International Research journal of Management Science and Technology

  ISSN 2250 - 1959 (online) ISSN 2348 - 9367 (Print) New DOI : 10.32804/IRJMST

Impact Factor* - 6.2311


**Need Help in Content editing, Data Analysis.

Research Gateway

Adv For Editing Content

   No of Download : 167    Submit Your Rating     Cite This   Download        Certificate

EFFICIENT APPROACH OF DATA HIDING IN IMAGE USING IMAGE STAGNOGRAPHY WITH DATA COMPRESSION TECHNIQUE

    2 Author(s):  MUKESH GARG , GURDEV JANGRA

Vol -  5, Issue- 1 ,         Page(s) : 67 - 80  (2014 ) DOI : https://doi.org/10.32804/IRJMST

Abstract

Steganography is an art and science of writing hidden message in such a manner that no one apart from the sender & intended recipient even realizes there is a hidden message. It is a technique of invisible communication which hides the existence of the message. If the cover object used is an image, the steganography is known as image steganography. In this paper, we have proposed a data hiding method using the data compression technique and image steganography. This method improves the data hiding capacity of image as compared to existing method. In this method we compress the data by applying Lempel-Ziv-Welch compression technique and applying Kekre algorithm to hide compress data in image.

  1. Moerland, T., “Steganography and Steganalysis”, Leiden Institute of Advanced Computing Science, www.liacs.nl/home/ tmoerl/privtech.pdf
  2. N. Tiwari and M. Shandilya, “Secure RGB Image Steganography from Pixel Indicator to Triple Algorithm-An Incremental Growth”, International Journal of Security and Its Applications Vol. 4(4), Oct. 2010.
  3. H. B. Kekre, A. Athawale, P. N. Halarnkar, “Performance Evaluation of Pixel Value Differencing and Kekre’s Modified Algorithm for Information Hiding in Images”, International Conference on Advances in Computing, Communication and Control, 2009 pp 342-346
  4. Deshpande Neeta, Kamalapur Snehal, ”Implementation of LSB Steganography and Its Evaluation for Various Bits” K.K.Wagh Institute of Engineering Education & Research, Nashik India
  5. Morkel, T., Eloff, J.H.P & Olivier, M.S., "An overview of Image Steganography", Proceedings of the Information Security South Africa (ISSA) Conference, 2005.
  6. H. Yang, X. Sun, G. Sun. “A High-Capacity Image Data Hiding Scheme Using Adaptive LSB Substitution”. Journal: Radio engineering Year: vol. 18, 4 Pages/record No.: 509-516, 2009.
  7. H.C. Wu, N.I Wu, C.S. Tsai and M.S. Hwang, “Image Steganographic scheme based on pixel-value differencing and LSB replacement methods”, VISP(152), No. 5, October 2005
  8. Cheng-Hsing Yang, Chi-Yao Weng, Shiuh-Jeng Wang, Member, IEEE, and Hung-Min Sun, “Adaptive Data Hiding in Edge Areas of Images with Spatial LSB Domain Systems”, IEEE Transactions on Information Forensics and Security, vol. 3, no. pp. 488-497. 3rd September 2008.
  9. H. B. Kekre, Archana Athawale, Pallavi N. Halarnkar, “Performance Evaluation of Pixel Value Differencing and Kekre’s Modified Algorithm for Information Hiding in 88 Images”, International Conference on Advances in Computing, Communication and Control, pp 342-346, 2009.
  10. Chung-Ming Wang, Nan-I Wu, Chwei-Shyong Tsai, Min-Shiang Hwang, “A high quality steganographic method with pixel-value differencing and modulus function”. Journal of Systems and Software, vol. 81, no. 1, p. 150-158, 2008,
  11.  Ki-Hyun Jung, Kyeoung-Ju Ha, Kee-Young Yoo. ”Image data hiding method based on multi-pixel differencing and LSB substitution methods”. In Proc. 2008 International Conference on Convergence and Hybrid Information Technology (ICHIT '08). Daejeon (Korea), Aug. 28-30, p. 355-358, 2008.
  12. Hamid, A. M., M. L. M. Kiah, et al. (2009). "Novel Approach for High Secure and High Rate Data Hidden in the Image Using Image Texture Analysis" Internationa  Journal of Engineering and Technology (IJET).
  13. L.M. Marvel “Spread Spectrum Image Steganography,” IEEE transactions on image processing, vol. 8, no. 8, pp. 1075-1083, August 1999.
  14. M. Hussain,  M. Hussain., “Pixel Intensity Based High Capacity Data Embedding Method”, Information and Emerging Technologies, International conference  978-1-4244-8003 June 2010
  15. A. Cheddad, J. Condell, K. Curran and P. McKevitt, “Enhancing Steganography in digital images”, IEEE - 2008 Canadian conference on computer and Robot vision, pp.326-332, 2008.
  16. P.C. Gupta and M. Sharma “A Comparative Study of Steganography and watermarking”, International Journal of Research in IT & Management (IJRIM), vol 2,issue 2, 2012.
  17. M.K. Kaleem “An Overview of various form of Linguistic Steganography and their applications in protecting data”,                                      
  18. Journal of Global Research in Computer Science(JGRCS), vol 3, no.5, 2012
  19. Gowtham Prasad T V S, Dr. S Varadarajan,”Image steganography Based on Optimal LSB Pixel adjustment Method”, International Journal of Computer and Technology, vol 5, no. 1, 2013

*Contents are provided by Authors of articles. Please contact us if you having any query.






Bank Details