Advertisement

Stego with Color Cue

  • N. R. Raajan
  • G. Balasubraminayan
  • B. Barath Krishna
  • S. Ramya
  • M. Malligaraj
  • K. Karthikeyan
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 324)

Abstract

The ontogenesis of technology has paved way for an upsurge in cyber-crime too. In fact, the rate at which this happens overheads even the Moore’s law. Steganography is a tool which supports us in elucidating the above facts. Here, we have proposed four methodologies in image steganography. First method deals with gray image, and the subsequent methods encounter color image. Pixel indicator technique is used for selecting the plane of embedding for color images. Embedding is done in block segmentation fashion. We have devised a novel mod4 methodology which tells us about the order of embedding, number of bits to be embedded in each pixel as well as about indicator channel in PIT and also tremendously escalates the randomization. OPAP technique reduces error for an enhanced image quality. MSE, PSNR, and the brute-force attack values of the above proposed methodologies have been simulated and displayed.

Keywords

LSB substitution OPAP Space-filling curve (SFC) Pixel indicator 

References

  1. 1.
    A. Gutub, Pixel indicator technique for RGB image steganography. J. Emerg. Technol. Web Intell. 2(1), 56–64 (2010)Google Scholar
  2. 2.
    B. Schneier, Applied Cryptography Protocols, Algorithm and Source Code in C (wiley, New Jersey, 2007)Google Scholar
  3. 3.
    C.K. Chan, L.M. Chen, Hiding data in images by simple LSB substitution. Pattern Recogn. 37(3), 469–474 (2004)CrossRefMATHMathSciNetGoogle Scholar
  4. 4.
    S. Katzenbeisser, F.A.P. Petitcolas, Information Hiding Techniques for Steganography and Digital Watermarking (Artech House, London, 2000)Google Scholar
  5. 5.
    L.M. Marvel, C.G. Boncelet Jr, C.T. Retter, Spread spectrum image steganography. IEEE Trans. Image Process. 8(8), 1075–1083 (1999)CrossRefGoogle Scholar
  6. 6.
    J. Mielikainen, LSB Matching Revisited. IEEE Sig. Process. Lett. 13(5), 285–287 (2006)CrossRefGoogle Scholar
  7. 7.
    F.A.P. Petitcolas, R.J. Anderson, M.G. Kuhn, Information hiding-A survey. Proc. IEEE 87(7), 1062–1078 (1999)Google Scholar
  8. 8.
    N. Provos, P. Honeyman, Hide and seek: an introduction to steganography. IEEE Secur. Priv. Mag. 1(3), 32–44 (2003)CrossRefGoogle Scholar
  9. 9.
    R. Gonzalez, R. Woods, Digital image processing (2002)Google Scholar
  10. 10.
    C.C. Thien, J.C. Lin, A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function. Pattern Recogn. 36(11), 2875–2881 (2003)CrossRefMATHGoogle Scholar
  11. 11.
    T.-C. Lu, S.-R. Liao, P.-L. Chen, C.-C. Chang, Z.-H. Wang, Information hiding technology based on block-segmentation strategy, in ISECS International Colloquium on Computing, Communication, Control, and Management (2009), pp. 500–506Google Scholar

Copyright information

© Springer India 2015

Authors and Affiliations

  • N. R. Raajan
    • 1
  • G. Balasubraminayan
    • 1
  • B. Barath Krishna
    • 1
  • S. Ramya
    • 1
  • M. Malligaraj
    • 1
  • K. Karthikeyan
    • 1
  1. 1.School of Electrical and Electronics EngineeringSASTRA UniversityTanjoreIndia

Personalised recommendations