A Steganographic Approach Using New Pixel Selection Combined With Hash Function for Secure Data Transmission in e-Banking
DOI:
https://doi.org/10.26438/ijcse/v6i8.379385Keywords:
LSB, middle region, Cryptography, Image Steganography, e-BankingAbstract
A new pixel selection technique has been introduced where data embedding starts from middle region (one or more than one pixel) of the image. Successively, diagonal pixels of middle region are selected for further embedding the data. The diagonal pixels form a quadrilateral where data are embedded through four edges of quadrilateral with clockwise manner. A hash based method is also initiated for embedding the data into the pixel of an image taking one bit position out of four LSB bits where one bit of secret data is embedded. We propose a variable hash key function for the selection of bit position so that intruder cannot guess the actual bit position of secret information easily. Our proposed method has achieved good PSNR and high capacity of secret information compared to different pixel value differencing method (PVD).
References
[1] Behrouz A. Forouzan , “Data Communication and Networking “,MacGraw Hill Education ( India) Private Limited.
[2] N. Provos, P. Honeyman, “Hide and Seek: An Introduction to Steganography”, IEEE Security and Privacy, Vol. 1, No. 3, pp. 32–44,2003 .
[3] A. Kumar ,K. M. Pooja , “Steganography a Data Hiding Technique” , International Journal of Computer Applications, Vol-9,No-7,Nov 2010.
[4] W. bender, D. Gruhl, N. Morimoto, A.Lu, “Techniques for data hiding”, IBM Systems Journal Vol. 35(3-4),pp. 313-336, 1996.
[5] A. Sarkar, S.Karforma, “ A new pixel selection Technique of LSB based steganography for data hiding”,IJRCS, Vol-5,Issue-3,pp.12-125,March 2018.
[6] D.C. Wu, and W.H. Tsai, “A Steganographic method for images by pixel-value differencing”, Pattern Recognition Letters, Vol. 24, pp. 1613-1626, 2003.
[7] J. K. Mandal ,D. Das, “Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain”, International Journal of Information Sciences and Techniques (IJIST) Vol.2, No.4, July 2012.
[8] H.C. Wu, N.I. Wu, C.S. Tsai , M.S. Hwang, “Image Steganographic Scheme Based on Pixel Value Differencing and LSB Replacement Method”, IEEE Proceedings on Vision, Image and Signal processing, Vol. 152, No. 5,pp. 611-615, 2005.
[9] G.R. Manjula ,A. Danti “A novel hash based LSB (2-3-3) image steganography in spatial domain”, International Journal of Security, Privacy and Trust Management (IJSPTM) Vol. 4, No 1, February 2015 .
[10] P. Bharti ,R. Soni, “ A new approach of data hiding in images using cryptography and Steganography”,IJOCA,vol. 58,no. 8,Nov 2012.
[11] Ali Akbar Nikoukar, “An Image Steganography Method with High Hiding Capacity Based on RGB Image”, International Journal of Signal and Image Processing, Vol. 1,Issue.4, pp. 238-241,2010.
[12] Ran Zan Wang, Chi Fang Lib, Ja Chen Lin, “Image hiding by optimal LSB substitution and Genetic algorithm”, Pattern Recognition Society. Published by Elsevier Science Ltd., pp.671-683, 2001.
[13] N. Kaur, A .Garg, “Steganography Using PSO Based Hybrid Algorithm”, International Journal of Advanced Research in Computer Science and Software Engineering,Vol-4,Issue.1,Nov 2014.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
