DocumentCode :
618445
Title :
Standard deviation converges for random image steganography
Author :
Amirtharajan, Rengarajan ; Archana, P. ; Rajesh, V. ; Devipriya, G. ; Rayappan, J.B.B.
fYear :
2013
fDate :
11-12 April 2013
Firstpage :
1064
Lastpage :
1069
Abstract :
The advent of the internet age has led to the increase of prominent network security issues. Information encryption has long been a method used for information security. With the rapid development of parallel computing capacities of computer hardware, this method alone could not be trusted to ensure security by increasing the key sizes, thus bringing in the information hiding techniques into the scenario. Cryptography scrambles the data to be secured while information hiding embeds the information into files which do not reveal the presence of information. Steganography and water marking are two information hiding techniques. While steganography is used for secretly embedding the sensitive information in files, watermarking is used to implement copyright protection. Steganographic techniques are being widely used these days to increase the security of information. A combination of cryptography and steganography results in very strong cryptosystems. This is a paper of unexampled prosperity, which elicits easy-to-implement, difficult-to-sense proficiency for image steganography enforcing the statistical distribution´s profound laws. Bit length for embedding is adjudicated via some delineated conditions and is done so by making use of Least Significant Bit . These conditions are the index for increasing complexity as well as security. Experimental ensues in terms of BPP, embedding capacity, and stego outputs also vindicate this paper. This paper prognosticates the crucial imputes of steganography.
Keywords :
Internet; copyright; cryptography; image watermarking; parallel processing; statistical distributions; steganography; Internet; computer hardware; cryptography; image watermarking; information encryption; information hiding techniques; information security; least significant bit; network security; parallel computing; random image steganography; sensitive information; standard deviation; statistical distribution; steganographic techniques; Communications technology; Conferences; Cryptography; Histograms; Image edge detection; Standards; Data hiding; Information hiding; Modified LSB; Random Image Steganography (RIS);
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information & Communication Technologies (ICT), 2013 IEEE Conference on
Conference_Location :
JeJu Island
Print_ISBN :
978-1-4673-5759-3
Type :
conf
DOI :
10.1109/CICT.2013.6558256
Filename :
6558256
Link To Document :
بازگشت