Hiding Data in Images Using PCP
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 32797
Hiding Data in Images Using PCP

Authors: Souvik Bhattacharyya, Gautam Sanyal

Abstract:

In recent years, everything is trending toward digitalization and with the rapid development of the Internet technologies, digital media needs to be transmitted conveniently over the network. Attacks, misuse or unauthorized access of information is of great concern today which makes the protection of documents through digital media a priority problem. This urges us to devise new data hiding techniques to protect and secure the data of vital significance. In this respect, steganography often comes to the fore as a tool for hiding information. Steganography is a process that involves hiding a message in an appropriate carrier like image or audio. It is of Greek origin and means "covered or hidden writing". The goal of steganography is covert communication. Here the carrier can be sent to a receiver without any one except the authenticated receiver only knows existence of the information. Considerable amount of work has been carried out by different researchers on steganography. In this work the authors propose a novel Steganographic method for hiding information within the spatial domain of the gray scale image. The proposed approach works by selecting the embedding pixels using some mathematical function and then finds the 8 neighborhood of the each selected pixel and map each bit of the secret message in each of the neighbor pixel coordinate position in a specified manner. Before embedding a checking has been done to find out whether the selected pixel or its neighbor lies at the boundary of the image or not. This solution is independent of the nature of the data to be hidden and produces a stego image with minimum degradation.

Keywords: Cover Image, LSB, Pixel Coordinate Position (PCP), Stego Image.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1327740

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1769

References:


[1] Ahmad T. Al-Taani. and Abdullah M. AL-Issa. A novel steganographic method for gray-level images. International Journal of Computer, Information, and Systems Science, and Engineering, 3, 2009.
[2] RJ Anderson. Stretching the limits of steganography. Information Hiding, Springer Lecture Notes in Computer Science, 1174:39-48, 1996.
[3] Ross J. Anderson. and Fabien A.P.Petitcolas. On the limits of steganography. IEEE Journal on Selected Areas in Communications (J-SAC), Special Issue on Copyright and Privacy Protection, 16:474-481, 1998.
[4] Souvik Bhattacharyya. and Gautam Sanyal. Study of secure steganography model. In Proceedings of International Conference on AdvancedComputing and Communication Technologies (ICACCT-2008), Panipath,India, 2008.
[5] Souvik Bhattacharyya. and Gautam Sanyal. An image based steganography model for promoting global cyber security. In Proceedings of International Conference on Systemics, Cybernetics and Informatics, Hyderabad,India, 2009.
[6] Souvik Bhattacharyya. and Gautam Sanyal. Implementation and design of an image based steganographic model. In Proceedings of IEEE International Advance Computing Conference, Patiala ,India, 2009.
[7] J.Y. Hsiao. C.C. Chang. and C.-S. Chan. Finding optimal leastsignificant- bit substitution in image hiding by dynamic programming strategy. Pattern Recognition, 36:1583-1595, 2003.
[8] C.K. Chan. and L. M.Cheng. Hiding data in images by simple lsb substitution. Pattern Recognition, 37:469-474, 2004.
[9] Scott. Craver. On public-key steganography in the presence of an active warden. In Proceedings of 2nd International Workshop on Information Hiding., pages 355-368, Portland,Oregon, USA, 1998.
[10] Potdar V.and Chang E. Gray level modification steganography for secret communication. In IEEE International Conference on Industria lInformatics., pages 355-368, Berlin, Germany, 2004.
[11] P Huang. K.C. Chang., C.P Chang. and T.M Tu. A novel image steganography method using tri-way pixel value differencing. Journal of Multimedia, 3, 2008.
[12] Y. K. Lee. and L. H.Chen. High capacity image steganographic model. IEE Proc.-Vision, Image and Signal Processing, 147:288-294, 2000.
[13] N.F.Johnson. and S. Jajodia. Steganography: seeing the unseen. IEEE Computer, 16:26-34, 1998.
[14] C.F. Lin. R.Z. Wang. and J.C. Lin. Image hiding by optimal lsb substitution and genetic algorithm. Pattern Recognition, 34:671-683, 2001.
[15] Gustavus J. Simmons. The prisoners- problem and the subliminal channel. Proceedings of CRYPTO., 83:51-67, 1984.
[16] JHP Eloff. T Mrkel. and MS Olivier. An overview of image steganography. In Proceedings of the fifth annual Information Security South Africa Conference., 2005.
[17] D.C. Wu. and W.H. Tsai. A steganographic method for images by pixelvalue differencing. Pattern Recognition Letters, 24:1613-1626, 2003.