INFORMATION CHANGE THE WORLD

International Journal of Information Engineering and Electronic Business(IJIEEB)

ISSN: 2074-9023 (Print), ISSN: 2074-9031 (Online)

Published By: MECS Press

IJIEEB Vol.7, No.3, May. 2015

An Image Steganography-based Novel Approach to develop 8-Share Integrated Security Toolkit (ISTI-8)

Full Text (PDF, 583KB), PP.52-59


Views:70   Downloads:1

Author(s)

Sabyasachi Samanta, Saurabh Dutta, Gautam Sanyal

Index Terms

Steganography;Nonlinear Pixel Position (NPP);Modulus Division based Encryption (MDE);Visual Cryptography;Component based Visual Cryptography for Image (CVCI);Integrated Security Toolkit for Image (ISTI)

Abstract

Encryption is a process or algorithm to make information hidden or secret and considered as a subset of cryptography. Using encryption data are being transformed into some another form that appears to be meaningless and incomprehensible. Here we have embedded encrypted data bits about the entire image to some suitable nonlinear pixel positions using key. After that we have formed several shares of image and key using R, G and B components and character or digits respectively. At the decryption end through appropriate arrangement of shares of image and key, make possible to retrieve hidden data bits from stego-image and reform into its original content. 

Cite This Paper

Sabyasachi Samanta, Saurabh Dutta, Gautam Sanyal,"An Image Steganography-based Novel Approach to develop 8-Share Integrated Security Toolkit (ISTI-8)", IJIEEB, vol.7, no.3, pp.52-59, 2015. DOI: 10.5815/ijieeb.2015.03.08

Reference

[1]Feng Liu, Chuankun Wu," Embedded Extended Visual Cryptography Schemes" , IEEE Transactions On Information Forensics And Security, Vol. 6, No. 2, June 2011, pp.307-322.

[2]Souvik Bhattacharyya, Goutam Sanyal "A Data Hiding Model with High Security Features Combining Finite State Machines and PMM method", International Journal of Electrical and Computer Engineering 5:2 2010, pp. 78-85.

[3]Sabyasachi Samanta, Saurabh Dutta, Goutam Sanyal, "An Enhancement of Security on Image Applying Asymmetric Key Algorithm", International Journal of Computer Applications (0975 – 8887), Volume 25– No.5, July 2011, pp. 19-23.

[4]Shan-Chun Liu, Wen-Hsiang Tsai, "Line-Based Cubism-Like Image—A New Type of Art Image and its Application to Lossless Data Hiding "IEEE Transactions On Information Forensics And Security, Vol. 7, No. 5, October 2012, pp. 1148-1458.

[5]Chung-Ming Wang , Nan-I Wu , Chwei-Shyong Tsai , Min-Shiang Hwang, "A high quality steganographic method with pixel-value differencing and modulus function", The Journal of Systems and Software (2007), pp. 1-9.

[6]J. K. Mandal, Debashis Das, "Steganography Using Adaptive Pixel Value Differencing (APVD) of Gray Images through Exclusion of Overflow/Underflow", CS & IT-CSCP 2012, pp. 93-102.

[7]Pradeep Kumar Sharma, Hari Mohan Singh" Visual Cryptography Scheme for Gray Scale Images based on Intensity Division" International Journal of Current Engineering and Technology, Vol.4, No.1 (Feb 2014) P-ISSN 2347 – 5161 pp.211-215.

[8]Dr. Ekta Walia, Payal Jain, An Analysis of LSB & DCT based Steganography", Global Journal of Computer Science and Technology, Vol. 10, Issue 1 (Ver 1.0), April 2010, pp. 4-8.

[9]M. Abolghasemi, H. Aghaeinia, K. Faez, "Data Hiding Detection Based on DWT and Zernike Moments" 4th International Conference: Sciences of Electronic, Technologies of Information and Telecommunications, March 25-29, 2007 – TUNISIA.

[10]Linfeng Guo, Yan Meng,"PSNR-Based Optimization of JPEG Baseline Compression on Color Images", ICIP 2006, pp. 1145-1148.

[11]Atallah M. Al-Shatnawi, "A New Method in Image Steganography with Improved Image Quality", Applied Mathematical Sciences, Vol. 6, 2012, pp. 3907 – 3915.

[12]Himanshu Gupta, Vinod Kumar Sharma, "Role of Multiple Encryption in Secure Electronic Transaction", International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.6, November 2011, pp. 89-96.

[13]Pranam Paul, Saurabh Dutta, A K Bhattacharjee, "An Approach to ensure Security through Bit-level Encryption with Possible Lossless Compression", IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.2, February 2008, pp. 291-299.

[14]InKoo Kang, Gonzalo R. Arce, Heung-Kyu Lee, "Color Extended Visual Cryptography Using Error Diffusion", IEEE Transactions on Image Processing, Vol. 20, No. 1, January 2011, pp. 132-145.

[15]Shunquan Tan, Bin Li, "Targeted Steganalysis of Edge Adaptive Image Steganography Based on LSB Matching Revisited Using B-Spline Fitting ", IEEE Signal Processing Letters, Vol. 19, No. 6, June 2012, pp. 336-339.