Home   >   CSC-OpenAccess Library   >    Manuscript Information
Using SBR Algorithm To Hide The Data Into The JPEG Image
Ashwini Palimkar, S.H.Patil
Pages - 15 - 23     |    Revised - 31-03-2014     |    Published - 30-04-2014
Volume - 8   Issue - 2    |    Publication Date - April 2014  Table of Contents
MORE INFORMATION
KEYWORDS
Steganography, Data Hiding, Embedding Data, SBR Algo, Least Significant Bit.
ABSTRACT
Data hiding is the art of hiding data for various purposes such as--- to maintain private data, secure confidential data. Well known technique is the Steganography; Steganography has evolved into a digital strategy of hiding a file in some form of multimedia, such as an image, an audio file or even a video file. This paper presents a new Steganography technique in spatial domain for encoding extra information in an image by making small modifications to its pixels. The proposed method focuses on one particular popular technique, Least Significant Bit (LSB) Embedding. Instead of using the LSB-1 of the cover for embedding the message, LSB-2 has been used to increase the robustness of system. and protect the message against the external influences such as noise, filter, compression…etc.[Using SBR Algo].

For more protection to the message bits a Stego-Key has been used to permute the message bits before embedding it. An experimental result of the modified method shows that this paper helps to successfully hide the secret data into the image file with minimum distortion made to the image file.
CITED BY (1)  
1 Racheal, B. O., & Adeosun, O. O. (2016). Employing The Use of Steganography for The Secured Transmission of Information In Mobile Devices.
1 Google Scholar 
2 CiteSeerX 
3 refSeek 
4 Scribd 
5 SlideShare 
6 PdfSR 
A.E.Mustafa, A A. M.Elgamal, M.E.Elami, Ahmad bd, ”A proposed Algorithm For Steganography in Digital image Based On LSB”Research Journal Specific Education Faculty of specific Education, MansouraUniversity, Issue no. 21, April. 2011.
Ajanthaa lakkshmann, Puja u.dharia, Fairy Gandhi, An adaptive image steganography technique using LSB and MSB international research journals V3, n1, 2013, ISSN 1839-6518.
Alain, C. Brainos, A Study of Steganography and the Art of Hiding Information, East Carolina university.
Alain, C. Brainos, A Study Of Steganography And The Art Of Hiding Information, East Carolina University.
Amirthanjan, R.Akila, R & Deepika chowdavarapu,a Comparative Analysis of Image steganography’, 2010.
Bandyopadhyay, S.K., 2010. An Alternative Approach of Steganography Using Reference Image.international Journal of Advancements in Technology, 1(1), pp.05-11.
Christopher, T. (2007): Compression Aided feature Based steganalysis of Perturbed Quantization steganography in Jpeg image, M.Sc. s, Department of science in Electrical and Computer Engineering, University of Delaware.
Desoky, A. (2009):A novel Noiseless Steganography paradigm, Ph.D., Department of Computer Science and electrical engineering, Faculty of the Graduate School, university of Maryland, Baltimore County.
Hengfu, Y., Xingming S., Guang S(2009): A High- capacity Image Data Hiding Scheme Using adaptive LSB substitution, Journal of radio engineering, vOL. (18), NO. (4).
J.L.Dugelay and S.Roche, “Information Hiding: Techniques for Steganography and Digital Watermarking”, S.Katzenbeisser and F.A.P.Petitcolas (eds.), Norwood, MA: Artech House, pp. 121-148.
Jain, Sachin Mesh ram, Shikha Dubey, Image Steganography Using LSB and Edge detection Technique”, International Journal of Soft Computing and Engineering (IJSCE)ISSN: 2231- 2307, Volume-2, Issue-3, July 2012.
Johnson, N.F. & Jajodia, S., “Exploring Steganography: Seeing the Unseen”, Computer Journal, February 1998.
Johnson, N.F. & Jajodia, S., “Exploring Steganography: Seeing the Unseen”, Computer Journal, February 1998.
Kaur, R. Dhir, & G. Sikka. (2009). A new image steganography based on first component alteration technique. International Journal of Computer Science and Information Security(IJCSIS), 6, 53-56.
Kaushal M. Solanki, 2005, Multimedia Data Hiding: From fundamental Issues to Practical Techniques, PhD, electrical and Computer Engineering, university of california, Santa Barbara.
Lee, L.(2004) :LSB Steganography :Information within Information, Journal of Computer Science, Vol (265), N(5).
Petit colas, Fabien A.P., “Information Hiding: Techniques for Steganography and Digital Watermarking.”, 2000.
Robert Krenn, “ Steganography and steganalysis”, Internet Publication, March 2004.
Samer, A.(2006):A New Algorithm for Hiding Gray Images using Blocks, Information ,Security Journal, The hashemite University, Jordan, Volume (15), Issue (6).
Sanjeev, M.et.al (2008): Customized and Secure Image Steganography, Journal of Signal Processing, Vol (1), Issue (1).
TMorkel, JHP Eloff and MS Olivier, "An Overview of Image Steganography," in Proceedings of the Fifth Annual Information Security South Africa Conference (ISSA2005), Sandton,South Africa, June/July 2005.
TMorkel, JHP Eloff and MS Olivier, "An Overview of Image Steganography," in Proceedings of the fifth Annual Information Security South Africa Conference,(ISSA2005), Sandton, South Africa, june/July 2005.
Vijay Kumar Sharma, Vishal Shrivastava’Steganography algorithms for hiding image in image by improved lsb substitution by minimize detection ‘,in Journal of Theoretical and applied Information Technology15th February 2012. Vol. 36 No.1.
Xiang-yang, L. , Dao-shun., Ping, W., Fen-lin, L.( (2008): a review on Blind Detection for Image Steganography, journal of Signal Processing, Vol(88),Issue(9).
Yang, C.-H.: ‘Inverted pattern approach to improve image quality of information hiding by LSB Substitution’, 2008.
Miss Ashwini Palimkar
M.Tech (stud of CSE) Bharati Vidyapeeth University COE Pune, 411043, Maharashtra, India. - India
palimkarashwini@gmail.com
Dr. S.H.Patil
Professor & Head Dept of CSE Bharati Vidyapeeth University COE Pune, 411043 , Maharashtra - India