Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available

(204.62KB)
This is an Open Access publication published under CSC-OpenAccess Policy.
Publications from CSC-OpenAccess Library are being accessed from over 74 countries worldwide.
Customized and Secure Image Steganography Through Random Numbers Logic.
Sanjeev Manchanda, Mayank Dave, S. B. Singh
Pages - 1 - 16     |    Revised - 15-06-2007     |    Published - 30-06-2007
Volume - 1   Issue - 1    |    Publication Date - June 2007  Table of Contents
MORE INFORMATION
KEYWORDS
Steganography, Cryptography, Random numbers logic
ABSTRACT
Steganography is the science of hiding information in media based data. We present random numbers logic based steganographic methods and layout management schemes for hiding data/image into image(s). These methods and schemes can be customized according to the requirements of the users and the characteristics of data/images. These methods are secure enough to meet the requirements of the users and user can play significant role in selection and development of these methods. Methods can be chosen randomly and implemented dynamically based on inputs, user choices as well as outputs. Experimental results are given to demonstrate the performance of the proposed methods.
CITED BY (14)  
1 Prashanti, G., & Sandhyarani, K. (2015, January). A New Approach for Data Hiding with LSB Steganography. In Emerging ICT for Bridging the Future-Proceedings of the 49th Annual Convention of the Computer Society of India CSI Volume 2 (pp. 423-430). Springer International Publishing.
2 Charles, S., & Govardhan, A. (2014). Secured Wireless Data Transmission over a Noisy AWGN Channel with Double Steganography and AES Cryptography.
3 Pramanik, M., & Sharma, K. Analysis of Visual Cryptography, Steganography Schemes and its Hybrid Approach for Security of Images.
4 Malhotra, L., & Gupta, N. (2014). A DWT and DCT based Hybrid Approach for Audio Watermarking.
5 Manjunatha Reddy, H. S. (2014). Design of image steganographic systems for covert communication.
6 Jayaramu, H. S., Shivakumar, K. B., Srinidhi, G. A., & Goutam, A. K. A Novel Steganography Technique USING Same Scale Wavelet.
7 Saini, R. Review of Different Techniques of Image Steganography.
8 Agrawal, D., & Diwedi, S. (2013, February). Analysis of random bit image steganography techniques. In IJCA Proceedings on International Conference on Recent Trends in Engineering and Technology 2013 (No. 1, pp. 1-4). Foundation of Computer Science (FCS).
9 Yadav, M., Yadav, A., & Yadav, P. Analysis of Various Image Steganography Techniques.
10 Bhavana, S., & Sudha, K. L. (2012). Text Steganography using LSB insertion method along with Chaos Theory. International Journal of Computer Science, Engineering and Applications, 2(2), 145.
11 Sudha, K. L. (2012). Text Steganography using LSB insertion method along with Chaos Theory. arXiv preprint arXiv:1205.1859.
12 Tiwari, N., & Shandilya, D. M. (2010). Evaluation of Various LSB based Methods of Image Steganography on GIF File Format. International Journal of Computer Applications (0975–8887) Volume.
13 Tiwari, N., & Shandilya, M. (2010). Secure RGB image steganography from pixel indicator to triple algorithm-an incremental growth. International Journal of Security and Its Applications, 4(4), 53-62.
14 Rana, R., & Singh, D. (2010). Steganography-Concealing Messages in Images Using LSB Replacement Technique with Pre-Determined Random Pixel and Segmentation of Image. International Journal of Computer Science & CommunicationVol, 1, 113-116.
1 Google Scholar 
2 ScientificCommons 
3 Academic Index 
4 CiteSeerX 
5 refSeek 
6 iSEEK 
7 Socol@r  
8 ResearchGATE 
9 Bielefeld Academic Search Engine (BASE) 
10 Scribd 
11 WorldCat 
12 SlideShare 
13 PDFCAST 
14 PdfSR 
15 Free-Books-Online 
16 Cari Buku Baru 
17 EDocFind 
18 Download Free PDF 
1 Andersen R.J. and Petitcolas F.A.P. "On the limits of steganography". IEEE Journal of Selected Areas in Communications, Special Issue on Copyright and Privacy Protection 16 No.4, 474-481, 1998
2 Gonzalez R.C. and Woods R.E. “Digital Image Processing”. Addison Wesley, Reading, 1992
3 Aura T. “Practical invisibility in digital communication”. Lecture Notes in Computer Science, vol.1174, Springer-Verlag, pp. 265-278, 1996
4 Westfeld A. and Pfitzmann A. "Attacks on Steganographic Systems". Lecture Notes in Computer Science, vol. 1768, Springer-Verlag, Berlin, pp. 61-75, 2000
5 Johnson N. F. and Jajodia S. “Steganography: Seeing the Unseen”. IEEE Computer, pp.26-34, February 1998
6 Johnson N. F. and Jajodia S. “Steganalysis of Images Created Using Current Steganography Software”. Lecture Notes in Computer Science, vol.1525, Springer- Verlag, Berlin, pp. 273-289, 1998
7 Johnson N. F. “Steganalysis of images created using current steganographic software”. Second Information Hiding Workshop, 1998.
