding secret information in the image. In the scrambled image, adaptive Least Significant Bit (LSB) substitution has been performed using Pixel Value Differencing (PVD) based on Pixel Indicator (PI) method for colour images. Here, secret data is embedded only in R and G planes while, B plane acts as an indicator for embedding. This methodology increases the embedding capacity by 50% compared to the existing methods in addition with a reasonable Peak Signal to Noise Ratio (PSNR) of 42 dB.

Fulltext PDF Fulltext HTML

How to cite this article
V. Thanikaiselvan, S. Subashanthini and Rengarajan Amirtharajan, 2014. PVD Based Steganography on Scrambled RGB Cover Images with Pixel Indicator. Journal of Artificial Intelligence, 7: 54-68.

Keywords: pixel value differencing, Image encryption, LSB substitution, pixel indicator method and image steganography

INTRODUCTION

With the advancements in information technology, issue of data security comes hand in hand. Large amount of data transmitted via internet needs to be made secure against malicious attacks. Secret information particularly sensitive information needs to be handled with extreme care as its misuse can create great havoc to the society. So, to make the secret information attack proof, role of various cryptographic and steganographic techniques come into picture (Cheddad et al., 2010; Amirtharajan and Rayappan, 2012a-d, 2013; Amirtharajan et al., 2013a-j; Janakiraman et al., 2012a, b, 2014a, b; Luo et al., 2011; Mohammad et al., 2011; Salem et al., 2011; Ramalingam et al., 2014a, b; Thien and Lin, 2003; Zhao and Luo, 2012).

Cryptography has been in practice from ancient times with its main aim being making the message unreadable by all except the authorised receiver who has the key to retain the actual message. It converts the secret information in un-intelligible form thereby, making it unreadable by a hacker. On the other hand, steganography aims at hiding data in multimedia such as image (Chan and Cheng, 2004; Amirtharajan et al., 2010, 2011, 2012, 2013b), audio or video files, so that secret data is invisible to the naked eye during transmission called information security (Thenmozhi et al., 2012; Praveenkumar et al., 2012a, b, 2013a, b, 2014a-j). The ideology behind this is, if a certain feature of hidden information becomes visible, point of attack becomes evident. Various algorithms and methodologies exist for the same in hardware (Rajagopalan et al., 2012a, b, 2014a-d; Janakiraman et al., 2012a, b, 2014a, b).

Three main pillars of steganography are ensuring robustness (Wong et al., 2007; Qi and Wong, 2005), high embedding capacity and undetectability (Wu and Tsai, 2003; Zhang and Wang, 2004; Thanikaiselvan et al., 2012a-c, 2013a, b). This study proposes use of cryptography and steganography together for hiding text files in colour images which are used as cover. The RGB colour planes of the image are separated and scrambled, except the blue plane, using Arnold Cat map. Image scrambling technology is easy to realized but it is not in accordance with Kirchhoff’s rules and its security is not very high. But when data is embedded in this scrambled image using steganography algorithms, a high level of security is ensured.

Blue plane of the image is used as indicator for embedding in R and G planes where the clandestine context gets pushed in the adaptive LSB values so as difference in the pixel value is not visible to the naked eye. If the pixel value of first pixel in 2x2 matrix of blue plane is even, then data is embedded in red plane else, it is embedded in green plane. Data embedding takes place by Pixel Value Differencing (PVD) method where four pixels of the 2x2 matrix of the cover used at once for embedding the data (Wu and Tsai, 2003; Zhang and Wang, 2004). Pixel indicator method (Janakiraman et al., 2012a, b, 2013) is a method which can be adapted with PVD and other methods to improve the security further. In this study, PVD and pixel indicator method are used on a scrambled cover image, data is embedded adaptively in R and G plane i.e., k bits are embedded based on the level inwhich the average difference falls based on the pixel value in B plane. This technique improvises on pixel embedding capacity as well as ensuring a high level of security.

