Home > CSC-OpenAccess Library > Manuscript Information
EXPLORE PUBLICATIONS BY COUNTRIES |
EUROPE | |
MIDDLE EAST | |
ASIA | |
AFRICA | |
............................. | |
United States of America | |
United Kingdom | |
Canada | |
Australia | |
Italy | |
France | |
Brazil | |
Germany | |
Malaysia | |
Turkey | |
China | |
Taiwan | |
Japan | |
Saudi Arabia | |
Jordan | |
Egypt | |
United Arab Emirates | |
India | |
Nigeria |
Customized and Secure Image Steganography Through Random Numbers Logic.
Sanjeev Manchanda, Mayank Dave, S. B. Singh
Pages - 1 - 16 | Revised - 15-06-2007 | Published - 30-06-2007
Published in Signal Processing: An International Journal (SPIJ)
MORE INFORMATION
KEYWORDS
Steganography, Cryptography, Random numbers logic
ABSTRACT
Steganography is the science of hiding information in media based data. We
present random numbers logic based steganographic methods and layout
management schemes for hiding data/image into image(s). These methods and
schemes can be customized according to the requirements of the users and the
characteristics of data/images. These methods are secure enough to meet the
requirements of the users and user can play significant role in selection and
development of these methods. Methods can be chosen randomly and
implemented dynamically based on inputs, user choices as well as outputs.
Experimental results are given to demonstrate the performance of the proposed
methods.
1 | Prashanti, G., & Sandhyarani, K. (2015, January). A New Approach for Data Hiding with LSB Steganography. In Emerging ICT for Bridging the Future-Proceedings of the 49th Annual Convention of the Computer Society of India CSI Volume 2 (pp. 423-430). Springer International Publishing. |
2 | Charles, S., & Govardhan, A. (2014). Secured Wireless Data Transmission over a Noisy AWGN Channel with Double Steganography and AES Cryptography. |
3 | Pramanik, M., & Sharma, K. Analysis of Visual Cryptography, Steganography Schemes and its Hybrid Approach for Security of Images. |
4 | Malhotra, L., & Gupta, N. (2014). A DWT and DCT based Hybrid Approach for Audio Watermarking. |
5 | Manjunatha Reddy, H. S. (2014). Design of image steganographic systems for covert communication. |
6 | Jayaramu, H. S., Shivakumar, K. B., Srinidhi, G. A., & Goutam, A. K. A Novel Steganography Technique USING Same Scale Wavelet. |
7 | Saini, R. Review of Different Techniques of Image Steganography. |
8 | Agrawal, D., & Diwedi, S. (2013, February). Analysis of random bit image steganography techniques. In IJCA Proceedings on International Conference on Recent Trends in Engineering and Technology 2013 (No. 1, pp. 1-4). Foundation of Computer Science (FCS). |
9 | Yadav, M., Yadav, A., & Yadav, P. Analysis of Various Image Steganography Techniques. |
10 | Bhavana, S., & Sudha, K. L. (2012). Text Steganography using LSB insertion method along with Chaos Theory. International Journal of Computer Science, Engineering and Applications, 2(2), 145. |
11 | Sudha, K. L. (2012). Text Steganography using LSB insertion method along with Chaos Theory. arXiv preprint arXiv:1205.1859. |
12 | Tiwari, N., & Shandilya, D. M. (2010). Evaluation of Various LSB based Methods of Image Steganography on GIF File Format. International Journal of Computer Applications (0975–8887) Volume. |
13 | Tiwari, N., & Shandilya, M. (2010). Secure RGB image steganography from pixel indicator to triple algorithm-an incremental growth. International Journal of Security and Its Applications, 4(4), 53-62. |
14 | Rana, R., & Singh, D. (2010). Steganography-Concealing Messages in Images Using LSB Replacement Technique with Pre-Determined Random Pixel and Segmentation of Image. International Journal of Computer Science & CommunicationVol, 1, 113-116. |
Andersen R.J. and Petitcolas F.A.P. "On the limits of steganography". IEEE Journal of Selected Areas in Communications, Special Issue on Copyright and Privacy Protection 16 No.4, 474-481, 1998 | |
