Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available

(345.18KB)
This is an Open Access publication published under CSC-OpenAccess Policy.
Using SBR Algorithm To Hide The Data Into The JPEG Image
Ashwini Palimkar, S.H.Patil
Pages - 15 - 23     |    Revised - 31-03-2014     |    Published - 30-04-2014
Volume - 8   Issue - 2    |    Publication Date - April 2014  Table of Contents
MORE INFORMATION
KEYWORDS
Steganography, Data Hiding, Embedding Data, SBR Algo, Least Significant Bit.
ABSTRACT
Data hiding is the art of hiding data for various purposes such as--- to maintain private data, secure confidential data. Well known technique is the Steganography; Steganography has evolved into a digital strategy of hiding a file in some form of multimedia, such as an image, an audio file or even a video file. This paper presents a new Steganography technique in spatial domain for encoding extra information in an image by making small modifications to its pixels. The proposed method focuses on one particular popular technique, Least Significant Bit (LSB) Embedding. Instead of using the LSB-1 of the cover for embedding the message, LSB-2 has been used to increase the robustness of system. and protect the message against the external influences such as noise, filter, compression…etc.[Using SBR Algo].

For more protection to the message bits a Stego-Key has been used to permute the message bits before embedding it. An experimental result of the modified method shows that this paper helps to successfully hide the secret data into the image file with minimum distortion made to the image file.
CITED BY (1)  
1 Racheal, B. O., & Adeosun, O. O. (2016). Employing The Use of Steganography for The Secured Transmission of Information In Mobile Devices.
1 Google Scholar
2 CiteSeerX
3 refSeek
4 Scribd
5 slideshare
6 PdfSR
1 A.E.Mustafa, A A. M.Elgamal, M.E.Elami, Ahmad bd, ”A proposed Algorithm For Steganography in Digital image Based On LSB”Research Journal Specific Education Faculty of specific Education, MansouraUniversity, Issue no. 21, April. 2011.
2 Vijay Kumar Sharma, Vishal Shrivastava’Steganography algorithms for hiding image in image by improved lsb substitution by minimize detection ‘,in Journal of Theoretical and applied Information Technology15th February 2012. Vol. 36 No.1.
3 Alain, C. Brainos, A Study of Steganography and the Art of Hiding Information, East Carolina university.
4 Desoky, A. (2009):A novel Noiseless Steganography paradigm, Ph.D., Department of Computer Science and electrical engineering, Faculty of the Graduate School, university of Maryland, Baltimore County.
5 Christopher, T. (2007): Compression Aided feature Based steganalysis of Perturbed Quantization steganography in Jpeg image, M.Sc. s, Department of science in Electrical and Computer Engineering, University of Delaware.
6 Xiang-yang, L. , Dao-shun., Ping, W., Fen-lin, L.( (2008): a review on Blind Detection for Image Steganography, journal of Signal Processing, Vol(88),Issue(9).
7 Samer, A.(2006):A New Algorithm for Hiding Gray Images using Blocks, Information ,Security Journal, The hashemite University, Jordan, Volume (15), Issue (6).
8 Kaushal M. Solanki, 2005, Multimedia Data Hiding: From fundamental Issues to Practical Techniques, PhD, electrical and Computer Engineering, university of california, Santa Barbara.
9 Sanjeev, M.et.al (2008): Customized and Secure Image Steganography, Journal of Signal Processing, Vol (1), Issue (1).
10 Hengfu, Y., Xingming S., Guang S(2009): A High- capacity Image Data Hiding Scheme Using adaptive LSB substitution, Journal of radio engineering, vOL. (18), NO. (4).
11 Lee, L.(2004) :LSB Steganography :Information within Information, Journal of Computer Science, Vol (265), N(5).
12 Amirthanjan, R.Akila, R & Deepika chowdavarapu,a Comparative Analysis of Image steganography’, 2010.
13 Bandyopadhyay, S.K., 2010. An Alternative Approach of Steganography Using Reference Image.international Journal of Advancements in Technology, 1(1), pp.05-11.
14 Kaur, R. Dhir, & G. Sikka. (2009). A new image steganography based on first component alteration technique. International Journal of Computer Science and Information Security(IJCSIS), 6, 53-56.
15 TMorkel, JHP Eloff and MS Olivier, "An Overview of Image Steganography," in Proceedings of the fifth Annual Information Security South Africa Conference,(ISSA2005), Sandton, South Africa, june/July 2005.
16 Robert Krenn, “ Steganography and steganalysis”, Internet Publication, March 2004.
17 Johnson, N.F. & Jajodia, S., “Exploring Steganography: Seeing the Unseen”, Computer Journal, February 1998.
18 Petit colas, Fabien A.P., “Information Hiding: Techniques for Steganography and Digital Watermarking.”, 2000.
19 Alain, C. Brainos, A Study Of Steganography And The Art Of Hiding Information, East Carolina University.
20 J.L.Dugelay and S.Roche, “Information Hiding: Techniques for Steganography and Digital Watermarking”, S.Katzenbeisser and F.A.P.Petitcolas (eds.), Norwood, MA: Artech House, pp. 121-148.
21 Ajanthaa lakkshmann, Puja u.dharia, Fairy Gandhi, An adaptive image steganography technique using LSB and MSB international research journals V3, n1, 2013, ISSN 1839-6518.
22 Jain, Sachin Mesh ram, Shikha Dubey, Image Steganography Using LSB and Edge detection Technique”, International Journal of Soft Computing and Engineering (IJSCE)ISSN: 2231- 2307, Volume-2, Issue-3, July 2012.
23 TMorkel, JHP Eloff and MS Olivier, "An Overview of Image Steganography," in Proceedings of the Fifth Annual Information Security South Africa Conference (ISSA2005), Sandton,South Africa, June/July 2005.
24 Johnson, N.F. & Jajodia, S., “Exploring Steganography: Seeing the Unseen”, Computer Journal, February 1998.
25 Yang, C.-H.: ‘Inverted pattern approach to improve image quality of information hiding by LSB Substitution’, 2008.
Miss Ashwini Palimkar
M.Tech (stud of CSE) Bharati Vidyapeeth University COE Pune, 411043, Maharashtra, India. - India
palimkarashwini@gmail.com
Dr. S.H.Patil
Professor & Head Dept of CSE Bharati Vidyapeeth University COE Pune, 411043 , Maharashtra - India