Data Hiding in Image by Optimal Random Substitution

Authors

  • Nisha CSE, MDU Rohtak, India
  • Kusum CSE, MDU Rohtak, India

Keywords:

Steganography, Spatial Domain, Transform Domain

Abstract

The importance of reducing a chance of the Information being detected during the transmission is being an issue now days. Some solution to be discussed is how to pass information in a manner that the very existence of the message is unknown in order to repel attention of the potential attacker. Steganography comes from Greek and literally means ‘Covered writing’. Steganography is closely related to hidden channel scheme. It is the art and science of writing of hidden message in such a way that no one apart of intended recipients knows the existence of message. Steganography is often confused with cryptography because the two are almost similar in the way that they both are used to protect confidential information. The difference between the two is in the appearance in the processed output; the output of steganography operation is not apparently visible but in cryptography the output is scrambled so that it can draw attention. Applications of both are in the field of communication system, Steganography coding inside transport layer such as an MP3 file and in the defence system.

References

YambemJinaChanu, Themrichon Tuithung, Kh. Manglem Singh “short survey on image steganography and steganalysis techniques” ,978-1-4577-0748-3/ 2012 IEEE.

GeHuayong , Huang Mingsheng, Wang Qian, “Steganography and steganalysis based on digital images “978-1-4244-9306-7 2011IEEE conference on image and signal processing.

Vijay Kumar,Dinesh Kumar, “Performance evaluation of DWT based image steganography” 223-228 ,2010 IEEE 2nd international advance computing conference .

R.Amrittharajan,Sandeepkumarbehera,AbhilashSwarup, ”Colour guided colour image steganography “ universal journal of computer science and engineering technology 16-23,oct. 2010

Prabakran.G, Bhavani.R “ A modified secure digital image steganography based on discrete wavelet transform”, 1096-1100, 2012 IEEE

Chi-Kwong Chan∗, L.M. Cheng “Hiding data in image by simple LSb substitution”, the journal of the pattern recognition society, pattern recognition 37(2004) 469-474

R.Amritharajan,r.akila,P.Deepikachowdavarapu,”A comparative analysis of image Steganography” international journal of computal applications (0975-8887) ,volume 2-No.3,May-2010.

W.Bender,D.Garhul,N.Morimoto,A.Lu,” Techniques for data hiding” IBM System journal VOL.35,NOS 3&4,199

Hide and seek: An introduction to steganography, 1540- 7993,2003 IEEE security and privacy

SANS institute infosec reading room :steganography : past, present ,future

MiroslavDobsicek :Modern Steagnography

Downloads

Published

2014-06-30

How to Cite

[1]
Nisha and Kusum, “Data Hiding in Image by Optimal Random Substitution”, Int. J. Comp. Sci. Eng., vol. 2, no. 6, pp. 22–24, Jun. 2014.

Issue

Section

Research Article