Image Steganography using Marshalıng of RGB
- 1. Department of Computer Science and Technology, Yogi Vemana University, Kadapa (Andhra Pradesh), India.
Contributors
Contact person:
- 1. Department of Computer Science and Engineering, AP-IIIT, RGUKT, RK Valley, Idupulapaya, Kadapa (Andhra Pradesh), India.
- 2. Department of Computer Science and Technology, Yogi Vemana University, Kadapa (Andhra Pradesh), India.
- 3. Department of Computer Science and Engineering, AP-IIIT, RGUKT - Nuzvid Campus, Krishna (Andhra Pradesh), India.
- 4. Department of Computer Science and Technology, Yogi Vemana University, Kadapa, India.
Description
Abstract: In today's world, data security has become a major concern. Steganography is one of the essential techniques for secure data communication. It involves concealing hidden secret data or information within another carrier medium. In image steganography, the secret content is embedded within image files. This paper proposes new techniques for image steganography, where secret image data is hidden within a cover image using a marshaling technique over the pixels. This marshaling technique is developed by modifying the RGB components of the image. The security of this technique relies on the spatial arrangement of the color components of the image. We explore the practical implementation of the proposed technique for concealing secret image data and recovering the hidden image without any loss through the decoding process.
Files
F452413060824.pdf
Files
(429.6 kB)
Name | Size | Download all |
---|---|---|
md5:8f4df85b223fc156152d0d67da9d978d
|
429.6 kB | Preview Download |
Additional details
Identifiers
- DOI
- 10.35940/ijeat.F4524.13060824
- EISSN
- 2249-8958
Dates
- Accepted
-
2024-08-15Manuscript received on 16 July 2024 | Revised Manuscript received on 23 July 2024 | Manuscript Accepted on 15 August 2024 | Manuscript published on 30 August 2024.
References
- Niels Provos, Peter Honeyman: Hide and Seek: An Introduction to Steganography, Published by The IEEE Computer Society, IEEE Security & Privacy (2003). https://doi.org/10.1109/MSECP.2003.1203220
- Artz, D: Digital Steganography::Hiding Data within Data, IEEE Internet Computing Journal, vol. 5, no. 3, pp. 75-80 (2001). https://doi.org/10.1109/4236.935180
- J. Fridrich, R. Du,, L. Meng : Steganalysis of LSB Encoding in Color Images, Proc. IEEE Int'l Conf. Multimedia and Expo (2000).
- ChandranSaravanan, Ramesh Kumar Thakur: A Novel Steganography Technique for Securing User's Digitized Handwritten Signature for Public Authentication Systems. Discovery Publication, The International Daily journal, 43(200), 193-197(2015).
- N. Zhicheng, Y.Q. Shi, N. Ansari, S. Wei: Reversible data hiding, in proc. ISCAS '03, Circuits and Systems, International Symposium on, Vol. 2, pp. 25-28(2003).
- R. Chandramouli, Nasir Memon: Analysis Of Lsb Based Image Steganography Techniques,IEEEXplore,, DOI: 10.1109/ICIP.2001.958299, Proceedings International Conference on Image Processing(2001).
- Mohammad TanvirParvez, Adnan Abdul-Aziz Gutub: RGB Intensity Based Variable-Bits Image Steganography,IEEE Xplore, DOI: 10.1109/APSCC.2008.105, 2008 IEEE Asia-Pacific Services Computing Conference (2008).
- RajarathnamChandramouli, Mehdi Kharrazi, and Nasir Memon: Image Steganography and SteganalysisConcepts and Practice", IWDW 2003, Springer LNCS 2939, pp. 35–4, (2004). https://doi.org/10.1007/978-3-540-24624-4_3
- T Morkel, JHP Eloff and MS Olivier: An Overview of Image Steganography, in Proceedings of the Fifth Annual Information Security South Africa Conference (ISSA2005), Sandton, South Africa, (2005).
- Nagham Hamid, AbidYahya, R. Badlishah Ahmad, Osamah M. Al-Qershi: Image Steganography Techniques: An Overview, International Journal of Computer Science and Security (IJCSS), Volume (6) : Issue (3), PP:168-187, (2012).
