Secret data sharing using steganography and image processing
-
2018-02-05 https://doi.org/10.14419/ijet.v7i1.7.9584 -
Stegnography, Image Processing, Clustering Modification Directions. -
Abstract
Steganography is a technique that helps to hide the secret data inside the digitally covered image. The message to be hidden can be a text,image, speech, video. The proposed method aims to combine the technique of steganography and Image Processing. Cover image helps to carry the secret data in an embedded form which is referred as stego image. This work proposes a new implementation process called clustering modification directions (CMDs). To implement this methodology, several sub images will be created by decomposing the cover image using additive distortion functions. To enhance the security, password protection is also applied for the hidden information to be retrieved.
-
References
[1] S.Hemalatha, D. Acharya, A.Renuka and P. Kamath,†A Secure and High Capacity Image Steganography Techniqueâ€, Signal & Image Processing: An International Journal (SIPIJ) Vol.4, No.1, 2015.
[2] G. Swain and S.K. Lenka,†Steganography using two sided, three sided, and four sided side match methodsâ€, CSI Transaction on ICT,Springer-Verlag, pp.127- 133, 2015.
[3] G. Liu, W. Liu, Y. Dai, and S. Lian, “Adaptive steganography based on syndrome-trellis codes and local complexity,†in Proc. 4th IEEE Int. Conf. Multimedia Inf. Netw. Secur., Nanjing, China, Nov. 2014, pp. 323–327.
[4] V. Holub and J. Fridrich, “Digital image steganography using universal distortion,†in Proc. 1st ACM Workshop Inf. Hiding Multimedia Secur., Montpellier, France, Jun. 2013, pp. 59–68.https://doi.org/10.1145/2482513.2482514.
[5] T. Denemark, J. Fridrich, and V. Holub, “Further study on the security of S-UNIWARD,†Proc. SPIE, Electron. Imag., Media Watermarking, Secure Forensics, vol. 9028, pp. 902805-1–902805-13, Feb. 2013.
[6] B. Li, M. Wang, J. Huang, and X. Li, “A new cost function for spatial image steganography,†in Proc. IEEE Int. Conf. Image Process., Parishttps://doi.org/10.1109/ICIP.2014.7025854.
[7] “Adaptive steganalysis against WOW embedding algorithm,†in Proc. 2nd ACM Workshop Inf. Hiding Multimedia Secur., Salzburg, Austria, Jun. 2012, pp. 91–96.
[8] T. Denemark, V. Sedighi, V. Holub, R. Cogranne, and J. Fridrich, Selection-channel-aware rich model for steganalysis of digital images,†in Proc. IEEE Int. Workshop Inf. Forensic Secur., Atlanta, GA, USA, Dec. 2011, pp. 48–53.
[9] V.Holub, “Content adaptive steganography—Design and detection,†Ph.D. dissertation, Dept. Elect. Comput. Eng., Binghamton Univ., Binghamton, NY, USA, 2011.
[10] G. Liu, W. Liu, Y. Dai, and S. Lian, “Adaptive steganography based on syndrome-trellis codes and local complexity,†in Proc. 4th IEEE Int. Conf. Multimedia Inf. Netw. Secur., Nanjing, China, Nov. 2010.
-
Downloads
-
How to Cite
Bhuvanya, R., Vijayalakshmi, K., Uma, S., & A.Suresh, A. (2018). Secret data sharing using steganography and image processing. International Journal of Engineering & Technology, 7(1.7), 100-104. https://doi.org/10.14419/ijet.v7i1.7.9584Received date: 2018-02-17
Accepted date: 2018-02-17
Published date: 2018-02-05