Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 30184
A Dynamic RGB Intensity Based Steganography Scheme

Authors: Mandep Kaur, Surbhi Gupta, Parvinder S. Sandhu, Jagdeep Kaur

Abstract:

Steganography meaning covered writing. Steganography includes the concealment of information within computer files [1]. In other words, it is the Secret communication by hiding the existence of message. In this paper, we will refer to cover image, to indicate the images that do not yet contain a secret message, while we will refer to stego images, to indicate an image with an embedded secret message. Moreover, we will refer to the secret message as stego-message or hidden message. In this paper, we proposed a technique called RGB intensity based steganography model as RGB model is the technique used in this field to hide the data. The methods used here are based on the manipulation of the least significant bits of pixel values [3][4] or the rearrangement of colors to create least significant bit or parity bit patterns, which correspond to the message being hidden. The proposed technique attempts to overcome the problem of the sequential fashion and the use of stego-key to select the pixels.

Keywords: Steganography, Stego Image, RGB Image, Cryptography, LSB.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1080792

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1752

References:


[1] Provos, N., Honeyman, P, Hide and seek: An introduction to steganography, IEEE Security & Privacy Magazine 1 (2003) pp. 32-44.
[2] Karen Bailey, Kevin Curran, An evaluation of image based steganography methods using visual inspection and automated detection techniques, Multimedia Tools and Applications, Vol 30 , Issue 1 (2006) pp. 55-88.
[3] Adnan Gutub, Mahmoud Ankeer, Muhammad Abu- Ghalioun, Abdulrahman Shaheen, and Aleem Alvi, Pixel indicator high capacity technique for RGB image based Steganography, WoSPA 2008 - 5th IEEE International Workshop on Signal Processing and its Applications, University of Sharjah, Sharjah, U.A.E. 18 - 20 March 2008.
[4] S. Venkatraman, A. Abraham, M. Paprzycki, "Significance of Steganography on Data Security", International Conference on Information Technology: Coding and Computing (ITCC'04), Las Vegas, 5-7 April 2004.
[5] N.F. Johnson, S. Jajodia, "Exploring Steganography: Seeing the Unseen", IEEE computer, Vol. 31, No. 2, pages 26-34, February 1998.
[6] K. Bailey, K. Curran, "An Evaluation of Image Based Steganography Methods", Multimedia Tools & Applications, Vol. 30, No. 1, pages 55- 88, July 2006.
[7] Artz, "Digital Steganography: Hiding Data within Data", Los Alamos NationalLaboratory, http://www.cc.gatech.edu/classes/AY2003/cs6262_fall/digital_steg nography.pdf, May 2001.
[8] Silman, J., Steganography and Steganalysis: An Overview, SANS Institute 2001.
[9] (Zollner98) Zollner J., H. Federrath, H. Klimant, A. Pfitzmann, R. Piotraschke, A. Westfeld, G. Wicke, G. Wolf, Modelling the Security of Steganographic Systems, Information Hiding, 2nd International Workshop, IH'98 Portland, Oregon, USA, Computer Science 1525. pp. 344-354, April 1998.
[10] S. Lyu and H. Farid, steganalysis using higher-order image statistics, IEEE Transactions on Information Forensics and Security, 1(1)(2006) 111-119.
[11] D. Kahn, The Codebreakers: The comprehensive history of secret communication from ancient times to the Internet, Scribner, December 5, 1996. C. Hosmer, Discovering hidden evidence, Journal of Digital Forensic Practice, (1)(2006)47-56.
[12] J.C. Hernandez-Castro, I. Blasco-Lopez and J.M. Estevez-Tapiador, Steganography in games: A general methodology and its application to the game of Go, Computers and Security, Elsevier Science, 25(2006) 64- 71.
[13] P. Hayati, V. Potdar, E. Chang, A survey of steganographic and steganalytic tools for the digital forensic investigator,available from: http://debii.curtin.edu.au/~pedram/images/docs/survey_of_steganograph y_and_steganalytic_tools.pdf
[14] W. Bender, W. Butera, D. Gruhl, R. Hwang, F.J. Paiz and S. Pogreb, Applications for data hiding, IBM Systems Journal, 39 (3&4)(2000) 547-568.
[15] F.A.P. Petitcolas, "Introduction to information hiding", in: S. Katzenbeisser and F.A.P. Petitcolas, (ed.) (2000) Information hiding techniques for steganography and digital watermarking, Norwood: Artech House, INC.
[16] N. F. Johnson and S. Katzenbeisser, "A survey of steganographic techniques," in Proc. Information Hiding, Norwood, MA, 2000, pp. 43- 78.
[17] J.-L. Dugelay and S. Roche, "A survey of current watermarking techniques," in Information Hiding Techniques for Steganography and Digital Watermarking, S. Katzenbeisser and F. A. P. Petitcolas, Eds. Norwood, MA: Artech House, 1999, ch. 6
[18] A.Westfeld and A. Pfitzmann, "Attacks on steganographic systems," in Proc. 3rd Information Hiding Workshop, Dresden, Germany, 1999, pp. 61-76.
[19] N. Provos and P. Honeyman, Detecting steganographic content on the Internet, Center for Information Technology Integration, University of Michigan, technical report, August 31, 2001.
[20] M. Kharrazi, H.T. Sencar and N. Memon, Performance study of common image steganography and steganalysis techniques, Journal of Electrical Imaging, 15(4)(2006)1-16.
[21] J. Fridrich, Application of data hiding in digital images, Tutorial for the ISSPA-99, Brisbane, Australia, August 22-25 1999.
[22] S.C. Katzenbeisser, Principles of steganography, in: S. Katzenbeisser and F.A.P Petitcolas, (ed.), Information hiding techniques for steganography and digital watermarking, Norwood: Artech House, INC,2000.
[23] P. Kruus, C. Scace, M. Heyman and M. Mundy, A survey of steganographic techniques for image files, Advanced Security Research Journal, V (I) (2003)41-51.