- May Alanzy, Razan Alomrani, Bashayer Alqarni, Saad Almutairi, Image Steganography Using LSB and Hybrid Encryption Algorithms, Applied Sciences, 2023,No. 21, p. 11771 https://doi.org/10.3390/app132111771
- Amrutha, E., Arivazhagan, S. & Jebarani, W.S.L. Novel color image steganalysis method based on RGB channel empirical modes to expose stego images with diverse payloads. Pattern Anal Applic 26, 239–253 (2023). https://doi.org/10.1007/s10044-022-01102-2 https://doi.org/10.1007/s10044-022-01102-2
- Kang, Y., Liu, F., Yang, C., et al. (2019). Color Image Steganalysis Based on Channel Gradient Correlation. International Journal of Distributed Sensor Networks, 15, 1550147719852031. doi:10.1177/1550147719852031 https://doi.org/10.1177/1550147719852031
- Ye, J., Ni, J., Yi, Y. (2017). Deep Learning Hierarchical Representations for Image Steganalysis. IEEE Transactions on Information Forensics and Security, 12(11), 2545-2557. doi:10.1109/TIFS.2017.2710946 https://doi.org/10.1109/TIFS.2017.2710946
- Sajedi, H. (2016). Steganalysis Based on Steganography Pattern Discovery. Journal of Information Security and Applications, 30, 3-14. doi:10.1016/j.jisa.2016.04.001. https://doi.org/10.1016/j.jisa.2016.04.001
- Rao, K.S., Sridhar, M. (2021). A novel image encryption using parity based visual cryptography. Ingénierie des Systèmes d'Information, Vol. 26, No. 1, pp. 135-142. https://doi.org/10.18280/isi.260115
- Rao, K.S., Sridhar, M. (2021). A tabu search algorithm for general threshold visual cryptography schemes. Ingénierie des Systèmes d'Information, Vol. 26, No. 3, pp. 329-335. https://doi.org/10.18280/isi.260310.
- K. S. Rao and M. Sridhar, "A Lossless Secret Image Sharing Scheme based on Bit Sharing Visual Cryptography," 2018 International Conference on Recent Innovations in Electrical, Electronics & Communication Engineering (ICRIEECE), Bhubaneswar, India, 2018, pp. 1417-1420, doi: 10.1109/ICRIEECE44171.2018.9009306. https://doi.org/10.1109/ICRIEECE44171.2018.9009306
- DWT Based Image Steganography with Seven Segment Display Pattern as a Key. (2019). In International Journal of Innovative Technology and Exploring Engineering (Vol. 8, Issue 10S, pp. 164–169). https://doi.org/10.35940/ijitee.j1030.08810s19
- Jayasurya, Y. L., Yasaswini, Y. P., & Saranya, S. (2020). Image Steganography. In International Journal of Recent Technology and Engineering (IJRTE) (Vol. 9, Issue 3, pp. 602–605). https://doi.org/10.35940/ijrte.c4654.099320
- Reddaiah, B., Sagar, B. J. J. K., Kumar, B. S., Sarvani, G., & sai, A. S. (2020). Image Steganography Built on Pixel Value Difference in Spatial Domain using Range Table. In International Journal of Engineering and Advanced Technology (Vol. 9, Issue 3, pp. 3448–3453). https://doi.org/10.35940/ijeat.c6140.029320
- Vejare, R., Vaish, A., Singh, K., & Desai, M. (2022). Removal of Image Steganography using Generative Adversarial Network. In Indian Journal of Artificial Intelligence and Neural Networking (Vol. 2, Issue 4, pp. 6–10). https://doi.org/10.54105/ijainn.d1054.062422
- Dutta, D., Halder, T., Penchala, A., Krishna, K. V., Prashnath, G., & Chakravarty, D. (2024). A Case Study on Image Co-Registration of Hyper Spectral and Dual (L & S) Band SAR Data and Ore Findings Over Zewar Mines, India. In International Journal of Emerging Science and Engineering (Vol. 12, Issue 6, pp. 17–25). https://doi.org/10.35940/ijese.a8055.12060524