METHODOLOGY

The methods publicized here put forward a secure data hiding technique by using both cryptography and steganography techniques. The block diagram for the method is shown in Fig. 1. This technique is aimed to achieve high security by first scrambling the colour planes of cover file which is a 24 bit colour image using Arnold algorithm and then embedding the secret data in the encrypted R and G planes using a steganographic algorithm based on pixel indicator on the blue plane. For transmission, the R and G planes are descrambled and merged to form colour stego image and then transmitted thereby hiding the very essence of any data hidden. As the steganography is performed on the encrypted cover file, any attempt to search for hidden data in the transmitted file will result in garbage values. This ensures a highly secure way to transfer sensitive data as compared to use of cryptography and steganography alone.

At receiver’s end, the transmitted image undergoes the encrypting process again using the key. The secret data is then extracted from the image.

Image encryption algorithm using Arnold Transform method: The colour planes are separated and Arnold Transform is used as the encryption technique for scrambling pixels in these R and G planes. Arnold Transform is applied to the planes in the spatial domain itself. For encryption of the cover image, Eq. 1 is used:

(1)

where:

is the transfromation matrix and MxM pixels is the size of the cover image.

Fig. 1: Proposed block diagram

Here, the dimension of the cover image is 512x512 pixels. Also, a, b are the pixel location of the original image, a', b' as a pixel location of the scrambled image. The location of one pixel is changed multiple times. The number of times it is changed is the key 1 for the encryption process and is stored as the number of iterations. The process is same for both the planes.

The Arnold Transform method of encryption is periodic in nature. It is robust, quick and has high confidentiality. After Arnold transformation of the image, the pixel’s location is transformed but this transformation will not change the values of the pixel values hence, the image histogram is the same.

Image steganography: Now, the R and G planes have been encrypted, the secret data is embedded in an order in the R and G plane depending on whether the left topmost corner pixel in the 2x2 matrix of blue plane is even or odd. The secret data can be a text file which has been converted into binary. In this study, only binary data has been embedded in R and G planes according to Table 1.

LSB substitution method: It is the technique wherein the secret data is embedded into encrypted pixel by changing the LSB of the pixel so that it holds covert bits. Let, C is the original 8-bit R or G plane of 512x512 pixels represented as shown in Eq. 2:

(2)

Secret (n-bit) is denoted by M as shown in Eq. 3:

Table 1: Pixel indicator method

(3)

where, m-bit secret message has to be embedded into the k (k may be 1, 2, 3, 4) rightmost LSBs of the colour planes R and G. This m-bit binary message is converted to its decimal value by combining k bits together (Zip). The substitution is done by using the Eq. 4:

(4)

The new pixel value, aij’, has the secret data embedded in last k bits. As data gets infixed only in LSBs, the pixel value does not change significantly and is not visible to the human eye.

Pixel value differencing: The encrypted cover file is taken and is divided into sub-blocks of 2x2 pixels. An adaptive method is used to embed the data, i.e., the total bits rooted in each location is not the same. It is in accordance with a condition. This makes the data embedding procedure even more robust.

A threshold value Th is taken for the embedding process. The range of Th is 2kl≤Th≤2kh, where kl and kh are the number of bits embedded in the lower threshold and upper threshold, respectively.

A sub-block of 2x2 pixels is taken from the image. Out of the 4 pixels, the minimum (Pmin) is found. Then using formula in Eq. 5, value of delta is estimated. According to the relation of Delta with Th, either higher level embedding (if Delta>Th) or lower level embedding (if Delta<Th) is performed, i.e., either kh or kl bits of data is embedded, respectively.

(5)

where, P1, P2, P3, P4 are the four pixel values of the 2x2 sub-block.

This method for steganography gives higher embedding capacity and better image quality. The secret data is secure as the key 2 (i.e., the threshold value Th, kl and kh) needs to be known for the extraction of information. Without the key, there is no way of extracting the data.

Decryption: Before the transmission of the stego image, the R and G planes are decrypted so as to get the original cover image. This is done so that the hackers do not suspect the presence of any information in the image. If the hackers try to get information then, it will result in garbage values as the decryption process has changed the sequence inwhich data was stored. Equation 6 is used for the decryption process; it is the inverse of the Arnold Transform Matrix:

(6)

where:

 

is the inverse transformation matrix and MxM is the cover’s dimension which is 512x512. Also, a, b are the pixel location of the scrambled image, a', b' as a pixel location of the descrambled image. The multiplication i.e., pixel location change is performed as many times as when it was scrambled. The decrypted image is now ready for transmission and the colour planes are merged after descrambling.

