Call for Papers - Ongoing round of submission, notification and publication.
    
  
Home    |    Login or Register    |    Contact CSC
By Title/Keywords/Abstract   By Author
Browse CSC-OpenAccess Library.
  • HOME
  • LIST OF JOURNALS
  • AUTHORS
  • EDITORS & REVIEWERS
  • LIBRARIANS & BOOK SELLERS
  • PARTNERSHIP & COLLABORATION
Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available
(no registration required)

(345.18KB)


-- CSC-OpenAccess Policy
-- Creative Commons Attribution NonCommercial 4.0 International License
>> COMPLETE LIST OF JOURNALS

EXPLORE PUBLICATIONS BY COUNTRIES

EUROPE
MIDDLE EAST
ASIA
AFRICA
.............................
United States of America
United Kingdom
Canada
Australia
Italy
France
Brazil
Germany
Malaysia
Turkey
China
Taiwan
Japan
Saudi Arabia
Jordan
Egypt
United Arab Emirates
India
Nigeria
Using SBR Algorithm To Hide The Data Into The JPEG Image
Ashwini Palimkar, S.H.Patil
Pages - 15 - 23     |    Revised - 31-03-2014     |    Published - 30-04-2014
Published in International Journal of Security (IJS)
Volume - 8   Issue - 2    |    Publication Date - April 2014  Table of Contents
MORE INFORMATION
References   |   Cited By (1)   |   Abstracting & Indexing
KEYWORDS
Steganography, Data Hiding, Embedding Data, SBR Algo, Least Significant Bit.
ABSTRACT
Data hiding is the art of hiding data for various purposes such as--- to maintain private data, secure confidential data. Well known technique is the Steganography; Steganography has evolved into a digital strategy of hiding a file in some form of multimedia, such as an image, an audio file or even a video file. This paper presents a new Steganography technique in spatial domain for encoding extra information in an image by making small modifications to its pixels. The proposed method focuses on one particular popular technique, Least Significant Bit (LSB) Embedding. Instead of using the LSB-1 of the cover for embedding the message, LSB-2 has been used to increase the robustness of system. and protect the message against the external influences such as noise, filter, compression…etc.[Using SBR Algo].

