A Covert Communication Model-Based on Image Steganography

Author:

Juneja Mamta1

Affiliation:

1. UIET, Panjab University, Chandigarh, India

Abstract

With the more and more advancement in technology, internet has become the most important medium for all kinds of confidential as well as non-confidential communications. Security is the major issue for such communications and steganography is most widely accepted tool for information security. An effort has been made in the present paper to propose a secured model for communication using image steganography. It presents two components based LSB steganography method, adaptive LSB based steganography method for embedding data in high and low transition parts of an image respectively. Hybrid edge detection filter is proposed to divide an image in low and high transition areas. AES (Advanced Encryption Standard) and Randomization is incorporated to provide two-tier security. Comparison analysis of output results with other existing techniques on basis of capacity, imperceptibility is giving the proposed approach an edge over others. The proposed approach has been thoroughly tested for various steganalysis attacks like visual analysis, histogram analysis, chi-square, and RS analysis and could sustain all these attacks very well.

Publisher

IGI Global

Subject

Information Systems

Reference63 articles.

1. Data embedding based on better use of bits in image pixels.;R. H.Alwan;International Journal of Signal Processing,2005

2. Random Image Steganography and Steganalysis: Present Status and Future Directions

3. Arjun, N. S., & Negi, A. (2006). A filtering based approach to adaptive steganography. In Proceedings of the TENCON 2006, IEEE Region 10 Conference (pp. 1-4).

4. Image steganography based on a parameterized canny edge detection algorithm.;Y.Bassil;International Journal of Computers and Applications,2012

5. A Computational Approach to Edge Detection

Cited by 5 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Steganography using wavelet transform for secured data transmission;Journal of Ambient Intelligence and Humanized Computing;2023-05-24

2. Secure and covert communication using steganography by Wavelet Transform;Optik;2021-09

3. An Improved Separable and Reversible Steganography in Encrypted Grayscale Images;International Journal of Information Security and Privacy;2021-04

4. Dual Image-Based Dictionary Encoded Data Hiding in Spatial Domain;International Journal of Information Security and Privacy;2020-04

5. Data security improvements on cloud computing using cryptography and steganography;IOP Conference Series: Materials Science and Engineering;2020-04-01

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3