Total views : 128

Secure Data Transmission through Color Images using PHLSB Method

Affiliations

  • Jain University, Bengaluru - 560069, Karnataka, India
  • Department of Electronics and Communication Engineering, KEC, Kuppam - 517425, Andhra Pradesh, India
  • Department of Electronics and Communication Engineering, MITS, Madanapalli - 517325, Andhra Pradesh, India

Abstract


Steganography is knowledge of embedding the secrete information inside the host medium. Due to less security and embedding efficiency, some steganography algorithms can be effortlessly distinguished by steganalytical detectors. A secure data embedding scheme Polynomial based Hash Least Significant Bit (PHLSB) method is developed. Polynomial equations are powerful mathematical tool. These equations were used as secret key for hiding data in the cover object. The tentative results prove that the proposed method accomplishes high embedding capacity, less perceptual transparency. The PSNR and SC of stego object have good values, almost similar to the original object.

Keywords

Steganography is knowledge of embedding the secrete information inside the host medium. Due to less security and embedding efficiency, some steganography algorithms can be effortlessly distinguished by steganalytical detectors. A secure data embedding scheme Polynomial based Hash Least Significant Bit (PHLSB) method is developed. Polynomial equations are powerful mathematical tool. These equations were used as secret key for hiding data in the cover object. The tentative results prove that the proposed method accomplishes high embedding capacity, less perceptual transparency. The PSNR and SC of stego object have good values, almost similar to the original object.

Full Text:

 |  (PDF views: 123)

References


  • Mstafa RJ, Elleithy KM. A highly secure video steganography using Hamming code. IEEE Long Island Systems, Applications and Technology Conference (LISAT); 2014. p. 1– 6.
  • Liu B, Yang C, Liu F, Sun Y. Secure steganography in compressed video bitstreams. IEEE 3rd International Conference on Availability, Reliability and Security ARES 08; 2008. p. 1382–87.
  • Yadav P, Sharma S, Mishra N. A secure video steganography with encryption based on LSB technique. IEEE International Conference on Computational Intelligence and Computing Research (ICCIC); 2013. p. 1–5.
  • Idbeaa TF, Samad SA, Husain H. Comparative analysis of steganographic algorithms within compressed video domain. IEEE International Conference on Signal Processing and Communication Systems (ICSPCS); 2014. p. 1–7.
  • Yun C, Zhang H, Zhao X, Yu H. Covert communication by compressed videos exploiting the uncertainty of motion estimation. IEEE Communications Letters. 2015 Feb; 19(2):203–6.
  • Bugár G, Bánoci V, Broda M, Levický D, Dupák D. Data hiding in still images based on blind algorithm of steganography. IEEE International Conference on Radioelektronika (RADIOELEKTRONIKA); 2014. p. 1–4.
  • Patel K, Rora KK, Singh K, Verma S. Lazy wavelet transform based steganography in video. IEEE International Conference on Communication Systems and Network Technologies; 2013. p. 497–500.
  • Yang H, Sun G, Sun X. A high capacity image data hiding scheme using adaptive LSB substitution. Radio Engineering. 2009 Dec; 18(4).
  • Holub V, Fridrich J. Low-complexity features for JPEG steganalysis using undecimated DCT. IEEE Transactions on Information Forensics and Security. 2015 Feb; 10(2):219–28.
  • Shivani K, Paramjeet K. Secure data hiding technique using video steganography and watermarking. International Journal of Computer Applications. 2014 Jun; 95(20).
  • Sharma V, Kumar S. A new approach to hide text in images using steganography. International Journal of Advanced Research in Computer Science and Software Engineering. 2013 Apr; 3(4).
  • Kumar A, Sharma R. A secure image steganography based on RSA algorithm and hash-LSB Technique. International Journal of Advanced Research in Computer Science and Software Engineering. 2013 Apr; 3(7).
  • Wu, H-C, Wu N-I, Tsai C-S, Hwang M-S. Image steganographic scheme based on pixel-value differencing and LSB replacement method. IEEE Procedings-Vision, Image and Signal Processing. 2005; 152(5):611–5.
  • Provos N, Honeyman P. Hide and seek: An introduction to steganography. IEEE Security and Privacy. 2003; 32–44.
  • Swathi A, Jilani SAK. Video steganography by LSB substitution using different polynomial equations. International Journal of Computational Engineering Research. 2012 Sep; 2(5).
  • Xu C, Ping X, Zhang T. Steganography in compressed video stream. Proceeding of the 1st International Conference on Innovative Computing, Information and Control (ICICIC’06); 2006.
  • Wang Y, Izquierdo E. High-capacity data hiding in MPEG-2 compressed video. 9th International Workshop on Systems, Signals and Image Processing; UK. 2002.

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.