Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available

(383.22KB)
This is an Open Access publication published under CSC-OpenAccess Policy.

PUBLICATIONS BY COUNTRIES

Top researchers from over 74 countries worldwide have trusted us because of quality publications.

United States of America
United Kingdom
Canada
Australia
Malaysia
China
Japan
Saudi Arabia
Egypt
India
A Spatial Domain Image Steganography Technique Based on Matrix Embedding and Huffman Encoding
P.Nithyanandam, T.Ravichandran, N.M.Santron, E. Priyadharshini
Pages - 456 - 468     |    Revised - 01-11-2011     |    Published - 15-12-2011
Volume - 5   Issue - 5    |    Publication Date - November / December 2011  Table of Contents
MORE INFORMATION
KEYWORDS
Steganography, Imperceptibility, Payload, Stego Image
ABSTRACT
This paper presents an algorithm in spatial domain which gives less distortion to the cover image during embedding process. Minimizing embedding impact and maximizing embedding capacity are the key factors of any steganography algorithm. Peak Signal to Noise Ratio (PSNR) is the familiar metric used in discriminating the distorted image (stego image) and cover image. Here matrix embedding technique is chosen to embed the secret image which is initially Huffman encoded. The Huffman encoded image is overlaid on the selected bits of all the channels of pixels of cover image through matrix embedding. As a result, the stego image is constructed with very less distortion when compared to the cover image ends up with higher PSNR value. A secret image which cannot be embedded in a normal LSB embedding technique can be overlaid in this proposed technique since the secret image is Huffman encoded. Experimental results for standard cover images, which obtained higher PSNR value during the operation is shown in this paper.
CITED BY (12)  
1 Kaur, H., & Goyal, E. D. (2014). Performance Enhancement of a Transform Domain Based Steganographic Technique Using Segmentation.
2 Thanikaiselvan, V., Arulmozhivarman, P., Chakrabarty, S., Agarwal, A., Subashanthini, S., & Amirtharajan, R. (2014). Comparative Analysis of (5/3) and Haar IWT Based Steganography. Information Technology Journal, 13(16), 2534.
3 Rajput, P., Arya, S., Kumari, S., & Lehana, P. (2014). Qualitative and quantitative analysis of non-uniform dark images. Advances in Image and Video Processing, 2(1), 23-34.
4 Pol, K. (2014). Image steganography based on DWT using Huffman LWZ Encoding. Int J Eng Tech Res, 2(3), 100-103.
5 Nilizadeh, A. F., & Nilchi, A. R. N. (2013). Steganography on RGB Images Based on a “Matrix Pattern” using Random Blocks. International Journal of Modern Education and Computer Science (IJMECS), 5(4), 8.
6 Mann, V. K., & Dhaliwal, H. S. (2013). 32* 32 Colour Image Steganography. International Journal of Engineering Trends and Technology (IJETT) Vol, 4.
7 Maan, V. K., & Dhaliwal, H. S. 32× 32 Vector Quantization Based Colour Image Steganography.
8 Pandian, N., & Thangavel, R. (2012). Gray Coded Grayscale Image Steganoraphy using Hufman Encoding. International Journal of Image Processing (IJIP), 6(5), 334.
9 Nithyanandam, P., & Ravichandran, T. (2012). Geometrical Rotation Addressed Steganography Technique using Matrix Embedding and Huffman Encoding. European Journal of Scientific Research, 87(1), 31-45.
10 Vongurai, N., & Phimoltares, S. (2012, September). Frequency-Based Steganography Using 32x32 Interpolated Quantization Table and Discrete Cosine Transform. In Computational Intelligence, Modelling and Simulation (CIMSiM), 2012 Fourth International Conference on (pp. 249-253). IEEE.
11 D. Vishwakarma, Prof. S. Maheshwari and Prof. S. Joshi, “Efficient Information Hiding Technique Using Steganography”, International Journal of Emerging Technology and Advanced Engineering, 2(1), pp. 154-159 January 2012.
12 Vishwakarma, D., Maheshwari, S., & Joshi, S. Efficient Information Hiding Technique Using Steganography.
1 Google Scholar 
2 CiteSeerX 
3 refSeek 
4 Bielefeld Academic Search Engine (BASE) 
5 Scribd 
6 SlideShare 
7 PdfSR 
1 Injemar J. Cox, Matthew L. Miller, Jeffrey A. Bloom, Jessica Fridrich, Ton Kalker. Digital Watermarking and Steganography. Morgan Kaufmann, Second Edition,2008.
2 Professor Luca Trevisan, 2001, "Lecture notes on Intro. To CS Theory." Online. Available: http:// ww.cs.berkeley.edu/~luca/cs170/notes/lecture15.ps
3 Rafael C. Gonzalez Richard E. Woods. Digital Image Processing. ,PHI, Third Edition, 2008.
4 Alasdair McAndrew. Introduction to Digital Image Processing with MATLAB, CENGAGE Learning, 2004
5 [Online].Available : http://www.binaryessence.com
6 Ali K. Hmood, Z. M. Kasirun, Hamid A. Jalab,Gaz Mahabubul Alam, A. A. Zaidan, B. B. Zaidan. “On the accuracy of hiding information metrics: Counterfeit protection for education and important certificates.” International Journal of the Physical Sciences, Volume. 5, Issue 7, pp. 1054-1062, August,2010.
7 Chang, C.C and Tseng, H.W. 2004. “A Steganographic method for digital images using side match.” Pattern Recognition Letters, 25: 1431 – 1437, June 2004.
8 Po-Yueh Chen,Wei-En Wu. “A Modified Side Match Scheme for Image Steganography” , International Journal of Applied Science and Engineering, Volume 7, Issue 1, pp. 53-60, October 2009.
9 A. Nag, S. Biwa’s, D. Sarkar, P.P. Sarkar. “A Novel Technique for Image Steganography Based on DWT and Huffman Encoding” , International Journal of Computer Science and Security, Volume 4, Issue 6, pp. 561-570, Feb. 2011.
10 R.Amirtharajan, Sandeep Kumar Beher, Motamarri Abhilash Swarup, Mohamed Ashfaaq K and John Bosco Balaguru Rayappan. “Colour Guided Colour Image Steganography”, Universal Journal of Computer Science and Engineering Technology, Volume 1, pp.16 – 23, Oct . 2010.
11 Santosh Arjun, Atul Negi, Chaitanya Kranti, and Divya Keerthi. “An Approach to Adaptive Steganography Based on Matrix Embedding” TENCON 2007 - 2007 IEEE Region 10 , Volume 1,pp.1-4, Oct . 2007.
Mr. P.Nithyanandam
SSN college of engineering - India
nithyanandamp@ssn.edu.in
Mr. T.Ravichandran
- India
Mr. N.M.Santron
- India
Mr. E. Priyadharshini
- India