SOME INVESTIGATIONS ON STEGANOGRAPHY TECHNIQUES

Download or Read eBook SOME INVESTIGATIONS ON STEGANOGRAPHY TECHNIQUES PDF written by Dr. V. Nagaraj and published by V. Nagaraj. This book was released on 2021-05-20 with total page 229 pages. Available in PDF, EPUB and Kindle.
SOME INVESTIGATIONS ON STEGANOGRAPHY TECHNIQUES
Author :
Publisher : V. Nagaraj
Total Pages : 229
Release :
ISBN-10 : 9789354264542
ISBN-13 : 9354264549
Rating : 4/5 (42 Downloads)

Book Synopsis SOME INVESTIGATIONS ON STEGANOGRAPHY TECHNIQUES by : Dr. V. Nagaraj

Book excerpt: Steganography is the art of hiding and transmitting data through apparently innocuous carriers in an effort to conceal the existence of the secret data. The Least Significant Bit (LSB) steganography that replaces the least significant bits of the host medium is a widely used technique with low computational complexity and high insertion capacity. Although it has good perceptual transparency, it is vulnerable to steganalysis which is based on statistical analysis. Many other steganography algorithms have been developed such as Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT) and Spread Spectrum Embedding. But the insertion capacities for all the above methods were not satisfied. Therefore, developing new steganography algorithms against statistical analysis seems to be the prime requirement in steganography. The LSB insertion method is the most common and easiest method for embedding messages in an image with high capacity. However, it is detectable by statistical analysis such as RS and Chisquare analysis. Hence, researchers are still in look out for steganography techniques with enhanced insertion capacity of secret data along with greater security and which can resist attacks. In this work, in order to enhance the embedding capacity of secret data four techniques for secret communication have been proposed. They are classified into two categories. In first category, cryptography is used along with steganography to enhance the security, while in second category only steganography is used. In the first category, two improved LSB substitution techniques have been proposed. The first technique is known as Zigzag Modulo Substitution Method in which embedding locations are Sequence based. The second technique is known as Random Modulo Substitution Method using Random Technique in LSB Steganography and user key based LSB substitution steganography for RGB images where in, RSA algorithm is used for encryption. The techniques under the first category are exclusively LSB array based. The first LSB array based technique embeds message bits into LSB arrays of cover image by using zigzag scanning. On the other hand the Random Modulo Substitution Method embeds secret data into the different locations of cover image by using pseudo random index generator. Moreover, both these LSB array based techniques use RSA algorithm to enhance security. Histogram and Statistical analysis performed on the stego image proved that the proposed techniques can effectively resist steganalysis. Comparison of the statistical parameters like Root Mean Square (RMS), Peak Signal to Noise Ratio (PSNR) and Structural Similarity Index Matrix (SSIM) for the proposed techniques with cover image and stego image was carried out and analyzed. The Second category includes pixel value modification method and pixel value differencing method in which the embedding decision for a target pixel is taken by random technique. Data hiding by using pixel value modification with modulus function in color images guarantees that no pixel value will exceed the range 0 to 255 in stego image. In the existing PVD embedding methods, only one secret digit was embedded for two consecutive pixels, but the proposed method embeds one secret digit in only one pixel. Proposed method on color images gives more capacity and security than the PVD methods. It also provides better visual quality of stego image. Moreover, proposed method extracts the hidden secret message efficiently without using the range tables. In existing steganography algorithms like Pixel Value Differencing (PVD) methods, the secret data are embedded into the differences of adjacent pixels. This pair wise modification mechanism in cover image increases the histogram distortion.


SOME INVESTIGATIONS ON STEGANOGRAPHY TECHNIQUES Related Books

SOME INVESTIGATIONS ON STEGANOGRAPHY TECHNIQUES
Language: en
Pages: 229
Authors: Dr. V. Nagaraj
Categories: Computers
Type: BOOK - Published: 2021-05-20 - Publisher: V. Nagaraj

DOWNLOAD EBOOK

Steganography is the art of hiding and transmitting data through apparently innocuous carriers in an effort to conceal the existence of the secret data. The Lea
Data Hiding Techniques in Windows OS
Language: en
Pages: 326
Authors: Nihad Ahmad Hassan
Categories: Computers
Type: BOOK - Published: 2016-09-08 - Publisher: Syngress

DOWNLOAD EBOOK

- "This unique book delves down into the capabilities of hiding and obscuring data object within the Windows Operating System. However, one of the most noticeab
Investigator's Guide to Steganography
Language: en
Pages: 240
Authors: Gregory Kipper
Categories: Computers
Type: BOOK - Published: 2003-10-27 - Publisher: CRC Press

DOWNLOAD EBOOK

Investigators within the law enforcement and cyber forensics communities are generally aware of the concept of steganography, but their levels of expertise vary
Data Hiding
Language: en
Pages: 269
Authors: Michael T. Raggo
Categories: Computers
Type: BOOK - Published: 2012-12-31 - Publisher: Newnes

DOWNLOAD EBOOK

As data hiding detection and forensic techniques have matured, people are creating more advanced stealth methods for spying, corporate espionage, terrorism, and
Information Hiding
Language: en
Pages: 438
Authors: Fabien A. P. Petitcolas
Categories: Business & Economics
Type: BOOK - Published: 2003-01-21 - Publisher: Springer Science & Business Media

DOWNLOAD EBOOK

This book constitutes the thoroughly refereed post-proceedings of the 5th International Workshop on Information Hiding, IH 2002, held in Noordwijkerhout, The Ne