A Secure Cyclic Steganographic Technique for Color Images using Randomization
نویسندگان
چکیده
There are five different types of steganography based on the carrier object that is used for embedding the secret information. The carrier object may be images, text, videos, audios or network protocol packets. If the image is used as a carrier, it is called image steganography. Similarly if video is used for hiding secret messages, we call it video steganography and so on[1, 5]. The diagrammatic representation of different types of steganography is shown in Fig. 1.The types of steganography are: a. Audio Steganography b. Image Steganography c. Video Steganography d. Text Steganography e. Network Steganography Fig. 1. Types of Steganography w.r.t carrier object 1.2 Types of Steganography w.r.t Key Exchange To make the steganographic algorithm more robust against different fraudulent behaviors, the idea of using secret key and public key was introduced. When secret key and public keys are used in steganography, a mechanism should be there via which these keys can be securely exchanged. Usually one or two keys are used in the process of steganography; public key that is used to embed secret information into the carrier object and secret or private key that has a mathematical relationship with public key and is used for extraction of secret data from stego object [6]. On the basis of exchange of keys, there are three types of steganography as shown in Fig. 2. 57 Abstract-Information Security is a major concern in today's modern era. Almost all the communicating bodies want the security, confidentiality and integrity of their personal data. But this security goal cannot be achieved easily when we are using an open network like Internet. Steganography provides one of the best solutions to this problem. This paper represents a new Cyclic Steganographic Technique (CST) based on Least Significant Bit (LSB) for true color (RGB) images. The proposed method hides the secret data in the LSBs of cover image pixels in a randomized cyclic manner. The proposed technique is evaluated using both subjective and objective analysis using histograms changeability, Peak Signal-to-Noise Ratio (PSNR) and Mean Square Error (MSE). Experimentally it is found that the proposed method gives promising results in terms of security, imperceptibility and robustness as compared to some existent methods and vindicates this new algorithm.
منابع مشابه
Adaptive Data Hiding Approach for True Color Image Using Randomization Technique
In today’s scenario of internet world, hiding data with security is the highly challenging and desirable task. There are large numbers of techniques available which are capable of hiding data in cover media. The purpose of this research work is to develop a novel, secure and high capacity data hiding technique in 24 bit true color image. This novel approach uses pixels of 24 bit true color imag...
متن کاملA Session Based Multiple Image Hiding Technique using Discrete Cosine Transformation
This work proposes a DCT based Steganographic technique for the color image. The true color cover image is decomposed into three separate color planes namely R, G and B. During embedding of secret images into different color planes, images are dispersed among the selected DCT coefficients using a pseudo random sequence and a Session key. Secret images are extracted using the session key and the...
متن کاملA New Steganographic Method for Palette-Based Images
In this paper, we present a new steganographic technique for embedding messages in palette-based images, such as GIF files. The new technique embeds one message bit into one pixel (its pointer to the palette). The pixels for message embedding are chosen randomly using a pseudorandom number generator seeded with a secret key. For each pixel at which one message bit is to be embedded, the palette...
متن کاملA new steganographic method for color and grayscale image hiding
In this paper, we present a steganographic method for embedding a color or a grayscale image in a true color image. Three types of secret images can be carried by the proposed method: hiding a color secret image, hiding a palette-based 256-color secret image, and hiding a grayscale image in a true color image. Secret data are protected by the conventional crypto system DES. We compare the image...
متن کاملTexture based steganalysis: results for color images
Steganographic and watermarking information inserted into a color image file, regardless of embedding algorithm, causes disturbances in the relationships between neighboring pixels. A method for steganalysis utilizing the local binary pattern (LBP) texture operator to examine the pixel texture patterns within neighborhoods across the color planes is presented. Providing the outputs of this simp...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1502.07808 شماره
صفحات -
تاریخ انتشار 2015