Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 32727
A Data Hiding Model with High Security Features Combining Finite State Machines and PMM method

Authors: Souvik Bhattacharyya, Gautam Sanyal


Recent years have witnessed the rapid development of the Internet and telecommunication techniques. Information security is becoming more and more important. Applications such as covert communication, copyright protection, etc, stimulate the research of information hiding techniques. Traditionally, encryption is used to realize the communication security. However, important information is not protected once decoded. Steganography is the art and science of communicating in a way which hides the existence of the communication. Important information is firstly hidden in a host data, such as digital image, video or audio, etc, and then transmitted secretly to the receiver.In this paper a data hiding model with high security features combining both cryptography using finite state sequential machine and image based steganography technique for communicating information more securely between two locations is proposed. The authors incorporated the idea of secret key for authentication at both ends in order to achieve high level of security. Before the embedding operation the secret information has been encrypted with the help of finite-state sequential machine and segmented in different parts. The cover image is also segmented in different objects through normalized cut.Each part of the encoded secret information has been embedded with the help of a novel image steganographic method (PMM) on different cuts of the cover image to form different stego objects. Finally stego image is formed by combining different stego objects and transmit to the receiver side. At the receiving end different opposite processes should run to get the back the original secret message.

Keywords: Cover Image, Finite state sequential machine, Melaymachine, Pixel Mapping Method (PMM), Stego Image, NCUT.

Digital Object Identifier (DOI):

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2199


[1] Ahmad T. Al-Taani. and Abdullah M. AL-Issa. A novel steganographic method for gray-level images. International Journal of Computer, Information, and Systems Science, and Engineering, 3, 2009.
[2] RJ Anderson. Stretching the limits of steganography. Information Hiding, Springer Lecture Notes in Computer Science, 1174:39-48, 1996.
[3] Ross J. Anderson. and Fabien A.P.Petitcolas. On the limits of steganography. IEEE Journal on Selected Areas in Communications (J-SAC), Special Issue on Copyright and Privacy Protection, 16:474-481, 1998.
[4] Souvik Bhattacharyya. and Gautam Sanyal. Study of secure steganography model. In Proceedings of International Conference on AdvancedComputing and Communication Technologies (ICACCT-2008), Panipath,India, 2008.
[5] Souvik Bhattacharyya. and Gautam Sanyal. An image based steganography model for promoting global cyber security. In Proceedings of International Conference on Systemics, Cybernetics and Informatics, Hyderabad,India, 2009.
[6] Souvik Bhattacharyya. and Gautam Sanyal. Implementation and design of an image based steganographic model. In Proceedings of IEEE International Advance Computing Conference, Patiala ,India, 2009.
[7] Souvik Bhattacharyya. and Gautam Sanyal. Hiding data in images using pixel mapping method (pmm). In Proceedings of 9th annual Conference on Security and Management (SAM) under The 2010 World Congress in Computer Science,Computer Engineering, and Applied Computing(WorldComp 2010), LasVegas,USA, July 12-15,2010.
[8] J.Y. Hsiao. C.C. Chang. and C.-S. Chan. Finding optimal leastsignificant- bit substitution in image hiding by dynamic programming strategy. Pattern Recognition, 36:1583-1595, 2003.
[9] C.K. Chan. and L. M.Cheng. Hiding data in images by simple lsb substitution. Pattern Recognition, 37:469-474, 2004.
[10] Scott. Craver. On public-key steganography in the presence of an active warden. In Proceedings of 2nd International Workshop on Information Hiding., pages 355-368, Portland,Oregon, USA, 1998.
[11] Potdar V.and Chang E. Gray level modification steganography for secret communication. In IEEE International Conference on Industria lInformatics., pages 355-368, Berlin, Germany, 2004.
[12] Nameer N. EL-Emam. Hiding a large amount of data with high security using steganography algorithm. Journal of Computer Science, 3:223- 232.
[13] K.R. Venugopal K.B. Raja, C.R. Chowdary and L.M. Patnaik. A secure image steganography using lsb, dct and compression techniques on raw images. In ICISIP 2005 Third International Conference on Intelligent Sensing and Information Processing, pages 170- 176.
[14] P Huang. K.C. Chang., C.P Chang. and T.M Tu. A novel image steganography method using tri-way pixel value differencing. Journal of Multimedia, 3, 2008.
[15] Y. K. Lee. and L. H.Chen. High capacity image steganographic model. IEE Proc.-Vision, Image and Signal Processing, 147:288-294, 2000.
[16] N.F.Johnson. and S. Jajodia. Steganography: seeing the unseen. IEEE Computer, 16:26-34, 1998.
[17] C.F. Lin. R.Z. Wang. and J.C. Lin. Image hiding by optimal lsb substitution and genetic algorithm. Pattern Recognition, 34:671-683, 2001.
[18] J. Shi and J. Malik. Normalized cuts and image segmentation. IEEE Trans. PAMI, 22:888-905.
[19] J. Shi and J. Malik. Normalized cuts and image segmentation. In Int. Conf. Computer Vision and Pattern Recognition, San Juan, Puerto Rico, 1997.
[20] Gustavus J. Simmons. The prisoners- problem and the subliminal channel. Proceedings of CRYPTO., 83:51-67, 1984.
[21] JHP Eloff. T Mrkel. and MS Olivier. An overview of image steganography. In Proceedings of the fifth annual Information Security South Africa Conference., 2005.
[22] D.C. Wu. and W.H. Tsai. A steganographic method for images by pixelvalue differencing. Pattern Recognition Letters, 24:1613-1626, 2003.
[23] Y.K.Lee. and L.H.Chen. High capacity image steganographic model. In IEEprocedings online no. 20000341, 2000.