International Research journal of Management Science and Technology

  ISSN 2250 - 1959 (online) ISSN 2348 - 9367 (Print) New DOI : 10.32804/IRJMST

Impact Factor* - 6.2311


**Need Help in Content editing, Data Analysis.

Research Gateway

Adv For Editing Content

   No of Download : 76    Submit Your Rating     Cite This   Download        Certificate

COLOR IMAGE STEGANOGRAPHY USING COLOR TRANSFORMATION TECHNIQUE

    2 Author(s):  HARENDER SINGH, RAVI MALIK

Vol -  8, Issue- 12 ,         Page(s) : 165 - 173  (2017 ) DOI : https://doi.org/10.32804/IRJMST

Abstract

Steganography is the methods of hiding a data or message inside another message or cover image without drawing any suspect to the others and that he message can only be detected by its intended recipient. In modern terms, steganography is usually implemented computationally, where cover works such as text files, images, audio files, and video files are tweaked in such a way that a secret message can be embedded within them. In this paper JSteg and JMQT methods and their encoding and decoding algorithm has been discussed in detail. Moreover , performances matrices for steganography has been discussed in detail. A comparison is made between three parameters namely,PSNR, Capacity and stego Size using two steganography method namely;JSTEg and JMQT has been made. The experimental results conclude that using the color component technique for color image steganography JMQT provides good PSNR and capacity as compared to JSteg and JSteg gives good stego size ratio results as compare to JMQT. In section 1st we have to discuss about introduction.

1.        A. Almohammad and G. Ghinea 2015, “Image Steganography and Chrominance Components,”10th IEEE International Conference on Computer and Information Technology (CIT 2015).
2.       J.G.Yu1, E.J.Yoon2, S.H. Shin1 and K.Y. Yoo 2015, “A New Image Steganography Based on 2k Correction and Edge-Detection”, Fifth International Conference on Information Technology: New Generations 978-0-7695-3099-4/08, April 2015.
3.      G. Sahoo1 and R. K. Tiwari2 2015, “Designing an Embedded Algorithm for Data Hiding using Steganographic Technique by File Hybridization,” IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.1, January 2015.
4.        N. N. EL-Emam 2014, “Embedding a Large Amount of Information Using High Secure Neural Based Steganography Algorithm,” International Journal of Information and Communication Engineering, 4:2, 2014.
5.       N.N. EL-Emam 2014, “Hiding a Large Amount of Data with High Security Using Steganography Algorithm,” Journal of Computer Science, vol.3(4), pp. 223-232, 2014, ISSN 1549-3636.
6.       L. M. Marvel, Member 2014, C. G. Boncelet and C. T. Retter, “Spread Spectrum Image Steganography,” IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 8, NO. 8, AUGUST 2014.
7. J. He, S. Tang and TingtingWu 2014, “An Adaptive Image Steganography Based on     Depth-varying Embedding,” Congress on Image and Signal Processing, vol.5, 2014,  pp. 660-663, DOI 10.1109/CISP.2008.189
8.       S .K. Moon, R.S. Kawitkar 2014, “Data Security using Data Hiding,” International Conference on Computational Intelligence and Multimedia Applications 2014.
9. S. M Thampi 2014, “Information Hiding Techniques: A Tutorial Review,” ISTE-STTP on Network Security & Cryptography, LBSCE 2014. 
10. C.Y. Yang 2014, “Color Image Steganography Based on Module Substitutions,” Third International Conference on International Information Hiding and Multimedia Signal Processing Year of Publication: 2014 ISBN:0-7695-2994-1.
11. H.-C. Wu, N.-I. Wu, C.-S. Tsai and M.-S. Hwang 2013, “Image steganographic scheme based on pixel-value differencing and LSB replacement methods,” IEEE Proc.-Vis. Image Signal Process., Vol. 152, No. 5, October 2013.
12. H.W. Tseng and C.C.Chang 2013, “Steganography Using JPEG-Compressed Images,” Proceedings of the Fourth International Conference on Computer and Information Technology (CIT’2004). Sept. 2013.
13. D.C. Lou and C.H. Sung 2013, “A Steganographic Scheme for Secure Communications Based on the Chaos and Euler Theorem,” IEEE Transactions on Multimedia, VOL. 6, NO. 3, JUNE 2013.
14. K. Curran, K. Bailey 2013, “An Evaluation of Image Based Steganography Methods,” International Journal of Digital Evidence Fall 2013, Volume 2, Issue 2.
15. J. Fridrich, M. Goljan 2012, Binghamton, “Practical Steganalysis of Digital Images – State of the Art,” Conference, San Jose CA, ETATS-UNIS (21/01/2012).
16. C.C. Chang, T.S. Chen, L.Z. Chung 2012, “A steganographic method based upon JPEG and quantization table modification,” Information Sciences, vol.141, pp. 123–138, 2012.
17. K. Rabah 2004, “Steganography-The Art of Hiding Data,” Information Technology, Journal, vol.3 (3), pp. 245-269, 2004, ISSN 1682-6027.
18. http://en.wikipedia.org/wiki/JPEG 
19. http://en.wikipedia.org/wiki/Steganography
20. http://en.wikipedia.org/wiki/PSNR
21. http://www.steganography.org

*Contents are provided by Authors of articles. Please contact us if you having any query.






Bank Details