Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 33122
Implementing Adaptive Steganography by Exploring the Ycbcr Color Model Characteristics
Authors: Surbhi Gupta, Alka Handa, Parvinder S.Sandhu
Abstract:
Stegnography is a new way of secret communication the most widely used mechanism on account of its simplicity is the use of the least significant bit. We have used the least significant bit (2 LSB and 4 LSB) substitution method. Depending upon the characteristics of the individual portions of cover image we decide whether to use 2 LSB or 4 LSB thus it is an adaptive stegnography technique. We used one of the three channels to behave as indicator to indicate the presence of hidden data in other two channels. The module showed impressive results in terms of capacity to hide the data. In proposed method, instead of using RGB color space directly, YCbCr color space is used to make use of human visual system characteristic.Keywords: Stegoimage, steganography, Pixel indicator, segmentation, YCbCr..
Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1084580
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2187References:
[1] Abbas Cheddad,A. Joan Condell,J. Curran,K. and Kevitt,P.M., "Digital image steganography: Survey and analysis of current methods", in the Signal Processing Journal,vol 90 ,pp.727-752.
[2] Abu-Marie,W., Gutub,A. And Abu-Mansour, H. (2010), "Image Based Steganography Using Truth Table Based and Determinate Array on RGB Indicator", International Journal of Signal and Image Processing, vol.1, no. 3, pp. 196-204.
[3] Anderson, R.J. and Petitcolas, F.A.P. (2001), "On the limits of the Stegnography", IEEE Journal Selected Areas in Communications, vol. 16, no. 4, pp. 474-481.
[4] Avcibas, I.,Menon, N. and Sankur,B. (2003), "Steganalysis Using Image Quality Metrics", IEEE transactions on image processing, vol. 12, no. 2, pp.221-223.
[5] Channali, S. and Jadhav,A. (2009), "Steganography An Art of Hiding Data" , International Journal on Computer Science and Engineering, vol.1, no. 3, pp. 137-141.
[6] Fridrich, J.,Goljan, M. and Du, R.(2001), "Detecting LSB Steganography in Color and Grayscale Images", Magazine of IEEE Multimedia Special Issue on Security, vol. 15, no. 1, pp. 22-28.
[7] Gutub, A., Ankeer, M., Ghalioun, M.A., Shaheen, A. and Alvi, A. (2008), "Pixel indicator high capacity technique for RGB image based
[8] Steganography", WoSPA 5th IEEE International Workshop on Signal Processing and its Applications, U.A.E, pp.234-239.
[9] Naoe,K. and Takefuji,F.(2004), "Damageless Information Hiding using Neural Network on YCbCr Domain", IJCSNS International Journal of Computer Science and Network Security, vol.8 ,no.9,pp.81-84.
[10] Neil, F.J. and Jajodia, S. (1998), "Exploring steganography: Seeing the unseen", IEEE Transaction on computer practices, Washington, vol. 31, no. 2, pp.26-34.
[11] Rattanapitak, W. and Udomhunsakul,S., "Comparative Efficiency of Color Models for Multi-focus Color Image Fusion", Proceddings of the intenational multiconference of engineers and computer scientists,Hong Kong,vol II.
[12] Sallee,P.(2003), " Model-based steganography" , in Proceedings of the 2nd International Workshop on Digital Watermarking, Seoul, Korea, LNCS, vol. 2939, pp. 254-260.