Open Access   Article Go Back

A Steganographic Approach Using New Pixel Selection Combined With Hash Function for Secure Data Transmission in e-Banking

Atanu Sarkar1 , Sunil Karforma2

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-8 , Page no. 379-385, Aug-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i8.379385

Online published on Aug 31, 2018

Copyright © Atanu Sarkar, Sunil Karforma . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Atanu Sarkar, Sunil Karforma, “A Steganographic Approach Using New Pixel Selection Combined With Hash Function for Secure Data Transmission in e-Banking,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.379-385, 2018.

MLA Style Citation: Atanu Sarkar, Sunil Karforma "A Steganographic Approach Using New Pixel Selection Combined With Hash Function for Secure Data Transmission in e-Banking." International Journal of Computer Sciences and Engineering 6.8 (2018): 379-385.

APA Style Citation: Atanu Sarkar, Sunil Karforma, (2018). A Steganographic Approach Using New Pixel Selection Combined With Hash Function for Secure Data Transmission in e-Banking. International Journal of Computer Sciences and Engineering, 6(8), 379-385.

BibTex Style Citation:
@article{Sarkar_2018,
author = {Atanu Sarkar, Sunil Karforma},
title = {A Steganographic Approach Using New Pixel Selection Combined With Hash Function for Secure Data Transmission in e-Banking},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {8 2018},
volume = {6},
Issue = {8},
month = {8},
year = {2018},
issn = {2347-2693},
pages = {379-385},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2705},
doi = {https://doi.org/10.26438/ijcse/v6i8.379385}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i8.379385}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2705
TI - A Steganographic Approach Using New Pixel Selection Combined With Hash Function for Secure Data Transmission in e-Banking
T2 - International Journal of Computer Sciences and Engineering
AU - Atanu Sarkar, Sunil Karforma
PY - 2018
DA - 2018/08/31
PB - IJCSE, Indore, INDIA
SP - 379-385
IS - 8
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
467 295 downloads 133 downloads
  
  
           

Abstract

A new pixel selection technique has been introduced where data embedding starts from middle region (one or more than one pixel) of the image. Successively, diagonal pixels of middle region are selected for further embedding the data. The diagonal pixels form a quadrilateral where data are embedded through four edges of quadrilateral with clockwise manner. A hash based method is also initiated for embedding the data into the pixel of an image taking one bit position out of four LSB bits where one bit of secret data is embedded. We propose a variable hash key function for the selection of bit position so that intruder cannot guess the actual bit position of secret information easily. Our proposed method has achieved good PSNR and high capacity of secret information compared to different pixel value differencing method (PVD).

Key-Words / Index Term

LSB, middle region, Cryptography, Image Steganography, e-Banking

References

[1] Behrouz A. Forouzan , “Data Communication and Networking “,MacGraw Hill Education ( India) Private Limited.
[2] N. Provos, P. Honeyman, “Hide and Seek: An Introduction to Steganography”, IEEE Security and Privacy, Vol. 1, No. 3, pp. 32–44,2003 .
[3] A. Kumar ,K. M. Pooja , “Steganography a Data Hiding Technique” , International Journal of Computer Applications, Vol-9,No-7,Nov 2010.
[4] W. bender, D. Gruhl, N. Morimoto, A.Lu, “Techniques for data hiding”, IBM Systems Journal Vol. 35(3-4),pp. 313-336, 1996.
[5] A. Sarkar, S.Karforma, “ A new pixel selection Technique of LSB based steganography for data hiding”,IJRCS, Vol-5,Issue-3,pp.12-125,March 2018.
[6] D.C. Wu, and W.H. Tsai, “A Steganographic method for images by pixel-value differencing”, Pattern Recognition Letters, Vol. 24, pp. 1613-1626, 2003.
[7] J. K. Mandal ,D. Das, “Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain”, International Journal of Information Sciences and Techniques (IJIST) Vol.2, No.4, July 2012.
[8] H.C. Wu, N.I. Wu, C.S. Tsai , M.S. Hwang, “Image Steganographic Scheme Based on Pixel Value Differencing and LSB Replacement Method”, IEEE Proceedings on Vision, Image and Signal processing, Vol. 152, No. 5,pp. 611-615, 2005.
[9] G.R. Manjula ,A. Danti “A novel hash based LSB (2-3-3) image steganography in spatial domain”, International Journal of Security, Privacy and Trust Management (IJSPTM) Vol. 4, No 1, February 2015 .
[10] P. Bharti ,R. Soni, “ A new approach of data hiding in images using cryptography and Steganography”,IJOCA,vol. 58,no. 8,Nov 2012.
[11] Ali Akbar Nikoukar, “An Image Steganography Method with High Hiding Capacity Based on RGB Image”, International Journal of Signal and Image Processing, Vol. 1,Issue.4, pp. 238-241,2010.
[12] Ran Zan Wang, Chi Fang Lib, Ja Chen Lin, “Image hiding by optimal LSB substitution and Genetic algorithm”, Pattern Recognition Society. Published by Elsevier Science Ltd., pp.671-683, 2001.
[13] N. Kaur, A .Garg, “Steganography Using PSO Based Hybrid Algorithm”, International Journal of Advanced Research in Computer Science and Software Engineering,Vol-4,Issue.1,Nov 2014.