8 Pal S.K., Saxena P. K. and Mutto S.K. “The Future of Audio Steganography”. Pacific Rim Workshop on Digital Steganography, Japan, 2002
9 Cachin C. “An information-theoretic model for steganography”. D. Aucsmith (Ed.): Information Hiding, 2nd International Workshop, vol. 1525 of Lectures Notes in Computer Science, pp. 306-318. Springer, 1998
10 Fridrich J. and Goljan M. “Practical steganalysis of digital images-state of the art” Proc. SPIE Photonics West, Vol. 4675,pp. 1-13, San Jose, California, Jan. 2002
11 Fisk G., Fisk M., Papadopoulos C. and Joshua N. “Eliminating Steganography in Internet Traffic with Active Wardens”, Available: http://citeseer.nj.nec.com/fisk02eliminating.html. Nov 1, 2002
12 Bao F. and Wang X. “Steganography of short messages through accessories” Pacific Rim Workshop on Digital Steganography, Japan, 2002
13 Avcibas I., Memon N. and Sankur B. “Steganalysis using image quality metrics”. IEEE Transactions on Image Processing, vol. 12, pp. 221–229, Feb. 2003
14 Lee, Y. K. and Chen L. H. “High Capacity Image Steganographic Model”. IEE Proceedings Vision, Image and Signal Processing, pp. 288-294, 2000
15 Chan Y. K. and Chang C. C. “Concealing a Secret Image Using the Breadth First Traversal Linear Quad tree Structure”. IEEE Proceedings of Third International Symposium on Cooperative Database Systems for Advanced Applications, pp. 194-199, 2001
16 Chang C. C., Chen T. S. and Chung L. Z. “A Steganographic Method Based upon JPEG and Quantization Table Modification” Information Sciences, vol. 141, pp. 123-138, 2002
17 Hsu C. T., Wu J. L. “Hidden Digital Watermarks in Images” IEEE Transactions on Image Processing, pp. 58-68, 1999
18 Fard Amin Milani, Mohammad R., Akbarzadeh T. and Varasteh A. Farshad. “A New Genetic Algorithm Approach for Secure JPEG Steganography”, Proceedings of the IEEE International Conference on Engineering of Intelligent Systems ICEIS’2006, pp. 216-219, ISBN: 1-4244-0456-8, Islamabad, Pakistan, April 22-23 2006
19 Martín Alvaro, Sapiro Guillermo and Seroussi Gadiel, “Is Image Steganography Natural?”. IEEE Transactions On Image Processing, Vol. 14, No. 12, December, 2005
20 Koval Oleksiy, Voloshynovskiy Svyatoslav, Holotyak Taras and Pun Thierry. “Informationtheoretic Analysis of Steganalysis in Real Images”. International Multimedia Conference, Proceeding of the 8th workshop on Multimedia and security, Geneva, Switzerland, Pages: 11 – 16, 2006
21 Luo Xiangyang, Hu Zongyun, Yang Can, Gao Shanqing. “A Secure LSB Steganography System Defeating Sample Pair Analysis Based on Chaos System and Dynamic Compensation”, Feb. 20-22, 2006 ICACT 2006
22 Kelton W. D. and Law A. “Simulation Modeling and Analysis”. Mcgraw-Hill Science, USA, 2006
23 Fridrich J., Goljan Miroslav and Du Rui. “Reliable detection of LSB steganography in color and grayscale images”. International Multimedia Conference Proceedings of the workshop on Multimedia and security: new challenges, Ottawa, Ontario, Canada, Publisher ACM Press New York, NY, USA, 2001
Mr. Sanjeev Manchanda
- India
smanchanda@tiet.ac.in
Mr. Mayank Dave
- India
Mr. S. B. Singh
- India