Open Access   Article Go Back

A Novel Approach for Secure overlay Image Selection in Steganography

J. Chandrashekhara1 , Vinay S.2

  1. DoS in Computer Science, Davangere University, Davangere, India.
  2. DoS in Computer Science, Davangere University, Davangere, India.

Section:Research Paper, Product Type: Journal Paper
Volume-11 , Issue-6 , Page no. 10-14, Jun-2023

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v11i6.1014

Online published on Jun 30, 2023

Copyright © J. Chandrashekhara, Vinay S. . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: J. Chandrashekhara, Vinay S., “A Novel Approach for Secure overlay Image Selection in Steganography,” International Journal of Computer Sciences and Engineering, Vol.11, Issue.6, pp.10-14, 2023.

MLA Style Citation: J. Chandrashekhara, Vinay S. "A Novel Approach for Secure overlay Image Selection in Steganography." International Journal of Computer Sciences and Engineering 11.6 (2023): 10-14.

APA Style Citation: J. Chandrashekhara, Vinay S., (2023). A Novel Approach for Secure overlay Image Selection in Steganography. International Journal of Computer Sciences and Engineering, 11(6), 10-14.

BibTex Style Citation:
@article{Chandrashekhara_2023,
author = {J. Chandrashekhara, Vinay S.},
title = {A Novel Approach for Secure overlay Image Selection in Steganography},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {6 2023},
volume = {11},
Issue = {6},
month = {6},
year = {2023},
issn = {2347-2693},
pages = {10-14},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=5586},
doi = {https://doi.org/10.26438/ijcse/v11i6.1014}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v11i6.1014}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=5586
TI - A Novel Approach for Secure overlay Image Selection in Steganography
T2 - International Journal of Computer Sciences and Engineering
AU - J. Chandrashekhara, Vinay S.
PY - 2023
DA - 2023/06/30
PB - IJCSE, Indore, INDIA
SP - 10-14
IS - 6
VL - 11
SN - 2347-2693
ER -

VIEWS PDF XML
154 278 downloads 100 downloads
  
  
           

Abstract

Steganography is a technique for obscuring sensitive data in images or other media so that it cannot be accessed by nefarious parties. Image steganography hides secret messages inside pictures so only the person sending the message and the one receiving it can see what it says. Image steganography uses images to hide extra data by including or changing its image bits. We came up with a new way to share information called "Novel LSB Method” (NLSBM). It starts by turning the words into a picture so that it`s safe to share. This means that the way the text looks is changed, but the actual words stay the same. This is done to ensure that the text is safe when it is sent. You can use different types of pictures, like black and white or colourful, to do secure transmission. Our new way of hiding messages is really helpful because you don`t need another picture to hide your message in. Also, it is small and very fast compared to older methods.

Key-Words / Index Term

Steganography, Secure transmission, NLSBM, Cover selection.

