International Journal of Computer
& Organization Trends

Research Article | Open Access | Download PDF

Volume 9 | Issue 4 | Year 2019 | Article Id. IJCOT-V9I4P301 | DOI : https://doi.org/10.14445/22492593/IJCOT-V9I4P301

An advanced approach for Image Steganography Method


Yogesh Kumar Sharma, Amit Mishra , Amit Sharma

Citation :

Yogesh Kumar Sharma, Amit Mishra , Amit Sharma, "An advanced approach for Image Steganography Method," International Journal of Computer & Organization Trends (IJCOT), vol. 9, no. 4, pp. 1-4, 2019. Crossref, https://doi.org/10.14445/22492593/IJCOT-V9I4P301

Abstract

Due to the unprecedented growth of network bandwidth, the Internet has become a quite popular channel for transmitting various data, such as, audio, video, image and text, in digital form. In this paper, we present a novel steganographic method that can be used to increase reliability of transmitted secret data in network. The core concept of proposed method is the use of cryptography with steganography technique. Lots of contents of the secret data are represented by cover image, which enhance invisibility and robustness. A mass of experiments demonstrate that our method has high hiding capacity, good imperceptibility, and certain robustness to some common attacks. These advantages assure the effectiveness of network transmission.

Keywords

Steganography, TwoFish, Adaptive LSB using Active Canny Edge Detection and open contours

References

[1] The Twofish Team‘s Final Comments on AES SelectionBruce Schneier. John Kelseyy Doug WhitingzDavid Wagnerx Chris Hall{ Niels FergusonkTadayoshi Kohno.. Mike StayyyMay 15, 2000
[2] Active Canny: Edge Detection and Recovery with Open Active Contour Models Muhammet Bastan, S. Saqib Bukhari, Thomas M. Breuel IET Image Processing
[3] EFFICIENT IMAGE CONTOUR DETECTION USING EDGE PRIORJiangping Wang1, Changhu Wang2, and Thomas Huang1 1Beckman Institute, University of Illinois at Urbana-Champaign, USA 2Microsoft Research Asia, Beijing, China{jwang63,huang}@ifp.uiuc.edu,chw@microsoft.com
[4] Ghazanfari, K.; Ghaemmaghami, S.; KhosraviS.R.?LSB++: An improvement to LSB+ steganography TENCON 2011 - IEEE Region 10 Conference Pp. 364 – 368, 2011.
[5] P. Kruus, C ?A survey of steganography image files.? Advanced Security Research Journal.[On line], 5(1), pp. 41-52. 2011.
[6] Lenti J.: Steganographic Methods. Periodica Polytechnica Ser. El. Eng. 44(3-4), 249-258 2000.
[7] Shirali Shahreza, M.: An Improved Method for Steganography on Mobile Phone. In: Sandberg, I.W. (ed.) Proceedings of the 9th WSEAS International Conference on Systems. ICS 2005, World Scientific and Engineering Academy and Society (WSEAS 2005.
[8] Shirali Shahreza, M.: Steganography in MMS. In: Proceedings of the 1 1th IEEE International Multitopic Conference, Lahore. Pakistan. December 28-30, 2007.
[9] Dhanashri, D., Patil Babaso, S., Patil Shubhangi, H.: Mms Steganography For Smartphone Devices. In: Proceeding of 2nd International Conference on Computer Engineering and Technology, Jodhpur, India, November 13-14, vol. 4, pp. V4-513—V4-516, 2010.
[10] Kermani, Z.Z., Jamzad, M.: A Robust Steganography Algorithm Based on Texture Similarity Using Gabor Filter. In: IEEE Symposium on Signal processing and Information Technology, pp. 578-582, 2005.
[11] Sajedi, M.: Cover Selection Steganography Method Based on Similarity of Image Blocks. In: IEEE CIT, Sydney, Australia 2008.
[12] Kharrazi, M., Sencar, H., Memon, N.: Cover Selection for Steganographic Embedding. In: ICIP. pp. 117-121, 2006