Aura T. “Practical invisibility in digital communication”. Lecture Notes in Computer Science, vol.1174, Springer-Verlag, pp. 265-278, 1996 | |
Avcibas I., Memon N. and Sankur B. “Steganalysis using image quality metrics”. IEEE Transactions on Image Processing, vol. 12, pp. 221–229, Feb. 2003 | |
Bao F. and Wang X. “Steganography of short messages through accessories” Pacific Rim Workshop on Digital Steganography, Japan, 2002 | |
Cachin C. “An information-theoretic model for steganography”. D. Aucsmith (Ed.): Information Hiding, 2nd International Workshop, vol. 1525 of Lectures Notes in Computer Science, pp. 306-318. Springer, 1998 | |
Chan Y. K. and Chang C. C. “Concealing a Secret Image Using the Breadth First Traversal Linear Quad tree Structure”. IEEE Proceedings of Third International Symposium on Cooperative Database Systems for Advanced Applications, pp. 194-199, 2001 | |
Chang C. C., Chen T. S. and Chung L. Z. “A Steganographic Method Based upon JPEG and Quantization Table Modification” Information Sciences, vol. 141, pp. 123-138, 2002 | |
Fard Amin Milani, Mohammad R., Akbarzadeh T. and Varasteh A. Farshad. “A New Genetic Algorithm Approach for Secure JPEG Steganography”, Proceedings of the IEEE International Conference on Engineering of Intelligent Systems ICEIS’2006, pp. 216-219, ISBN: 1-4244-0456-8, Islamabad, Pakistan, April 22-23 2006 | |
Fisk G., Fisk M., Papadopoulos C. and Joshua N. “Eliminating Steganography in Internet Traffic with Active Wardens”, Available: http://citeseer.nj.nec.com/fisk02eliminating.html. Nov 1, 2002 | |
Fridrich J. and Goljan M. “Practical steganalysis of digital images-state of the art” Proc. SPIE Photonics West, Vol. 4675,pp. 1-13, San Jose, California, Jan. 2002 | |
Fridrich J., Goljan Miroslav and Du Rui. “Reliable detection of LSB steganography in color and grayscale images”. International Multimedia Conference Proceedings of the workshop on Multimedia and security: new challenges, Ottawa, Ontario, Canada, Publisher ACM Press New York, NY, USA, 2001 | |
Gonzalez R.C. and Woods R.E. “Digital Image Processing”. Addison Wesley, Reading, 1992 | |
Hsu C. T., Wu J. L. “Hidden Digital Watermarks in Images” IEEE Transactions on Image Processing, pp. 58-68, 1999 | |
Johnson N. F. and Jajodia S. “Steganalysis of Images Created Using Current Steganography Software”. Lecture Notes in Computer Science, vol.1525, Springer- Verlag, Berlin, pp. 273-289, 1998 | |
Johnson N. F. and Jajodia S. “Steganography: Seeing the Unseen”. IEEE Computer, pp.26-34, February 1998 | |
Johnson N. F. “Steganalysis of images created using current steganographic software”. Second Information Hiding Workshop, 1998. | |
Kelton W. D. and Law A. “Simulation Modeling and Analysis”. Mcgraw-Hill Science, USA, 2006 | |
Koval Oleksiy, Voloshynovskiy Svyatoslav, Holotyak Taras and Pun Thierry. “Informationtheoretic Analysis of Steganalysis in Real Images”. International Multimedia Conference, Proceeding of the 8th workshop on Multimedia and security, Geneva, Switzerland, Pages: 11 – 16, 2006 | |
Lee, Y. K. and Chen L. H. “High Capacity Image Steganographic Model”. IEE Proceedings Vision, Image and Signal Processing, pp. 288-294, 2000 | |
Luo Xiangyang, Hu Zongyun, Yang Can, Gao Shanqing. “A Secure LSB Steganography System Defeating Sample Pair Analysis Based on Chaos System and Dynamic Compensation”, Feb. 20-22, 2006 ICACT 2006 | |
Martín Alvaro, Sapiro Guillermo and Seroussi Gadiel, “Is Image Steganography Natural?”. IEEE Transactions On Image Processing, Vol. 14, No. 12, December, 2005 | |
Pal S.K., Saxena P. K. and Mutto S.K. “The Future of Audio Steganography”. Pacific Rim Workshop on Digital Steganography, Japan, 2002 | |
Westfeld A. and Pfitzmann A. "Attacks on Steganographic Systems". Lecture Notes in Computer Science, vol. 1768, Springer-Verlag, Berlin, pp. 61-75, 2000 | |
Mr. Sanjeev Manchanda
- India
smanchanda@tiet.ac.in
Mr. Mayank Dave
- India
Mr. S. B. Singh
- India
|
|
|
|
View all special issues >> | |
|
|