Open Access Open Access  Restricted Access Subscription or Fee Access

An Improved Image Steganography Technique using Modified Data Image

Akash Modi, Manu Bansal

Abstract


The science of secret communication is known as steganography. Steganography hides the secret data from unauthorized user. Unlike cryptography, steganography hides the existence of secret information rather than hiding its meaning only. Many different file formats can be use as cover media but these days the digital image based steganography is most popular on internet and web. The capacity of hiding secret data is limited in steganography and it depends on size of the cover image. There is a tradeoff between the stego image quality and the capacity of steganography. Therefore, the quality of stego image and capacity of steganography is still a challenging field. In this paper, a new image steganography technique has been proposed. In this technique the secret data is change into a new format. The new data cannot be decoded without knowing the actual algorithm. In this new data, there is less counts of number of ‘1’ compare to original data, due to this mostly the stego image’s pixel value follows the cover image pixels value after using the XORing method between the cover image and the secret data. The count of number of ‘1’ has been reduced by 20% (nearly) compare to the original data. By using proposed method, not only the security of secret data increases but also it increases the quality of the stego image. The result shows that the proposed method improved the value of PSNR and MSE of the stego image and it fulfills all the aspects of image steganography.

 

Cite this Article
Akash Modi, Manu Bansal. An Improved Image Steganography Technique using Modified Data Image. Journal of Image Processing & Pattern Recognition Progress. 2015; 2(3): 38–47p.


Keywords


Steganography, communication, digital, image, data

Full Text:

PDF

References


Vikas Tyagi, Atul Kumar, Roshan Patel, et al. Image steganography using least significant bit with cryptography. Journal of Global Research in Computer Science. 2012; 3(3): 53–55p.

Bassam Jamil Mohd, Saed Abed, Thaier Al-Hayajneh. FPGA hardware of the lsb steganography method. IEEE Potentials. 2012; 1–4p.

Anderson R, Petitcolas F. On the limits of steganography. IEEE Journal of Selected Areas in Communications. 1998; 16(4): 474–481p.

Atallah M Al-Shatnawi. A new method in image steganography with improved image quality. Applied Mathematical Sciences. 2012; 6(79): 3907–3915p.

Himanshu Gupta, Ritesh Kumar, Soni Changlani. Enhanced data hiding capacity using lsb-image steganography method. International Journal of Emerging Technology and Advanced Engineering. 2013; 3: 212–214p.

Samir K Bandyopadhyay, Debnath Bhattacharyya, Debashis Ganguly, et al. A tutorial review on steganography. Heritage Institute of Technology. 2008; 106– 118p.

Youssef Bassil. Image steganography method based on brightness adjustment. Advances in computer Science and its application. 2012; 2(2):

Fangjun Huang. New channel selection rule for jpeg steganography. IEEE Transactions on Information Forensics and Security. 2012; 7(4): 1181–1191p.

Bassam Jamil Mohd, Saed Abed, Thaier Al-Hayajneh. FPGA hardware of the lsb steganography method. IEEE Potentials. 2012; 1–4p.

Souvik Bhattacharyya, Indradip Banerjee, Gautam Sanyal. A survey of steganography and steganalysis technique in image, text, audio, and video as cover carrier. Journal of Global Research in Computer Science. 2011; 2(4): 1–16p.

Mohammed Salem Atoum. A steganography method based on hiding secrete data in MPEG/Audio layer III. IJCSNS International Journal of Computer Science and Network Security. 2011; 11(5).

Weiqi Luo, Fangjun Huang, Jiwu Huang. Edge adaptive image steganography based on lsb matching revisited. IEEE Transactions on Information Forensics and Security. 2010; 5(2): 201–214p.

Arvind Kumar, Km Pooja. Steganography-A hiding technique. International Journal of Computer Application. 2010; 9(7): 19–23p.

Abbas Cheddad, Joan Condell, Kevin Curran, et al. Digital image steganography: Survey and analysis of current methods. Elsevier Journal of Signal Processing. 2010; 90: 727–752p.

Ozdemir Cetin, Turan Ozcerit A. A new steganography algorithm based on color histograms for data embedding into raw video streams. Computers & Security. 2009; 28(7): 670–682p.

Leung HY, Cheng LM, Cheng LL, et al. Hardware realization of steganographic techniques. Intelligent Information Hiding and Multimedia Signal Processing, Third International Conference on IIHMSP. 2007; 1: 279- 282p.

Ran-Zan Wang, Chi-Fang Lin, Ja-Chen Lin. Hiding data in images by optimal moderately significant-bit replacement. IEE Electron. Lett. 2000; 36(25): 2069– 2070p.

Chi-Kwong Chan, Cheng LM. Hiding data in images by simple LSB substitution. Department of Computer Engineering and Information Technology, City University of Hong Kong, Hong-Kong; 2002.


Refbacks

  • There are currently no refbacks.


This site has been shifted to https://stmcomputers.stmjournals.com/