Abstract

The degree of imperceptibility of hidden image in the ‘Digital Image Steganography’ is mostly defined in relation to the limitation of Human Visual System (HVS), its chances of detection using statistical methods and its capacity to hide maximum information inside its body. Whereas, a tradeoff does exist between data hiding capacity of the cover image and robustness of underlying information hiding scheme. This paper is an exertion to underline the technique to embed information inside the cover at Stego key dependent locations, which are hard to detect, to achieve optimal security. Hence, it is secure under worst case scenario where Wendy is in possession of the original image (cover) agreed upon by Alice and Bob for their secret communication. Reliability of our proposed solution can be appreciated by observing the differences between cover, preprocessed cover and Stego object. Proposed scheme is equally good for color as well as gray scaled images. Another interesting aspect of this research is that it implicitly presents fusion of cover and information to be hidden in it while taking care of passive attacks on it

Highlights

  • The word Steganography is derived from Greek means “Hidden Writing” [1] and dates back to 440 B.C. [2]

  • Some earlier examples as reported in [3] include: shaving scalp of a most trusted slave to etch a secret message and waiting for the hair to grow after which he was sent to allies who retrieves it by reshaving his head; engraving messages on wooden Tablet and covering it wax

  • Steganography is an ancient art [5] that with technological revolution has been evolved into a science [6] to avert detection of hidden data. [7] delivered terminology for steganography while Simmon [8] gave the first model for steganography by discussing the scenario of Alice and Bob held in separate prison cells had to communicate through Warden Wendy

Read more

Summary

Introduction

The word Steganography is derived from Greek means “Hidden Writing” [1] and dates back to 440 B.C. [2]. Some earlier examples as reported in [3] include: shaving scalp of a most trusted slave to etch a secret message and waiting for the hair to grow after which he was sent to allies who retrieves it by reshaving his head; engraving messages on wooden Tablet and covering it wax. The receiver retrieves it by melting the coated wax. Types of steganographic system are discussed in [9] as pure (with no Stego key), private key and public key respectively whereas three techniques for steganography including insertion, substitution and cover generation have been discussed in [10]

Methods
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.