For more protection to the message bits a Stego-Key has been used to permute the message bits before embedding it. An experimental result of the modified method shows that this paper helps to successfully hide the secret data into the image file with minimum distortion made to the image file.
CITED BY (1)  
1 Racheal, B. O., & Adeosun, O. O. (2016). Employing The Use of Steganography for The Secured Transmission of Information In Mobile Devices.
ABSTRACTING & INDEXING
1 Google Scholar 
2 CiteSeerX 
3 refSeek 
4 Scribd 
5 SlideShare 
6 PdfSR 
REFERENCES
A.E.Mustafa, A A. M.Elgamal, M.E.Elami, Ahmad bd, ”A proposed Algorithm For Steganography in Digital image Based On LSB”Research Journal Specific Education Faculty of specific Education, MansouraUniversity, Issue no. 21, April. 2011.
Ajanthaa lakkshmann, Puja u.dharia, Fairy Gandhi, An adaptive image steganography technique using LSB and MSB international research journals V3, n1, 2013, ISSN 1839-6518.
Alain, C. Brainos, A Study of Steganography and the Art of Hiding Information, East Carolina university.
Alain, C. Brainos, A Study Of Steganography And The Art Of Hiding Information, East Carolina University.
Amirthanjan, R.Akila, R & Deepika chowdavarapu,a Comparative Analysis of Image steganography’, 2010.
Bandyopadhyay, S.K., 2010. An Alternative Approach of Steganography Using Reference Image.international Journal of Advancements in Technology, 1(1), pp.05-11.
Christopher, T. (2007): Compression Aided feature Based steganalysis of Perturbed Quantization steganography in Jpeg image, M.Sc. s, Department of science in Electrical and Computer Engineering, University of Delaware.
Desoky, A. (2009):A novel Noiseless Steganography paradigm, Ph.D., Department of Computer Science and electrical engineering, Faculty of the Graduate School, university of Maryland, Baltimore County.
Hengfu, Y., Xingming S., Guang S(2009): A High- capacity Image Data Hiding Scheme Using adaptive LSB substitution, Journal of radio engineering, vOL. (18), NO. (4).
J.L.Dugelay and S.Roche, “Information Hiding: Techniques for Steganography and Digital Watermarking”, S.Katzenbeisser and F.A.P.Petitcolas (eds.), Norwood, MA: Artech House, pp. 121-148.
Jain, Sachin Mesh ram, Shikha Dubey, Image Steganography Using LSB and Edge detection Technique”, International Journal of Soft Computing and Engineering (IJSCE)ISSN: 2231- 2307, Volume-2, Issue-3, July 2012.
Johnson, N.F. & Jajodia, S., “Exploring Steganography: Seeing the Unseen”, Computer Journal, February 1998.
Johnson, N.F. & Jajodia, S., “Exploring Steganography: Seeing the Unseen”, Computer Journal, February 1998.
Kaur, R. Dhir, & G. Sikka. (2009). A new image steganography based on first component alteration technique. International Journal of Computer Science and Information Security(IJCSIS), 6, 53-56.
Kaushal M. Solanki, 2005, Multimedia Data Hiding: From fundamental Issues to Practical Techniques, PhD, electrical and Computer Engineering, university of california, Santa Barbara.
Lee, L.(2004) :LSB Steganography :Information within Information, Journal of Computer Science, Vol (265), N(5).
Petit colas, Fabien A.P., “Information Hiding: Techniques for Steganography and Digital Watermarking.”, 2000.
Robert Krenn, “ Steganography and steganalysis”, Internet Publication, March 2004.
Samer, A.(2006):A New Algorithm for Hiding Gray Images using Blocks, Information ,Security Journal, The hashemite University, Jordan, Volume (15), Issue (6).
Sanjeev, M.et.al (2008): Customized and Secure Image Steganography, Journal of Signal Processing, Vol (1), Issue (1).
TMorkel, JHP Eloff and MS Olivier, "An Overview of Image Steganography," in Proceedings of the Fifth Annual Information Security South Africa Conference (ISSA2005), Sandton,South Africa, June/July 2005.
TMorkel, JHP Eloff and MS Olivier, "An Overview of Image Steganography," in Proceedings of the fifth Annual Information Security South Africa Conference,(ISSA2005), Sandton, South Africa, june/July 2005.
Vijay Kumar Sharma, Vishal Shrivastava’Steganography algorithms for hiding image in image by improved lsb substitution by minimize detection ‘,in Journal of Theoretical and applied Information Technology15th February 2012. Vol. 36 No.1.
Xiang-yang, L. , Dao-shun., Ping, W., Fen-lin, L.( (2008): a review on Blind Detection for Image Steganography, journal of Signal Processing, Vol(88),Issue(9).
Yang, C.-H.: ‘Inverted pattern approach to improve image quality of information hiding by LSB Substitution’, 2008.
MANUSCRIPT AUTHORS
Miss Ashwini Palimkar
M.Tech (stud of CSE) Bharati Vidyapeeth University COE Pune, 411043, Maharashtra, India. - India
palimkarashwini@gmail.com
Dr. S.H.Patil
Professor & Head Dept of CSE Bharati Vidyapeeth University COE Pune, 411043 , Maharashtra - India


CREATE AUTHOR ACCOUNT
 
LAUNCH YOUR SPECIAL ISSUE
View all special issues >>
 
PUBLICATION VIDEOS
 
You can contact us anytime since we have 24 x 7 support.
Join Us|List of Journals|
    
Copyrights © 2025 Computer Science Journals (CSC Journals). All rights reserved. Privacy Policy | Terms of Conditions