DESIGN AND IMPLEMENTATION STEGANOGRAPHY SYSTEM BY USING VISIBLE IMAGE

Publications

Share / Export Citation / Email / Print / Text size:

International Journal on Smart Sensing and Intelligent Systems

Professor Subhas Chandra Mukhopadhyay

Exeley Inc. (New York)

Subject: Computational Science & Engineering , Engineering, Electrical & Electronic

GET ALERTS

eISSN: 1178-5608

DESCRIPTION

4
Reader(s)
8
Visit(s)
0
Comment(s)
0
Share(s)

VOLUME 8 , ISSUE 2 (June 2015) > List of articles

DESIGN AND IMPLEMENTATION STEGANOGRAPHY SYSTEM BY USING VISIBLE IMAGE

Hamdan Lateef Jaheel / Zou Beiji / Ahmed Lteef Jaheel

Keywords : Visible watermark, Least Significant Bit, Transform Domain Techniques, F4 Algorithm.

Citation Information : International Journal on Smart Sensing and Intelligent Systems. Volume 8, Issue 2, Pages 1,011-1,030, DOI: https://doi.org/10.21307/ijssis-2017-793

License : (CC BY-NC-ND 4.0)

Received Date : 02-February-2015 / Accepted: 30-March-2015 / Published Online: 01-June-2015

ARTICLE

ABSTRACT

Steganography refers to the technique of concealing secret information into another cover-media, such as audio, video, image and text in such a manner that the very existence of the information is camouflaged while secret is kept from the knowing of attacker. Watermarking is closely related to Stenography except that it hides information in cover object. Watermarking usually serves the purpose of copyright protection and ownership authentication, for example, watermarking can hide a stego-image inside a visible image and user can retrieve the stego-image and secret image in some way. In this paper, we will integrate two algorithms of information hiding, (steganography) F4 algorithm and (visible image) LSB algorithm to improve the level of protection. The secret image is concealed inside a common image through F4 algorithm and the resultant F4 steg-image is then hidden again as a visible image or watermark inside another image by LSB algorithm. To provide more than one level of protection for the hidden message, we will require additional security level to protect the secret image, which leads to increased complexity of retrieving the secrete image. The results prove the success of system after the secret image is retrieved successfully. The value of MSE, SNR and PSNR is calculated, which refers to an acceptable steganography system.

