IJISA Vol. 4, No. 1, 8 Feb. 2012
Cover page and Table of Contents: PDF (size: 272KB)
Full Text (PDF, 272KB), PP.32-38
Views: 0 Downloads: 0
Steganography, data security, data hiding, Stego-image
A large number of the world business is going on using “INTERNET” and the data over the internet which is vulnerable for attacks from the hackers. Thus, uses of highly efficient methods are required for sensitive data transmission over the internet to ensure data security. One of the solutions to data security is to use an efficient method of steganography. The goal of steganography is to hide messages inside other ‘harmless’ messages in a way that does not allow any enemy to even detect that there is a second message present. Steganography can be used with a large number of file formats most commonly used in the digital world of today. The different file formats popularly used are .bmp, .gif, .txt etc. Thus the techniques of steganography are going to play a very important part in the future of data security and privacy on open systems such as the Internet.
This paper presents an efficient method for hiding data into an image and send to the destination in a safe manner. This technique does not need any key for embedding and extracting data. Also, it allows hiding four bits in a block of size 5×5 with minimal distortion. The proposed algorithm ensures security and safety of the hidden information. The experimental results presented in this paper show the efficacy of the proposed method.
Nirmalya Chowdhury, Puspita Manna, "An Efficient Method of Steganography using Matrix Approach", International Journal of Intelligent Systems and Applications(IJISA), vol.4, no.1, pp.32-38, 2012. DOI:10.5815/ijisa.2012.01.04
[1]Y. Chen, H. Pan, and Y. Tseng, “A secure Data Hiding Scheme for Two-Color Images,” IEEE Symposium On Computers and Communications, 2000.
[2]C.Cachin, ”An Information-Theoritic Model for Steganography”, Proc. of the 2nd International Workshop on Information Hiding, Portland, Oregon, USA,15-17 Apr 1998, Lecture notes in CS, Vol.1525, Springer-Verlag.
[3]N. Johnson and S. Jajodia, “Exploring steganography: seeing the unseen,” IEEE Computer, pp. 26-34, February 1998.
[4]R. Chandramouli and Nasir Memon, "Analysis of LSB Based Image Steganography Techniques",2001 International Conference on Image Processing, October 7-10, 2001, Thessaloniki, Greece, Vol. 3, pp. 1019-1022.
[5]1. Johnson, N. F. and Jajodia, S. (1998). Exploring steganography:Seeing the unseen. Computer,31(2):26–34.
[6]C.T.Hsu and J.L.Wu., ”Hidden Singatures in Images”, Proc. IEEE International Conf. on Image Processing, ICIP-96, Vol.3, pp.223-226.
[7]Niels-Provos, Peter Honeyman, Hide and Seek: Introduction to steganography(2003).
[8]K. Curran and K. Bailey, "An Evaluation of Image Based Steganography Methods," International Journal of Digital Evidence, vol. 2, issue 2, pp. 1-40, Fall 2003.
[9]Luis von Ahn, Nicholas J. Hopper., Public Key Steganography.
[10]Robert Krenn. Steganography and steganalysis.
[11]G Sahoo, R K Tiwari “Designing an Embedded Algorithms for Data Hiding using Steganographic Technique by File Hybridization” , IJCSNS, vol 8, No 1,pp-226-233, January 2008
[12]Ahmed Al-Jaber , Khair Eddin Sabri “Data Hiding in a Binary Image”