Abstract
The ontogenesis of technology has paved way for an upsurge in cyber-crime too. In fact, the rate at which this happens overheads even the Moore’s law. Steganography is a tool which supports us in elucidating the above facts. Here, we have proposed four methodologies in image steganography. First method deals with gray image, and the subsequent methods encounter color image. Pixel indicator technique is used for selecting the plane of embedding for color images. Embedding is done in block segmentation fashion. We have devised a novel mod4 methodology which tells us about the order of embedding, number of bits to be embedded in each pixel as well as about indicator channel in PIT and also tremendously escalates the randomization. OPAP technique reduces error for an enhanced image quality. MSE, PSNR, and the brute-force attack values of the above proposed methodologies have been simulated and displayed.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
A. Gutub, Pixel indicator technique for RGB image steganography. J. Emerg. Technol. Web Intell. 2(1), 56–64 (2010)
B. Schneier, Applied Cryptography Protocols, Algorithm and Source Code in C (wiley, New Jersey, 2007)
C.K. Chan, L.M. Chen, Hiding data in images by simple LSB substitution. Pattern Recogn. 37(3), 469–474 (2004)
S. Katzenbeisser, F.A.P. Petitcolas, Information Hiding Techniques for Steganography and Digital Watermarking (Artech House, London, 2000)
L.M. Marvel, C.G. Boncelet Jr, C.T. Retter, Spread spectrum image steganography. IEEE Trans. Image Process. 8(8), 1075–1083 (1999)
J. Mielikainen, LSB Matching Revisited. IEEE Sig. Process. Lett. 13(5), 285–287 (2006)
F.A.P. Petitcolas, R.J. Anderson, M.G. Kuhn, Information hiding-A survey. Proc. IEEE 87(7), 1062–1078 (1999)
N. Provos, P. Honeyman, Hide and seek: an introduction to steganography. IEEE Secur. Priv. Mag. 1(3), 32–44 (2003)
R. Gonzalez, R. Woods, Digital image processing (2002)
C.C. Thien, J.C. Lin, A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function. Pattern Recogn. 36(11), 2875–2881 (2003)
T.-C. Lu, S.-R. Liao, P.-L. Chen, C.-C. Chang, Z.-H. Wang, Information hiding technology based on block-segmentation strategy, in ISECS International Colloquium on Computing, Communication, Control, and Management (2009), pp. 500–506
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer India
About this paper
Cite this paper
Raajan, N.R., Balasubraminayan, G., Barath Krishna, B., Ramya, S., Malligaraj, M., Karthikeyan, K. (2015). Stego with Color Cue. In: Suresh, L., Dash, S., Panigrahi, B. (eds) Artificial Intelligence and Evolutionary Algorithms in Engineering Systems. Advances in Intelligent Systems and Computing, vol 324. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2126-5_48
Download citation
DOI: https://doi.org/10.1007/978-81-322-2126-5_48
Published:
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-2125-8
Online ISBN: 978-81-322-2126-5
eBook Packages: EngineeringEngineering (R0)