Stego extraction: The first step of the stego extraction process is to scramble the individual R and G planes again using Arnold Transform and the key 1 as described above. The key 2 contains the information about the Threshold Th and the kl and kh, i.e., bits inserted at different levels. A sub-block of 2x2 pixels is taken from the R, G and B planes. Out of the 4 pixels, find the minimum pixel value for the R and G planes and find the delta value using Eq. 5, separately for the R and G planes. If the remainder after dividing the left topmost pixel in sub-block in B plane be 0, then bits are primarily extracted from the R plane followed by the G plane. On the other hand, if the remainder is 1, bits are first extracted from the G plane and then from R plane. According to the relation of the individual delta of the R and G planes with THz, either kh bits of information (if Delta>Th) or kl bits (if Delta<Th) is extracted. Thus, the information embedded has been successfully extracted.

EMBEDDING ALGORITHM


EXTRACTION ALGORITHM

Thus, the binary information that was embedded has been successfully extracted. Now, convert the binary information to the string format.

RESULTS AND DISCUSSION

Experiments using Matlab software have been performed on 5 colour images with size 512x512. PSNR values for each red and Green plane along with number of bits embedded in each scrambled image has been calculated. A text file has been used as surreptitious content that gets rehabilitated from its ASCII value to binary to make it suitable for embedding in the scrambled cover image. The PSNR is used for estimating scrambled stego image’s quality. For a PxQ gray scale image, PSNR is calculated as shown in Eq. 7:

(7)

where, ai,j pixels in ith row and jth column of cover whereas, bi,j is the same as that of stego.

Stego images generated for this proficiency are shown from Fig. 2-7. Figure 2 shows five colour images of size 512x512 which are the original images. Figure 3 and 4 shows the result after scrambling the R and G plane using Arnold Algorithm. The scrambling can be performed n number of times. Figure 5 and 6 shows stego R and G images with data embedded inside using PVD and LSB substitution. Figure 7 shows descrambled stego colour images obtained after merging the RGB planes transmitted through a suitable channel. As can be seen, no significant difference can be noticed in original images and descrambled stego images.

Table 2 contains the capacity and the PSNR for five different images for varied threshold and levels of embedding.

Fig. 2(a-e): Cover images of size 512x512, (a) Peppers, (b) Baboon, (c) Castle, (d) Barbara and (e) Boat

Fig. 3(a-e):
R plane scrambled images with size 512×512, (a) Peppers, (b) Baboon, (c) Castle, (d) Barbara and (e) Boat

Fig. 4(a-e):
G plane scrambled images of size 512×512, (a) Peppers, (b) Baboon, (c) Castle, (d) Barbara and (e) Boat

Fig. 5(a-e):
Stego.R plane scrambled images of size 512×512, (a) Peppers, (b) Baboon, (c) Castle, (d) Barbara and (e) Boat

Fig. 6(a-e):
Stego. G plane scrambled images with size 512×512, (a) Peppers, (b) Baboon, (c) Castle, (d) Barbara and (e) Boat

Fig. 7(a-e):
Descrambled Stego colour images with size 512x512, (a) Peppers, (b) Baboon, (c) Castle, (d) Barbara and (e) Boat

In Table 2, various threshold values as Th = 5, 6, 12, 18 with various kl-kh values have been taken and PSNR value for Red and Green planes along with bit embedding capacity has been calculated. For example, at Th = 5, if Delta<=Th, 2 bits are embedded and at Delta>Th, 3 bits are embedded in a 4 pixel block. It can be observed that with the increase in threshold value, PSNR reduces but the embedding capacity (in bits) increases at the same time.

The comparative analysis for the difference in the levels of embedding when the scrambled R and G planes are used for embedding versus when original R and G planes are used is shown in Table 3. As can be seen, the capacity increases with the scrambling of R and G planes as compared to using original R and G planes.

