Security Enhanced Digital Image Steganography Based on Successive Arnold Transformation
Steganography is a process of secret communication where a piece of information or secret message is hidden in such a way that the very existence of the secret information remains concealed without raising any suspicion in the minds of the viewers and hence preventing its detection. This is generally achieved by embedding a piece of information inside another piece of innocent looking information and can be a spatial or time or transform domain method. All these methods hide information in different types of media such as text, image, audio, video etc. Amongst these varieties of available media, digital images are more commonly used for implementation of data hiding techniques because of their size and popularity. This paper uses a spatial domain LSB substitution method for information embedding and Arnold transformation is successively applied twice in two different phases in order to achieve higher security. The system is tested and validated against a series of standard gray scale images and the results thus obtained are found to be highly promising.
KeywordsDigital Image Processing Steganography Encryption decryption Arnold transformation Cover image Stegoimage secret message
Unable to display preview. Download preview PDF.
- 2.Piva, A., Barni, M., Bartolini, F., Cappellini, V.: DCT-based watermark recovering without resorting to the uncorrupted original image. In: Proc. IEEE Int. Conf. Image Processing (ICIP 1997), pp. 520–523 (1997)Google Scholar
- 3.Jain, A.K.: Fundamentals of Digital Image Processing. PHI (2005)Google Scholar
- 4.Chand, B., Majumdar, D.D.: Digital Image Processing and analysis. PHI, New Delhi (2002)Google Scholar
- 5.Zhang, C., et al.: Digital Image watermarking with Double encryption by Arnold Transform and Logistic. In: Fourth International Conference on Networked Computing & Advanced Information Management, pp. 329–334. IEEE Computer Society (2008)Google Scholar
- 6.Petitcolas, F.A., Anderson, R., Kuhn, M.: Information hiding: A survey. In: Proceedings of the IEEE 87,1062–1078 (July 1999)Google Scholar
- 9.Meena, M.K., et al.: Image Steganography tool using Adaptive Encoding Approach to maximize Image hiding capacity. IJSCE 1, 7–11 (2011)Google Scholar
- 10.Mishra, M., et al.: Steganography: the art of Secret Messaging through Digital Images. In: Proceedings of National Conference on Computational Intelligence and its Applications (NCCIA-2007), pp. 104–113 (July 2007)Google Scholar
- 12.Johnson, N.F.: Steganography: Seeing the Unseen. George Mason University, http://www.iitc.com/stegdoc/sec202.html
- 13.Gonzalez, R.C., Wood, R.E.: Digital Image Processing, 2nd edn. PHI, New Delhi (2006)Google Scholar
- 14.Zhao, X.F.: Digital image Scrambling based on baker’s transformation. Journal of Northwest Normal University (Nature Science) 39, 26–29 (2003)Google Scholar