DocumentCode :
2273416
Title :
Who decides hiding capacity? I, the pixel intensity
Author :
Amirtharajan, Rengarajan ; Ramkrishnan, K. ; Krishna, Manthena Vamshi ; Nandhini, J. ; Rayappan, J.B.B.
Author_Institution :
Dept. of Electron. & Commun. Eng., SASTRA Univ., Thanjavur, India
fYear :
2012
fDate :
25-27 April 2012
Firstpage :
71
Lastpage :
76
Abstract :
Cryptography fails at feigning hackers about the presence of secret data, but Steganography with its many, efficient and effective techniques, camouflages the fact that data has been hidden, thus overcoming cryptography´s Achilles heel. It includes hiding the message in a funny photo, or the melodious number or in extravagant hair standing videos. Steganography works with a cover image, containing the whole secret message to be transferred but based on a few criteria. These criteria are called randomizations which are introduced between the cover image and secret message, thereby keeping them secure. This paper proposes a variant of pixel indicator methodology to randomize and vary the capacity of the cover image. Initially the cover image is split into Red(R), Green (G) and Blue Plane (B). The lowest intensity among R, G and B would be the indicator channel and the remaining are data channels. The number of bits of secret data that could be embedded on the data channel is based on the MSB´s of the same. If for a case R is Indicator channel and GB are the data channels then MSB if BG return 00, 1 bit is embedded on that data channel. Similarly, if (B, G) is 01, then 2 bits are embedded, if B, G is 10, 3 bits are embedded and finally, if (B,G) =11, then 4 bits are embedded. Simulation has been performed to test the effectiveness & complexity of the proposed methodology.
Keywords :
cryptography; image coding; steganography; cover image capacity; cryptography; hacker; hiding capacity; message hiding; pixel indicator methodology; randomization; secret data; secret message; steganography; Complexity theory; Cryptography; Indexes; Information security; PSNR; Software systems; Adaptive LSB Substitution; Information hiding; Pixel Indicator(PI) Method; Random Image Steganography;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Recent Advances in Computing and Software Systems (RACSS), 2012 International Conference on
Conference_Location :
Chennai
Print_ISBN :
978-1-4673-0252-4
Type :
conf
DOI :
10.1109/RACSS.2012.6212700
Filename :
6212700
Link To Document :
بازگشت