Table 4 shows the comparative analysis between proposed and other spatial domain steganography methods. Scrambled cover image is well suitable for PVD based steganography because it offers high capacity and high PSNR over other methods. For the comparative analysis, a 256x256 RGB baboon image is taken as a cover image. In RGB images one pixel value takes 24 bits for showing all color combinations. In the proposed method, total 393158 bits are embedded in a single image with PSNR of 42.5 dB (average). This shows that the proposed method has high capacity with high imperceptibility than the other methods. Moreover, Red and Green planes are only used for embedding process and the Blue plane is used as an indicator for embedding process.

Table 2: Capacity and PSNR values for various T, kl and kh

Table 3: Comparative analysis between with and without scrambling cover image

Table 4: Comparative analysis for determination of cover image of baboon between other spatial domain methods

CONCLUSION

This study recommends a steganographic data security algorithm for ensuring high level of data security. First, the Cover Image has been scrambled using Arnold algorithm and data has been embedded in the scrambled image to incorporate high degree of randomness using PVD and k-bit LSB substitution according to pixel indicator which is blue plane in this case. It has been observed that as the threshold value goes up, the embedding capacity increases significantly but there is a decrease in PSNR value that is the picture quality degrades. It is vivid that the embedding competence increases through the use of scrambling R and G planes as compared to using original R and G planes, in addition to increasing security. This scheme majors in the grounds of entrenching capability and making secret data fool proof. However, there is a tradeoff between PSNR and embedding capacity at high threshold values. Improving the same will be our future endeavor.

REFERENCES

  • Amirtharajan, R. and J.B.B. Rayappan, 2012. Brownian motion of binary and gray-binary and gray bits in image for stego. J. Applied Sci., 12: 428-439.
    CrossRef    Direct Link    


  • Amirtharajan, R., J. Qin and J.B.B. Rayappan, 2012. Random image steganography and steganalysis: Present status and future directions. Inform. Technol. J., 11: 566-576.
    CrossRef    Direct Link    


  • Amirtharajan, R. and J.B.B. Rayappan, 2012. An intelligent chaotic embedding approach to enhance stego-image quality. Inform. Sci., 193: 115-124.
    CrossRef    Direct Link    


  • Amirtharajan, R. and J.B.B. Rayappan, 2012. Inverted pattern in inverted time domain for icon steganography. Inform. Technol. J., 11: 587-595.
    CrossRef    Direct Link    


  • Amirtharajan, R. and J.B.B. Rayappan, 2012. Pixel authorized by pixel to trace with SFC on image to sabotage data mugger: A comparative study on PI stego. Res. J. Inform. Technol., 4: 124-139.
    CrossRef    Direct Link    


  • Amirtharajan, R. and J.B.B. Rayappan, 2013. Steganography-time to time: A review. Res. J. Inform. Technol., 5: 53-66.
    CrossRef    Direct Link    


  • Amirtharajan, R., K. Karthikeyan, M. Malleswaran and J.B.B. Rayappan, 2013. Kubera kolam: A way for random image steganography. Res. J. Inform. Technol., 5: 304-316.
    CrossRef    Direct Link    


  • Amirtharajan, R., M.V. Abhiram, G. Revathi, J.B. Reddy, V. Thanikaiselvan and J.B.B. Rayappan, 2013. Rubik's cube: A way for random image steganography. Res. J. Inform. Technol., 5: 329-340.
    CrossRef    Direct Link    


  • Amirtharajan, R., P. Archana and J.B.B. Rayappan, 2013. Why image encryption for better steganography. Res. J. Inform. Technol., 5: 341-351.
    CrossRef    Direct Link    


  • Amirtharajan, R., S. Sulthana and J.B.B. Rayappan, 2013. Seeing and believing is a threat: A visual cryptography schemes. Res. J. Inform. Technol., 5: 435-441.
    CrossRef    Direct Link    


  • Amirtharajan, R., K.M. Ashfaaq, A.K. Infant and J.B.B. Rayappan, 2013. High performance pixel indicator for colour image steganography. Res. J. Inform. Technol., 5: 277-290.
    CrossRef    Direct Link    