Content not available PDF Share

FIGURES & TABLES

REFERENCES

[1] Rajarathnam Chandramouli, Mehdi Kharrazi, Nasir Memon” Image Steganography and Steganalysis: Concepts and Practice” Second International Workshop, Seoul, Korea, Revised Papers, Volume 2939, pp 35-49, 2004.
[2] Jitendra Jain, Punit Johari” Digital Image Watermarking Based on LSB for Gray Scale Image” IJCSNS International Journal of Computer Science and Network Security, VOL.14 No.6,pp. 108-112, June 2014.
[3] Firas A. Jassim” Novel Steganography Algorithm for Hiding Text in Image using Five Modulus Method” International Journal of Computer Applications (0975 – 8887) Volume 72– No.17, pp. 39-44, June 2013.
[4] Mehdi Hussain and Mureed Hussain” A Survey of Image Steganography Techniques” International Journal of Advanced Science and Technology Vol. 54, pp 113-124, May 2013.
[5] F. Alturki and R. Mersereau,”Secure blind image steganographic technique using discrete fourier transformation ," IEEE International Conference on Image Processing, Thessaloniki, Greece., vol.2, 542 – 545, 2001.
[6] N. Provos, “Probabilistic Methods for Improving Information Hiding”, CITI Technical Report 01-1, pp. 1-8, January, 2001.
[7] R A Isbell, “Steganography: Hidden Menace or Hidden Saviour”, Steganography White Paper, 10 May 2002.
[8] Alisha Arora, Mrs. Nirvair Neeru, Mrs. Taqdir"IMAGE STEGANOGRAPHY TECHNIQUES: AN OVERVIEW" International Journal For Technological Research In Engineering Volume 1, Issue 9,pp.924-929, May-2014.
[9] Kuanchin Chen “Digital Watermarking and Steganography” Western Michigan University, USA 2009, IGI Global.
[10] Provos, N. & Honeyman, P. “Hide and Seek: An introduction to steganography”, IEEE Security and Privacy Journal, vol 1, Issue 3 , pp 32 – 44, 2003.
[11] Fridrich. J., Lukas J. and Goljan M., “Digital Camera Identification from Sensor Noise”,IEEE Transactions on Information Security and Forensics, vol 1(2), pp 205-214, 2006.
[12] N. Provos, “Defending Against Statistical Steganalysis,” In Proceedings of USENIX Security Symposium, pp. 323–335, 2001.
[13] Ajinkya Kawale, Shubham Gaidhani"Digital Image Watermarking"International Journal of Scientific & Engineering Research, Volume 4, Issue 5, pp. 1899-1901, 2013.
[14] Yusuf Perwej, Firoj Parwej , Asif Perwej"An Adaptive Watermarking Technique for the copyright of digital images and Digital Image Protection", The International Journal of Multimedia & Its Applications (IJMA) Vol.4, No.2, pp. 21-38, 2012.
[15] Wang R.Z. , Lin C.F. , Lin J.C. “Image hiding by optimal LSB substitution and genetic algorithm”, Pattern Recognition, vol 34 , no 3 , pp 671 – 683, 2001.
[16] Puneet Kr Sharma and Rajni” ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM” International Journal of Information Sciences and Techniques (IJIST) Vol. 2, No.4, pp. 95-101, July 2012.
[17] Philip Bateman and Dr. Hans “Image Steganography and Steganalysis”, M.S., Department of Computing Faculty of Engineering and Physical Sciences, University of Surrey Guildford Surrey, United Kingdom, Submitted for the Degree of Master of Science in Security Technologies & Applications 2008.
[18] R. Z. Wang, C. F. Lin, and J. C. Lin, "Image hiding by optimal LSB substitution and genetic algorithm," Pattern Recognition, vol. 34, no. 3, pp.671-683, Mar. 2001.
[19] A. Westfeld. "F5 - A Steganographic Algorithm: High Capacity Despite Better Steganalysis", Lecture Notes in Computer Science, vol. 2137, pp. 289-302, 2001.
[20] S.C.Mukhopadhyay, F.P.Dawson, M.Iwahara and S.Yamada, “A Novel Compact Magnetic Current Limiter for Three Phase Applications”, IEEE Transactions on Magnetics, Vol. 36, No. 5, pp. 3568-3570, September 2000.
[21] S. Yamada, K. Chomsuwan, S.C.Mukhopadhyay, M.Iwahara, M. Kakikawa and I. Nagano, “Detection of Magnetic Fluid Volume Density with a GMR Sensor”, Journal of Magnetics Society of Japan, Vol. 31, No. 2, pp. 44-47, 2007.
[22] Anju Thomas, D. Sugumar, P.T Vanathi” Blind Image Source Separation based on MMCA using Dictionary Technique” International Journal of Advanced Research in Electronics and Communication Engineering (IJARECE) Volume 2, Issue 2,pp.182-186, 2013.
[23] Amrita Khamrui, J K Mandal” A Genetic Algorithm based Steganography using Discrete [24] Cosine Transformation (GASDCT)” International Conference on Computational Intelligence:Modeling Techniques and Applications(CIMTA),Volume 10, Pages 105–111 2013.
[25] Hossein Sheisi, Jafar Mesgarian, and Mostafa Rahmani, “Steganography: Dct Coefficient Replacement Method and Compare With Jsteg Algorithm” International Journal of Computer and Electrical Engineering, Vol. 4, No. 4, pp.458-462, 2012.
[26] Hamdan L. Jaheel and Zou Beiji,A novel approach of combining steganography algorithms,International Journal on Smart Sensing and Intelligent Systems, vol.8, no.1, pp.90-106, 2015.
[27] Wang Tao, Design of digital image encryption algorithm based on mixed chaotic sequences, International Journal on Smart Sensing and Intelligent Systems, vol.7, no.4, pp. 1453 – 1469, 2014.

EXTRA FILES

COMMENTS