Title :
Modulation of hiding intensity by channel intensity - Stego by pixel commando
Author :
Amirtharajan, Rengarajan ; Mahalakshmi, V. ; Sridharan, N. ; Chandrasekar, M. ; Rayappan, J.B.B.
Author_Institution :
Dept. of Electron. & Commun., SASTRA Univ., Thanjavur, India
Abstract :
With each and everyone trying to transport their data through the public data networks, today´s data communication infrastructure has become more generic that there is absolutely no discrimination between different types of data in the `transport´ plane of communication. This generic nature or the lack of customization leads to the easy sniffing of data by unauthorized entities. This sniffing may not have significant impacts in case of casual data, which has no critical value. But, in case of the classified data, which has a critical value, this sniffing is a significant threat. Thus, it becomes the responsibility of the parties involved in secret communication to arrange for the necessary security, preventing the sniffing by rogue entities. Steganography has become a feasible and efficient alternative to Cryptography because, Steganography camouflages the existence of a security mechanism to protect the data, making it less inquisitive for the rogue parties. In the proposed method, a key-less, efficient and convenient method of embedding a secret data into a colour image is discussed, where the security is completely reliant on the obscuring procedure involved, thereby making the need for a key set unnecessary. The method increases the cryptic effect of the data concealment, making it difficult for any attacker to extract the data. This method is also compared with existing results and found to be good in imperceptibility and capacity.
Keywords :
data encapsulation; image coding; steganography; channel intensity; cryptic effect; cryptography; data communication infrastructure; hiding intensity modulation; key set; key-Iess method; pixel commando; public data networks; rogue entities; secret communication; steganography; Capacity planning; Cryptography; Image color analysis; PSNR; Information hiding; LSB substitution; Modified Pixel Indicator (PI); Steganography;
Conference_Titel :
Computing, Electronics and Electrical Technologies (ICCEET), 2012 International Conference on
Conference_Location :
Kumaracoil
Print_ISBN :
978-1-4673-0211-1
DOI :
10.1109/ICCEET.2012.6203762