  • Amirtharajan, R., R. Subrahmanyam, J.N. Teja, K.M. Reddy and J.B.B. Rayappan, 2013. Pixel indicated triple layer: A way for random image steganography. Res. J. Inform. Technol., 5: 87-99.
    CrossRef    Direct Link    


  • Amirtharajan, R., S.D. Roy, N. Nesakumar, M. Chandrasekar, R. Sridevi and J.B.B. Rayappan, 2013. Mind game for cover steganography: A refuge. Res. J. Inform. Technol., 5: 137-148.
    CrossRef    Direct Link    


  • Amirtharajan, R., V. Rajesh, P. Archana and J.B.B. Rayappan, 2013. Pixel indicates, standard deviates: A way for random image steganography. Res. J. Inform. Technol., 5: 383-392.
    CrossRef    Direct Link    


  • Amirtharajan, R., P.S. Priya and J.B.B. Rayappan, 2013. Pixel indicated user indicator: A muxed stego. Res. J. Inform. Technol., 5: 73-86.
    CrossRef    Direct Link    


  • Amirtharajan, R., G. Devipriya, V. Thanikaiselvan and J.B.B. Rayappan, 2013. High capacity triple plane embedding: A colour stego. Res. J. Inform. Technol., 5: 373-382.
    CrossRef    Direct Link    


  • Chan, C.K. and L.M. Cheng, 2004. Hiding data in images by simple LSB substitution. Pattern Recognit., 37: 469-474.
    CrossRef    Direct Link    


  • Cheddad, A., J. Condell, K. Curran and P. McKevitt, 2010. Digital image steganography: Survey and analysis of current methods. Signal Process., 90: 727-752.
    CrossRef    Direct Link    


  • Wu, D.C. and W.H. Tsai, 2003. A steganographic method for images by pixel-value differencing. Pattern Recognit. Lett., 24: 1613-1626.
    CrossRef    Direct Link    


  • Janakiraman, S., J. Chakravarthy, B. Radhakrishnan, K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Cover as key and key as data: An inborn stego. Inform. Technol. J., 13: 1969-1976.
    CrossRef    Direct Link    


  • Janakiraman, S., K.V.S.K. Kumar, R.R.K. Reddy, A. Srinivasulu, R. Amirtharajan, K. Thenmozhi and J.B.B. Rayappan, 2014. Humming bird with coloured wings: A feedback security approach. Inform. Technol. J., 13: 2022-2026.
    CrossRef    Direct Link    


  • Janakiraman, S., R. Amirtharajan, K. Thenmozhi and J.B.B. Rayappan, 2012. Pixel forefinger for gray in color: A layer by layer stego. Inform. Technol. J., 11: 9-19.
    CrossRef    Direct Link    


  • Janakiraman, S., R. Amirtharajan, K. Thenmozhi and J.B.B. Rayappan, 2012. Firmware for data security: A review. Res. J. Inform. Technol., 4: 61-72.
    CrossRef    Direct Link    


  • Janakiraman, S., S. Rajagopalan, K. Thenmozhi, H.N. Upadhyay and J. Ramanathan et al., 2013. Captivating CODEC Stego (CCS): A cover on camouflage. Res. J. Inform. Technol., 5: 160-170.
    CrossRef    Direct Link    


  • Luo, H., Z. Zhao and Z.M. Lu, 2011. Joint secret sharing and data hiding for block truncation coding compressed image transmission. Inform. Technol. J., 10: 681-685.
    CrossRef    Direct Link    


  • Mohammad, N., X. Sun and H. Yang, 2011. An excellent Image data hiding algorithm based on BTC. Inform. Technol. J., 10: 1415-1420.
    CrossRef    Direct Link    


  • Praveenkumar, P., R. Amirtharajan, K. Thenmozhi and J.B.B. Rayappan, 2013. Can we reduce PAPR? OFDM+PTS+SLM+STEGO: A novel approach. Asian J. Sci. Res., 6: 38-52.
    CrossRef    Direct Link    


  • Praveenkumar, P., M. Nagadinesh, P. Lakshmi, K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2013. Convolution and viterbi EN (DE) coders on OFDM hides, rides and conveys message-A neural STEGO. Proceedings of the International Conference on Computer Communication and Informatics, January 4-6, 2013, Coimbatore, pp: 1-5.


