An advanced approach for Image Steganography Method

  IJCOT-book-cover
 
International Journal of Computer & Organization Trends  (IJCOT)          
 
© 2019 by IJCOT Journal
Volume - 9 Issue - 4
Year of Publication : 2019
Authors :  Yogesh Kumar Sharma, Amit Mishra , Amit Sharma
DOI : 10.14445/22492593/IJCOT-V9I4P301

Citation

MLA Style:Yogesh Kumar Sharma, Amit Mishra , Amit Sharma "An advanced approach for Image Steganography Method" International Journal of Computer and Organization Trends 9.4 (2019): 1-4.

APA Style:Yogesh Kumar Sharma, Amit Mishra , Amit Sharma (2019). An advanced approach for Image Steganography Method. International Journal of Computer and Organization Trends, 9(4), 1-4.

Abstract

Due to the unprecedented growth of network bandwidth, the Internet has become a quite popular channel for transmitting various data, such as, audio, video, image and text, in digital form. In this paper, we present a novel steganographic method that can be used to increase reliability of transmitted secret data in network. The core concept of proposed method is the use of cryptography with steganography technique. Lots of contents of the secret data are represented by cover image, which enhance invisibility and robustness. A mass of experiments demonstrate that our method has high hiding capacity, good imperceptibility, and certain robustness to some common attacks. These advantages assure the effectiveness of network transmission.

References

[1] The Twofish Team‘s Final Comments on AES SelectionBruce Schneier. John Kelseyy Doug WhitingzDavid Wagnerx Chris Hall{ Niels FergusonkTadayoshi Kohno.. Mike StayyyMay 15, 2000
[2] Active Canny: Edge Detection and Recovery with Open Active Contour Models Muhammet Bastan, S. Saqib Bukhari, Thomas M. Breuel IET Image Processing
[3] EFFICIENT IMAGE CONTOUR DETECTION USING EDGE PRIORJiangping Wang1, Changhu Wang2, and Thomas Huang1 1Beckman Institute, University of Illinois at Urbana-Champaign, USA 2Microsoft Research Asia, Beijing, China{jwang63,huang}@ifp.uiuc.edu, This email address is being protected from spambots. You need JavaScript enabled to view it.
[4] Ghazanfari, K.; Ghaemmaghami, S.; KhosraviS.R.?LSB++: An improvement to LSB+ steganography TENCON 2011 - IEEE Region 10 Conference Pp. 364 – 368, 2011.
[5] P. Kruus, C ?A survey of steganography image files.? Advanced Security Research Journal.[On line], 5(1), pp. 41-52. 2011.
[6] Lenti J.: Steganographic Methods. Periodica Polytechnica Ser. El. Eng. 44(3-4), 249-258 2000.
[7] Shirali Shahreza, M.: An Improved Method for Steganography on Mobile Phone. In: Sandberg, I.W. (ed.) Proceedings of the 9th WSEAS International Conference on Systems. ICS 2005, World Scientific and Engineering Academy and Society (WSEAS 2005.
[8] Shirali Shahreza, M.: Steganography in MMS. In: Proceedings of the 1 1th IEEE International Multitopic Conference, Lahore. Pakistan. December 28-30, 2007.
[9] Dhanashri, D., Patil Babaso, S., Patil Shubhangi, H.: Mms Steganography For Smartphone Devices. In: Proceeding of 2nd International Conference on Computer Engineering and Technology, Jodhpur, India, November 13-14, vol. 4, pp. V4-513—V4-516, 2010.
[10] Kermani, Z.Z., Jamzad, M.: A Robust Steganography Algorithm Based on Texture Similarity Using Gabor Filter. In: IEEE Symposium on Signal processing and Information Technology, pp. 578-582, 2005.
[11] Sajedi, M.: Cover Selection Steganography Method Based on Similarity of Image Blocks. In: IEEE CIT, Sydney, Australia 2008.
[12] Kharrazi, M., Sencar, H., Memon, N.: Cover Selection for Steganographic Embedding. In: ICIP. pp. 117-121, 2006

Keywords
Steganography, TwoFish, Adaptive LSB using Active Canny Edge Detection and open contours