Image Steganography Using Dynamic LSB with Blowfish Algorithm

  IJCOT-book-cover
 
International Journal of Computer & Organization Trends (IJCOT)          
 
© 2013 by IJCOT Journal
Volume-3 Issue-4                           
Year of Publication : 2013
Authors :Aishwary Kulshreshta , Ankur Goyal

MLA

Aishwary Kulshreshta , Ankur Goyal . "Image Steganography Using Dynamic LSB with Blowfish Algorithm" . International Journal of Computer & organization Trends (IJCOT), V3(4):11-14 Jul - Aug 2013, ISSN 2249-2593, www.ijcotjournal.org. Published by Seventh Sense Research Group.

Abstract—The past few years have seen an increasing interest in using images as cover media for Steganography communication. The basic structure of Steganography is made up of three components: cover image, message, and the key. The carrier can be a digital image; it is the object that will carry the hidden message. A key is used to decode/decipher/discover the hidden message. This can be anything from a password, a pattern, a black-code etc. In this paper we propose a new form of Steganography, Which deals with disadvantages of Simple LSB substitution and as well as symmetric cryptography algorithm called Blowfish algorithm.

References-

[1] O. Kurtuldu and N. Arica, "A new steganography method using image layers," in Computer and Information Sciences, 2008. ISCIS '08. 23rd International Symposium on, 2008, pp. 1-4.
[2] Kesslet, Gary C. An Overview of Steganography for the Computer Forensics Examiner, Burlington, 2004
[3] Noohul Basheer Zain Ali, and James M Noras “OPTIMAL DATAPATH DESIGN FOR A CRYPTOGRAPHIC PROCESSOR: THE BLOWFISH ALGORITHM” Malaysian Journal of Computer Science, Vol. 14 No. 1, June 2001.
[4] Canny J., “A Computational Approach to Edge Detection“, IEEE Transactions on pattern analysis and machine intelligence, vol. 8, pp. 679-698, 1986.
[5] Dynamic Pattern Based Image Steganography, P.Thiyagarajan, G.Aghila, V.Prasanna Venkatesan, JOURNAL OF COMPUTING, VOLUME 2, ISSUE 8, AUGUST 2010, ISSN 2151-9617
[6] Steganography An Art of Hiding Data Shashikala Channalli et al International Journal on Computer Science and Engineering Vol.1(3), 2009, 137-141
[7] Mohammad Tanvir Parvez, Adnan Abdul-Aziz Gutub, "RGB Intensity Based Variable-Bits Image Steganography," apscc, pp.1322-1327, 2008 IEEE Asia-Pacific Services Computing Conference, 2008
[8] Provos N, Honeyman P, Hide And Seek: An Introduction To Steganography, IEEE Security & Privacy Magazine 1 (2008) pp. 32-44

Keywords— Steganography, Blowfish, Dynamic LSB, Canny Edge Detection.