Title :
Steganography using edge adaptive image
Author :
Selvi, G. Karthigai ; Mariadhasan, Leon ; Shunmuganathan, K.L.
Author_Institution :
Dept. of Comput. Sci. & Eng., R.M.K Eng. Coll., Chennai, India
Abstract :
The growth of high speed computer networks and that of the Internet, in particular, has increased the ease of Information Communication. Ironically, the cause for the development is also of the apprehension - use of digital formatted data. In comparison with Analog media, Digital media offers several distinct advantages such as high quality, easy editing, high fidelity copying, compression etc. But this type advancement in the field of data communication in other sense has hiked the fear of getting the data snooped at the time of sending it from the sender to the receiver. So, Information Security is becoming an inseparable part of Data Communication. In order to address this Information Security Steganography plays an important role. Steganography is the art and science of writing hidden messages in such a way that no one apart from the sender and intended recipient even realizes there is a hidden message. This paper is a tutorial review of the steganography techniques appeared in the literature. Various image steganography techniques have been proposed. In this paper, we investigate steganography techniques and steganalysis techniques. We state a set of criteria to analyze and evaluate the strengths and weaknesses of the presented techniques. The least-significant bit (LSB) insertion method is the most common and easiest method for embedding messages in an image with high capacity, while it is detectable by statistical analysis such as RS and Chi-square analyses. This paper has proposed a novel LSB image steganography algorithm that can effectively resist image steganalysis based on statistical analysis.
Keywords :
Internet; computer network security; data communication; message authentication; steganography; Internet; computer network; data communication; data snooping; edge adaptive image; hidden message; image steganography technique; information communication; information security; steganalysis technique; Accuracy; Cryptography; Data mining; Extraterrestrial measurements; Pattern matching; Data extraction; Decoding the data; Encrypting the text; Locating the edges;
Conference_Titel :
Computing, Electronics and Electrical Technologies (ICCEET), 2012 International Conference on
Conference_Location :
Kumaracoil
Print_ISBN :
978-1-4673-0211-1
DOI :
10.1109/ICCEET.2012.6203727