Advertisement

Security Enhanced Digital Image Steganography Based on Successive Arnold Transformation

Part of the Advances in Intelligent Systems and Computing book series (volume 167)

Abstract

Steganography is a process of secret communication where a piece of information or secret message is hidden in such a way that the very existence of the secret information remains concealed without raising any suspicion in the minds of the viewers and hence preventing its detection. This is generally achieved by embedding a piece of information inside another piece of innocent looking information and can be a spatial or time or transform domain method. All these methods hide information in different types of media such as text, image, audio, video etc. Amongst these varieties of available media, digital images are more commonly used for implementation of data hiding techniques because of their size and popularity. This paper uses a spatial domain LSB substitution method for information embedding and Arnold transformation is successively applied twice in two different phases in order to achieve higher security. The system is tested and validated against a series of standard gray scale images and the results thus obtained are found to be highly promising.

Keywords

Digital Image Processing Steganography Encryption decryption Arnold transformation Cover image Stegoimage secret message 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Reddy, A., Chatterji, B.N.: A new wavelet based logo-watermarking scheme. Pattern Recognition Letters 26, 1019–1027 (2005)CrossRefGoogle Scholar
  2. 2.
    Piva, A., Barni, M., Bartolini, F., Cappellini, V.: DCT-based watermark recovering without resorting to the uncorrupted original image. In: Proc. IEEE Int. Conf. Image Processing (ICIP 1997), pp. 520–523 (1997)Google Scholar
  3. 3.
    Jain, A.K.: Fundamentals of Digital Image Processing. PHI (2005)Google Scholar
  4. 4.
    Chand, B., Majumdar, D.D.: Digital Image Processing and analysis. PHI, New Delhi (2002)Google Scholar
  5. 5.
    Zhang, C., et al.: Digital Image watermarking with Double encryption by Arnold Transform and Logistic. In: Fourth International Conference on Networked Computing & Advanced Information Management, pp. 329–334. IEEE Computer Society (2008)Google Scholar
  6. 6.
    Petitcolas, F.A., Anderson, R., Kuhn, M.: Information hiding: A survey. In: Proceedings of the IEEE 87,1062–1078 (July 1999)Google Scholar
  7. 7.
    Yu, G.J., Lu, C.S., Liao, H.Y.: Mean quantization-based fragile watermarking for image authentication. Optical Engineering 40, 1396–1408 (2001)CrossRefGoogle Scholar
  8. 8.
  9. 9.
    Meena, M.K., et al.: Image Steganography tool using Adaptive Encoding Approach to maximize Image hiding capacity. IJSCE 1, 7–11 (2011)Google Scholar
  10. 10.
    Mishra, M., et al.: Steganography: the art of Secret Messaging through Digital Images. In: Proceedings of National Conference on Computational Intelligence and its Applications (NCCIA-2007), pp. 104–113 (July 2007)Google Scholar
  11. 11.
    Mishra, M., Routray, A.R., Kumar, S.: High Security Image Steganography with modified Arnold’s cat map. IJCA 37(9), 16–20 (2012)CrossRefGoogle Scholar
  12. 12.
    Johnson, N.F.: Steganography: Seeing the Unseen. George Mason University, http://www.iitc.com/stegdoc/sec202.html
  13. 13.
    Gonzalez, R.C., Wood, R.E.: Digital Image Processing, 2nd edn. PHI, New Delhi (2006)Google Scholar
  14. 14.
    Zhao, X.F.: Digital image Scrambling based on baker’s transformation. Journal of Northwest Normal University (Nature Science) 39, 26–29 (2003)Google Scholar

Copyright information

© Springer-Verlag GmbH Berlin Heidelberg 2012

Authors and Affiliations

  1. 1.Department of I.& C.T.F.M. UniversityBalasoreIndia
  2. 2.Department of StatisticsJ. C. College, Kolhan UniversityChaibasaIndia
  3. 3.Dept of CSACPGS,.O. U. A. T.BhubaneswarIndia

Personalised recommendations