  • Praveenkumar, P., R. Amirtharajan, K. Thenmozhi and J.B.B. Rayappan, 2012. Regulated OFDM-role of ECC and ANN: A review. J. Applied Sci., 12: 301-314.
    CrossRef    Direct Link    


  • Praveenkumar, P., R. Amirtharajan, K. Thenmozhi and J.B.B. Rayappan, 2012. Phase for face saving-a multicarrier stego. Procedia Eng., 30: 790-797.
    CrossRef    Direct Link    


  • Praveenkumar, P., R. Amirtharajan, K. Thenmozhi and J.B.B. Rayappan, 2014. Sub carriers carry secret: An absolute stego approach. J. Applied Sci., 14: 1728-1735.
    CrossRef    Direct Link    


  • Praveenkumar, P., R. Amirtharajan, K. Thenmozhi and J.B.B. Rayappan, 2014. Double layer encoded encrypted data on multicarrier channel. J. Applied Sci., 14: 1689-1700.
    CrossRef    Direct Link    


  • Praveenkumar, P., K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Purposeful error on OFDM: A secret channel. Inform. Technol. J., 13: 1985-1991.
    CrossRef    Direct Link    


  • Praveenkumar, P., G.S. Hemalatha, B. Reddy, K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Secret link through simulink: A stego on OFDM channel. Inform. Technol. J., 13: 1999-2004.
    CrossRef    Direct Link    


  • Praveenkumar, P., K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Stego in multicarrier: A phase hidden communication. Inform. Technol. J., 13: 2011-2016.
    CrossRef    Direct Link    


  • Praveenkumar, P., K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Inserted embedding in OFDM channel: A multicarrier stego. Inform. Technol. J., 13: 2017-2021.
    CrossRef    Direct Link    


  • Praveenkumar, P., K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Data puncturing in OFDM channel: A multicarrier stego. Inform. Technol. J., 13: 2037-2041.
    CrossRef    Direct Link    


  • Praveenkumar, P., R. Deepak, K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Reversible steganography on OFDM channel: A role of cyclic codes. Inform. Technol. J., 13: 2047-2051.
    CrossRef    Direct Link    


  • Praveenkumar, P., K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Reversible steganography on OFDM channel-a role of RS coding. Inform. Technol. J., 13: 2052-2056.
    CrossRef    Direct Link    


  • Praveenkumar, P., K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Spread and hide-a stego transceiver. Inform. Technol. J., 13: 2061-2064.
    CrossRef    Direct Link    


  • Salem, Y., M. Abomhara, O.O. Khalifa, A.A. Zaidan and B.B. Zaidan, 2011. A review on multimedia communications cryptography. Res. J. Inform. Technol., 3: 146-152.
    CrossRef    Direct Link    


  • Ramalingam, B., R. Amirtharajan and J.B.B. Rayappan, 2014. LCC-LSB-FPGA stego-A reconfigurable security. J. Applied Sci., 14: 2139-2148.
    CrossRef    Direct Link    


  • Ramalingam, B., R. Amirtharajan and J.B.B. Rayappan, 2014. Stego on FPGA: An IWT approach. Sci. World J.
    CrossRef    


  • Rajagopalan, S., R. Amirtharajan, H.N. Upadhyay and J.B.B. Rayappan, 2012. Survey and analysis of hardware cryptographic and steganographic systems on FPGA. J. Applied Sci., 12: 201-210.
    CrossRef    Direct Link    


  • Rajagopalan, S., S. Janakiraman, H.N. Upadhyay and K. Thenmozhi, 2012. Hide and seek in silicon: Performance analysis of Quad block Equisum Hardware Steganographic systems. Procedia Eng., 30: 806-813.
    CrossRef    Direct Link    


  • Rajagopalan, S., Y. Ravishankar, H.N. Upadhyay, J.B.B. Rayappan and R. Amirtharajan, 2014. Modeling combo PR generator for Stego Storage Self Test (SSST). Inform. Technol. J., 13: 1936-1944.
    CrossRef    Direct Link    