References

[1]. N. F. Johnson and S. J. Steganalysis, “The Investigation of Hidden Information,” IEEE Information Technology Conference, Syracuse, New York, USA, September 1-3, pp.113-116, 1998.
[2]. A. A. Abdelwahab and L. A. Hassaan, “A discrete wavelet transform based technique for image data hiding,” Radio Science Conference, Egypt, pp.1–9, 2008.
[3]. S. Katzenbeisser, in Information Hiding Techniques for Steganography and Digital Watermarking, Fabien and A. P. Petitcolas ed., Artech House, December 31, 1999.
[4]. J. J. Roque and J. M. Minguet. “SLSB: improving the steganographic algorithm LSB,” Ibero-American Congress on Information Security (CIBSI), 2009.
[5]. Uruguay.R. Chandramouli and N. D. Memon. “Analysis of LSB based image steganography techniques,” in Proc. IEEE ICIP, Vol.3, pp.1019-1022, 2001.
[6]. Nidhi Sethi and Deepika Sharma, (2012) “A novel method of image encryption using logistic mapping”, in Proc. of International Journal of Computer Science Engineering (IJCSE), Vol.1, No.2, pp.115-119, 2012.
[7]. Arun A.S. and George M. Joseph, (2013) “High Security Cryptographic Technique using Steganographjy and Chaotic Image Encryption”, in Proc. of Journal of Computer Engineering (IOSRJCE), Vol.2, pp.49-54, 2013.
[8]. Kousik Dasgupta, J. K. Mandal, and Paramartha Dutta, (2012) “Hash Based Least Significant Bit Technique For Video Steganography(HLSB)”, in Proc. of International Journal of Security, Privacy and Trust Management (IJSPTM), Vol.1, No.2, pp.1-11, 2012.
[9]. C. Everett, “Should encryption software be banned?” Network Security, Vol.2016, Issue.8, pp.14–17, 2016. https://doi.org/10.1016/S1353-4858(16)30078-2
[10]. H. Sajedi, “Steganalysis based on steganography pattern discovery,” Journal of Information Security and Applications, Vol.30, pp.3–14, 2016. https://doi.org/10.1016/j.jisa.2016.04.001
[11]. Akhtar, N.; Johri, P.; Khan, S. (2013): Enhancing the security and quality of LSB based image steganography. 5th International Conference and Computational Intelligence and Communication Networks, pp.385-390, 2013.
[12]. Baby, A.; Krishnan, H. (2017): Combined strength of steganography and cryptography-a literature survey. International Journal of Advanced Research in Computer Science, Vol.8, A Novel Approach of Image Steganography for Secure Communication, 2017.
[13]. Chatterjee, A.; Das, A. K. (2018): Secret communication combining cryptography and steganography. Progress in Advanced Computing and Intelligent Engineering, pp.281-291, 2018.
[14]. Halder, T.; Karforma, S.; Mandal, R. (2019): A block-based adaptive data hiding approach using pixel value difference and LSB substitution to secure e-governance documents. Journal of Information Processing Systems, Vol.15, no.2, pp.261-270, 2019.
[15]. Kumar, M. V.; Mamatha, E.; Reddy, C. S.; Mukesh, V.; Reddy, R. D. (2017): Data hiding with dual based reversible image using sudoku technique. International Conference on Advances in Computing, Communications and Informatics, pp.2166-2172, 2017.
[16]. R. Kaur, B. Singh, I. Singh, A Comparative Study of Combination of Different Bit Positions in Image Steganography, International Journal of Modern Engineering Research (IJMER), Vol.2, Issue.5, pp.3835-3840, 2012.
[17]. M. Singh, R. Sharma, D. Garg, A New Purposed Issue for Secure Image Steganography Technique Based On 2-D Block DCT and DCT, International Journal of Advanced Research in Computer Science and Software Engineering, Vol.2, Issue.7, pp.29-34, 2012.
[18]. A. A. Ali, A. H. S. Saad, New Image Steganography Method by Matching Secret Message with pixels of Cover Image (SMM), International Journal of Computer Science Engineering and Information Technology Research (IJCSEITR), Vol.3, Issue.2, pp.1-10, 2013.
[19]. G. Kaur, A. Kochhar, Transform Domain Analysis of Image Steganography, International Journal for Science and Emerging Technologies with Latest Trends” Vol.6, Issue.1, pp.29-37, 2013.
[20]. K. Wu, W. Chung-Ming, Steganography using reversible texture synthesis. IEEE Transactions on Image Processing Vol.24, Issue.1, pp.130-139, 2015.
[21]. L. Guo, J. Ni, Y.Q. Shi, Uniform embedding for efficient JPEG steganography. IEEE Transactions on Information Forensics and Security Vol.9, Issue.5, pp.814–825, 2014.
[22]. V. Sedighi, J. Fridrich (2016) Effect of saturated pixels on security of steganographic schemes for digital images. IEEE International Conference Image Processing (ICIP), pp.2747-2751, 2016.
[23]. A. El Sayed, A. Elleithy, P. Thunga, Z. Wu (2015) Highly secure image steganography algorithm using curvelet transform and DCT encryption. 2015 Long Island Systems, Applications and technology (LISAT), pp.15295289, 2015.
[24]. R. Yang, Z. Zheng, J. Wei, Cover selection for image steganography based on image characteristics. Journal of Optoelectronics Laser Vol.25, Issue.4, pp.764–768, 2014.
[25]. Z. Wang, X. Zhang, Secure cover selection for steganography. IEEE Access 7, pp.57857–57867, 2019.