Open Access   Article Go Back

A Novel Gray Code based Image Steganography Model for Covert Communication

Sangeeta 1 , Jyoti Pandey2 , Kamaldeep Joshi3 , Rainu Nandal4

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-6 , Page no. 1279-1288, Jun-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i6.12791288

Online published on Jun 30, 2018

Copyright © Sangeeta, Jyoti Pandey, Kamaldeep Joshi, Rainu Nandal . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Sangeeta, Jyoti Pandey, Kamaldeep Joshi, Rainu Nandal , “A Novel Gray Code based Image Steganography Model for Covert Communication,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.1279-1288, 2018.

MLA Style Citation: Sangeeta, Jyoti Pandey, Kamaldeep Joshi, Rainu Nandal "A Novel Gray Code based Image Steganography Model for Covert Communication." International Journal of Computer Sciences and Engineering 6.6 (2018): 1279-1288.

APA Style Citation: Sangeeta, Jyoti Pandey, Kamaldeep Joshi, Rainu Nandal , (2018). A Novel Gray Code based Image Steganography Model for Covert Communication. International Journal of Computer Sciences and Engineering, 6(6), 1279-1288.

BibTex Style Citation:
@article{Pandey_2018,
author = {Sangeeta, Jyoti Pandey, Kamaldeep Joshi, Rainu Nandal },
title = {A Novel Gray Code based Image Steganography Model for Covert Communication},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {6 2018},
volume = {6},
Issue = {6},
month = {6},
year = {2018},
issn = {2347-2693},
pages = {1279-1288},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2340},
doi = {https://doi.org/10.26438/ijcse/v6i6.12791288}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i6.12791288}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2340
TI - A Novel Gray Code based Image Steganography Model for Covert Communication
T2 - International Journal of Computer Sciences and Engineering
AU - Sangeeta, Jyoti Pandey, Kamaldeep Joshi, Rainu Nandal
PY - 2018
DA - 2018/06/30
PB - IJCSE, Indore, INDIA
SP - 1279-1288
IS - 6
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
476 325 downloads 211 downloads
  
  
           

Abstract

In the steganography, data are covered in terms that prevent mystery data. It`s for the most part intention is exchanging information starting with one area, then onto the next area. It implies disguised mystery information inside the other information in a way that a pundit can`t discover the presence of genuine topics. In steganography we shroud data with a mixed media bearer i.e. picture, content, sound, video documents, and so forth. In this way, that eyewitness can`t locate the concealed data which we need to send to the recipient. Steganography principle objective is to give heartiness, perceptibility, limit of shrouded information because of which it varies from different strategies, for example, watermarking and cryptography. In picture steganography we conceal our mystery information in the picture with the goal that the spectator can`t feel its reality. Steganography need is that the cover picture must be accurately picked. A characteristic picture should not to be used, it is better for stenographer to make their own specific pictures. Disguising the mystery information in the pictures, different sorts of techniques are utilized as a part of which some are more grounded than others to hide the information. In this paper a new method is used by using the gray code. Firstly, select the pixels in which message is embedded and then these pixels convert into ASCII code and apply the gray code method in the 7th bits of pixels and encoded pixels. The main advantage is only one bit is changed in each step. This method makes extraction of real message difficult. If an attacker come to know about the secret message in an image then will be not able to know the real message as it has to be added in the 7th bit by changing the binary code to gray code.

Key-Words / Index Term

steganography, LSB, gray code, ASCII code, PSNR, MSE

References

[1]. S. Shahreza and M. Shahreza, “Steganographyin Textiles”, 4th International Conference on Information Assurance and Security, Volume 3, Issue 6, pp. 5661, 2008.
[2]. S. Batra, R. Rishi and Rajkumar , ”Insertion of Message in 6th, 7th and 8th bit of pixel values and its retrievals in case intruder changes the least significant bits of image pixels‏”, International Journal of security and its applications, Volume 4,Issue 3, pp. 1-10, 2010.
[3]. Parvinder, S. Batra and H. Sharma, “Evaluating the Performance of Message Hidden in First and Second Bit Plane”, W SEAS Transaction on Information International Journal of Computer Applications, Volume. 2, Issue. 86, pp. 1220- 1222, 2005.
[4]. K. Bailey, and K. Curran, “An evaluation of image based steganography methods”, Multimedia Tools, Volume 2, Issue 2, pp. 55–88, 2006.
[5]. S. Manaseer, A. Aljawawdehand and D. Alsoudi, “A new Image steganography depending on reference & LSB”, International Journal of Applied Engineering Research ISSN 0973-4562, Volume 12, Issue 9, pp. 1950-1955, 2017.
[6]. K. Joshi, R. Yadav and G. Chawla, “An Enhanced method for data hiding using 2 bit XOR in image steganography”, International Journal of engineering and technology, Volume 8, Issue 6, pp. 3043-3055, 2017.
[7]. K. Qazanfari, R. Safabakhsh, “A new steganography method which preserves histogram: generalization of LSB”, International Journal of Engineering, Volume 277, Issue 7, pp. 90-101, 2017.
[8]. P. Li and A. Lu ,“LSB-based Steganography Using Reflected Gray Code for Color Quantum Images”, International Journal of Theoretical Physics, Volume 57, Issue 5, pp. 1516-1548, 2018.
[9]. A. Kumar Bairagi, “ASCII based Even-Odd Cryptography with Gray code and Image Steganography: A dimension in Data Security”, International Journal of Engineering, Volume 01, Issue 02, pp.2078-5828, 2011.
[10]. C. Chen, C. Chang, “LSB-Based Steganography Using Reflected Gray Code”, IEICE - Transactions on Information and Systems, Volume E91-D, Issue 4, pp. 1110-1116, 2008.
[11]. Chang and Tsang ,“Performance Evaluation of a Steganographic Method for Digital Images Using Side Match”, Conference on Innovative Computing, Information and Control, Volume 25, Issue 12, pp.1431-1437, 2006.
[12]. H.Wu, Tsai, N. Wu, Hwang, “Image steganographic scheme based on pixel-value differencing and LSB replacement methods”, IEE Proceedings - Vision, Image and Signal Processing, Volume 152, Issue 5, pp.611-615, 2005.
[13]. K. Joshi and R. Yadav , “A New Method of Image Steganography using Last Three Bit Plane of Gray Scale Images”, Indian Journal of Science and Technology, Volume 10,Issue 38, 2017.
[14]. K. Joshi and R. Yadav, “A new LSB-S image steganography method blend with Cryptography for secret communication”, Conference: Third International Conference on Image Information Processing, pp. 86-90, 2015.
[15]. M. Chaudhary, K. Joshi, R. Yadav, R. Nanda, “Survey on Image Steganography and its Techniques”, International Journal of Engineering and Technology, 2017.
[16]. A Saini, K Joshi, K Sharma, R Nandal, “An Analysis of LSB Technique in Video Steganography using PSNR and MSE”, International Journal, Volume 8, Issue 5, 2017.
[17]. A. Faruq and H.S. Ghwanmeh, “An innovative information hiding technique utilizing cumulative peak histogram regions”, Journal of Systems and Information Technology, Volume 14, Issue 4, pp. 336-352, 2012.