  • Rajagopalan, S., P.J.S. Prabhakar, M.S. Kumar, N.V.M. Nikhil, H.N. Upadhyay, J.B.B. Rayappan and R. Amirtharajan, 2014. MSB based embedding with integrity: An adaptive RGB Stego on FPGA platform. Inform. Technol. J., 13: 1945-1952.
    CrossRef    Direct Link    


  • Rajagopalan, S., K. Pravallika, R. Radha, H.N. Upadhyay, J.B.B. Rayappan and R. Amirtharajan, 2014. Stego on song-an amalgam of VI and FPGA for hardware info hide. Inform. Technol. J., 13: 1992-1998.
    CrossRef    Direct Link    


  • Rajagopalan, S., H.N. Upadhyay, S. Varadarajan, J.B.B. Rayappan and R. Amirtharajan, 2014. Gyratory assisted info hide-a nibble differencing for message embedding. Inform. Technol. J., 13: 2005-2010.
    CrossRef    Direct Link    


  • Thenmozhi, K., P. Praveenkumar, R. Amirtharajan, V. Prithiviraj, R. Varadarajan and J.B.B. Rayappan, 2012. OFDM+CDMA+Stego = Secure communication: A review. Res. J. Inform. Technol., 4: 31-46.
    CrossRef    Direct Link    


  • Thanikaiselvan, V., P. Arulmozhivarman, J.B.B. Rayappan and R. Amirtharajan, 2012. Graceful graph for graceful security-towards a STE (G) Raph. Res. J. Inform. Technol., 4: 220-227.
    CrossRef    Direct Link    


  • Thanikaiselvan, V., P. Arulmozhivarman, R. Amirtharajan and J.B.B. Rayappan, 2012. Wavelet Pave the Trio travel for a secret mission: A stego vision. Global Trends Inform. Syst. Software Applic., 270: 212-221.
    CrossRef    Direct Link    


  • Thanikaiselvan, V., P. Arulmozhivarman, R. Amirtharajan and J.B.B. Rayappan, 2012. Horse riding and hiding in image for data guarding. Proc. Eng., 30: 36-44.
    CrossRef    Direct Link    


  • Thanikaiselvan, V., P. Arulmozhivarman, S. Subashanthini and R. Amirtharajan, 2013. A graph theory practice on transformed image: A random image steganography. Scient. World J.
    CrossRef    


  • Thanikaiselvan, V., K. Santosh, D. Manikanta and R. Amirtharajan, 2013. A new steganography algorithm against chi square attack. Res. J. Inform. Technol., 5: 363-372.
    CrossRef    Direct Link    


  • Thien, C.C. and J.C. Lin, 2003. A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function. Pattern Recognit., 36: 2875-2881.
    CrossRef    Direct Link    


  • Qi, X. and K. Wong, 2005. An adaptive DCT-based mod-4 steganographic method. Proceedings of the IEEE International Conference on Image Processing, Volume 2, September 11-14, 2005, Genoa, Italy, pp: II-297-II-300.


  • Wong, K., X. Qi and K. Tanaka, 2007. A DCT-based Mod4 steganographic method. Signal Process., 87: 1251-1263.
    CrossRef    Direct Link    


  • Zhang, X. and S. Wang, 2004. Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security. Pattern Recognit. Lett., 25: 331-339.
    CrossRef    Direct Link    


  • Zhao, Z. and H. Luo, 2012. Reversible data hiding based on Hilbert curve scan and histogram modification. Inform. Technol. J., 11: 209-216.
    CrossRef    Direct Link    


  • Amirtharajan, R., D. Adharsh, V. Vignesh and R.J.B. Balaguru, 2010. PVD blend with pixel indicator-OPAP composite for high fidelity steganography. Int. J. Comput. Applic., 7: 31-37.
    CrossRef    Direct Link    


  • Amirtharajan, R., R.R. Subrahmanyam, P.J.S. Prabhakar, R. Kavitha and J.B.B. Rayappan, 2011. MSB over hides LSB: A dark communication with integrity. Proceedings of the IEEE 5th International Conference on Internet Multimedia Systems Architecture and Application, December 12-14, 2011, Bangalore, Karnataka, India, pp: 1-6.

  • © Science Alert. All Rights Reserved