Downloads: 121 | Views: 281
M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 3 Issue 9, September 2014 | Popularity: 6.7 / 10
Hiding Image in Image Using LSB Insertion Method with Improved Security and Quality
Mekha Jose
Abstract: The information hiding techniques arose to satisfy the need for covert communication. Steganography is an extremely useful method for covert information transmission. Steganography is the data hiding technique which allows hiding secret message or image within a larger image or message such that the hidden message or an image is undetectable. This paper proposes an image hiding steganographic method, of hiding an image within a cover image. This steganographic method aims to minimize the visually apparent and statistical differences between the cover image and a stego image with increase in the size of the payload. The proposed algorithm uses the binary codes which is the binary representation of pixels inside the image. This algorithm make use of least significant bit (LSB) technique, which is a popular technique in steganography, in which least significant bits of cover are altered by secret data bits. The proposed method incorporate randomization algorithm which improve the security of LSB scheme. The bits of the secret image are embedded in random pixels of the cover image and these random pixels are generated by RC4 algorithm. The system enhances the security of the LSB technique by randomly dispersing the bits of secret image in the cover image which makes it harder for unauthorized people to extract the original image. Since all the secret image bits are embedded in the cover image the exact secret image can be regenerated from the stego-image and thereby the image quality is preserved by the system. Thus the proposed system implements steganography for images, with an improvement in both security and image quality.
Keywords: Data hiding, Steganography, LSB encoding, Image Steganography, Randomization, RC4 Algorithm
Edition: Volume 3 Issue 9, September 2014
Pages: 2281 - 2284
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 1
Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021
Pages: 475 - 485Light Weight WSN Authentication Protocol Suite
Rahul K Drolia
Downloads: 108
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015
Pages: 1758 - 1762Privacy-Preserving Data Mining using RDT Framework and C4.5
Komal N. Chouragade, Trupti H. Gurav
Downloads: 109
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 1475 - 1480Secure Digital Signature Scheme against Chosen Message Attacks
Maheshkumar Zilla, K. Raghavendra Rao
Downloads: 109
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 1925 - 1927Survey on Secured Association Rule Mining in Partitioned Database
Gurpreet Kaur Bhatti, Prof. Ravi Patki
Downloads: 109
Review Papers, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015
Pages: 2084 - 2088Implementation of Efficient Privacy Preserving Data Analysis for Secure Data Transmission
Shital Gawahale, Rekha Jadhav