Home > CSC-OpenAccess Library > Manuscript Information
EXPLORE PUBLICATIONS BY COUNTRIES |
EUROPE | |
MIDDLE EAST | |
ASIA | |
AFRICA | |
............................. | |
United States of America | |
United Kingdom | |
Canada | |
Australia | |
Italy | |
France | |
Brazil | |
Germany | |
Malaysia | |
Turkey | |
China | |
Taiwan | |
Japan | |
Saudi Arabia | |
Jordan | |
Egypt | |
United Arab Emirates | |
India | |
Nigeria |
A Spatial Domain Image Steganography Technique Based on Matrix Embedding and Huffman Encoding
P.Nithyanandam, T.Ravichandran, N.M.Santron, E. Priyadharshini
Pages - 456 - 468 | Revised - 01-11-2011 | Published - 15-12-2011
MORE INFORMATION
KEYWORDS
Steganography, Imperceptibility, Payload, Stego Image
ABSTRACT
This paper presents an algorithm in spatial domain which gives less distortion to the cover image
during embedding process. Minimizing embedding impact and maximizing embedding capacity
are the key factors of any steganography algorithm. Peak Signal to Noise Ratio (PSNR) is the
familiar metric used in discriminating the distorted image (stego image) and cover image. Here
matrix embedding technique is chosen to embed the secret image which is initially Huffman
encoded. The Huffman encoded image is overlaid on the selected bits of all the channels of
pixels of cover image through matrix embedding. As a result, the stego image is constructed with
very less distortion when compared to the cover image ends up with higher PSNR value. A secret
image which cannot be embedded in a normal LSB embedding technique can be overlaid in this
proposed technique since the secret image is Huffman encoded. Experimental results for
standard cover images, which obtained higher PSNR value during the operation is shown in this
paper.
1 | Kaur, H., & Goyal, E. D. (2014). Performance Enhancement of a Transform Domain Based Steganographic Technique Using Segmentation. |
2 | Thanikaiselvan, V., Arulmozhivarman, P., Chakrabarty, S., Agarwal, A., Subashanthini, S., & Amirtharajan, R. (2014). Comparative Analysis of (5/3) and Haar IWT Based Steganography. Information Technology Journal, 13(16), 2534. |
3 | Rajput, P., Arya, S., Kumari, S., & Lehana, P. (2014). Qualitative and quantitative analysis of non-uniform dark images. Advances in Image and Video Processing, 2(1), 23-34. |
4 | Pol, K. (2014). Image steganography based on DWT using Huffman LWZ Encoding. Int J Eng Tech Res, 2(3), 100-103. |
5 | Nilizadeh, A. F., & Nilchi, A. R. N. (2013). Steganography on RGB Images Based on a “Matrix Pattern” using Random Blocks. International Journal of Modern Education and Computer Science (IJMECS), 5(4), 8. |
6 | Mann, V. K., & Dhaliwal, H. S. (2013). 32* 32 Colour Image Steganography. International Journal of Engineering Trends and Technology (IJETT) Vol, 4. |
7 | Maan, V. K., & Dhaliwal, H. S. 32× 32 Vector Quantization Based Colour Image Steganography. |
8 | Pandian, N., & Thangavel, R. (2012). Gray Coded Grayscale Image Steganoraphy using Hufman Encoding. International Journal of Image Processing (IJIP), 6(5), 334. |
9 | Nithyanandam, P., & Ravichandran, T. (2012). Geometrical Rotation Addressed Steganography Technique using Matrix Embedding and Huffman Encoding. European Journal of Scientific Research, 87(1), 31-45. |
10 | Vongurai, N., & Phimoltares, S. (2012, September). Frequency-Based Steganography Using 32x32 Interpolated Quantization Table and Discrete Cosine Transform. In Computational Intelligence, Modelling and Simulation (CIMSiM), 2012 Fourth International Conference on (pp. 249-253). IEEE. |
11 | D. Vishwakarma, Prof. S. Maheshwari and Prof. S. Joshi, “Efficient Information Hiding Technique Using Steganography”, International Journal of Emerging Technology and Advanced Engineering, 2(1), pp. 154-159 January 2012. |
12 | Vishwakarma, D., Maheshwari, S., & Joshi, S. Efficient Information Hiding Technique Using Steganography. |
1 | Google Scholar |
2 | CiteSeerX |
3 | refSeek |
4 | Bielefeld Academic Search Engine (BASE) |
5 | Scribd |
6 | SlideShare |
7 | PdfSR |
A. Nag, S. Biwa’s, D. Sarkar, P.P. Sarkar. “A Novel Technique for Image Steganography Based on DWT and Huffman Encoding” , International Journal of Computer Science and Security, Volume 4, Issue 6, pp. 561-570, Feb. 2011. | |
Alasdair McAndrew. Introduction to Digital Image Processing with MATLAB, CENGAGE Learning, 2004 | |
Ali K. Hmood, Z. M. Kasirun, Hamid A. Jalab,Gaz Mahabubul Alam, A. A. Zaidan, B. B. Zaidan. “On the accuracy of hiding information metrics: Counterfeit protection for education and important certificates.” International Journal of the Physical Sciences, Volume. 5, Issue 7, pp. 1054-1062, August,2010. | |
Chang, C.C and Tseng, H.W. 2004. “A Steganographic method for digital images using side match.” Pattern Recognition Letters, 25: 1431 – 1437, June 2004. | |
Injemar J. Cox, Matthew L. Miller, Jeffrey A. Bloom, Jessica Fridrich, Ton Kalker. Digital Watermarking and Steganography. Morgan Kaufmann, Second Edition,2008. | |
Po-Yueh Chen,Wei-En Wu. “A Modified Side Match Scheme for Image Steganography” , International Journal of Applied Science and Engineering, Volume 7, Issue 1, pp. 53-60, October 2009. | |
Professor Luca Trevisan, 2001, "Lecture notes on Intro. To CS Theory." Online. Available: http:// ww.cs.berkeley.edu/~luca/cs170/notes/lecture15.ps | |
R.Amirtharajan, Sandeep Kumar Beher, Motamarri Abhilash Swarup, Mohamed Ashfaaq K and John Bosco Balaguru Rayappan. “Colour Guided Colour Image Steganography”, Universal Journal of Computer Science and Engineering Technology, Volume 1, pp.16 – 23, Oct . 2010. | |
Rafael C. Gonzalez Richard E. Woods. Digital Image Processing. ,PHI, Third Edition, 2008. | |
Santosh Arjun, Atul Negi, Chaitanya Kranti, and Divya Keerthi. “An Approach to Adaptive Steganography Based on Matrix Embedding” TENCON 2007 - 2007 IEEE Region 10 , Volume 1,pp.1-4, Oct . 2007. | |
[Online].Available : http://www.binaryessence.com | |
Mr. P.Nithyanandam
SSN college of engineering - India
nithyanandamp@ssn.edu.in
Mr. T.Ravichandran
- India
Mr. N.M.Santron
- India
Mr. E. Priyadharshini
- India
|
|
|
|
View all special issues >> | |
|
|