Open Access   Article Go Back

DATA HIDING IN IMAGE BY OPTIMAL RANDOM SUBSTITUTION

Nisha 1 , Kusu 2

Section:Research Paper, Product Type: Journal Paper
Volume-2 , Issue-6 , Page no. 22-24, Jun-2014

Online published on Jul 03, 2014

Copyright © Nisha , Kusu . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Nisha , Kusu, “DATA HIDING IN IMAGE BY OPTIMAL RANDOM SUBSTITUTION,” International Journal of Computer Sciences and Engineering, Vol.2, Issue.6, pp.22-24, 2014.

MLA Style Citation: Nisha , Kusu "DATA HIDING IN IMAGE BY OPTIMAL RANDOM SUBSTITUTION." International Journal of Computer Sciences and Engineering 2.6 (2014): 22-24.

APA Style Citation: Nisha , Kusu, (2014). DATA HIDING IN IMAGE BY OPTIMAL RANDOM SUBSTITUTION. International Journal of Computer Sciences and Engineering, 2(6), 22-24.

BibTex Style Citation:
@article{_2014,
author = {Nisha , Kusu},
title = {DATA HIDING IN IMAGE BY OPTIMAL RANDOM SUBSTITUTION},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {6 2014},
volume = {2},
Issue = {6},
month = {6},
year = {2014},
issn = {2347-2693},
pages = {22-24},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=189},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=189
TI - DATA HIDING IN IMAGE BY OPTIMAL RANDOM SUBSTITUTION
T2 - International Journal of Computer Sciences and Engineering
AU - Nisha , Kusu
PY - 2014
DA - 2014/07/03
PB - IJCSE, Indore, INDIA
SP - 22-24
IS - 6
VL - 2
SN - 2347-2693
ER -

VIEWS PDF XML
3860 3679 downloads 3864 downloads
  
  
           

Abstract

The importance of reducing a chance of the Information being detected during the transmission is being an issue now days. Some solution to be discussed is how to pass information in a manner that the very existence of the message is unknown in order to repel attention of the potential attacker. Steganography comes from Greek and literally means �Covered writing�. Steganography is closely related to hidden channel scheme. It is the art and science of writing of hidden message in such a way that no one apart of intended recipients knows the existence of message. Steganography is often confused with cryptography because the two are almost similar in the way that they both are used to protect confidential information. The difference between the two is in the appearance in the processed output; the output of steganography operation is not apparently visible but in cryptography the output is scrambled so that it can draw attention. Applications of both are in the field of communication system, Steganography coding inside transport layer such as an MP3 file and in the defence system.

Key-Words / Index Term

Steganography, Spatial Domain, Transform Domain: Steganography, Spatial Domain, Transform Domain

References

[1]. YambemJinaChanu, ThemrichonTuithung, Kh.Manglem Singh�short survey on image steganography and steganalysis techniques� ,978-1-4577-0748-3/ 2012 IEEE.
[2]. GeHuayong , Huang Mingsheng, Wang Qian, �Steganography and steganalysis based on digital images �978-1-4244-9306-7 2011IEEE conference on image and signal processing.
[3]. Vijay Kumar,Dinesh Kumar, �Performance evaluation of DWT based image steganography� 223-228 ,2010 IEEE 2nd international advance computing conference .
[4]. R.Amrittharajan,Sandeepkumarbehera,AbhilashSwarup, �Colour guided colour image steganography � universal journal of computer science and engineering technology 16-23,oct. 2010
[5]. Prabakran.G, Bhavani.R � A modified secure digital image steganography based on discrete wavelet transform�, 1096-1100, 2012 IEEE
[6]. Chi-Kwong Chan∗, L.M. Cheng �Hiding data in image by simple LSb substitution�, the journal of the pattern recognition society, pattern recognition 37(2004) 469-474
[7]. R.Amritharajan,r.akila,P.Deepikachowdavarapu,�A comparative analysis of image Steganography� international journal of computal applications (0975-8887) ,volume 2-No.3,May-2010.
[8]. W.Bender,D.Garhul,N.Morimoto,A.Lu,� Techniques for data hiding� IBM System journal VOL.35,NOS 3&4,199
[9]. Hide and seek: An introduction to steganography, 1540- 7993,2003 IEEE security and privacy
[10]. SANS institute infosec reading room :steganography : past, present ,future
[11]. MiroslavDobsicek :Modern Steagnography