Open Access Open Access  Restricted Access Subscription or Fee Access

Image Segmentation Based Steganography Model with Increased Security for Information Transmission

Mamta Juneja, Rajni Mohana

Abstract


Steganography is a process that involves hiding a message in an appropriate carrier like image or audio. It is of Greek origin and means "covered or hidden writing". The carrier can be sent to a receiver without any one except the authenticated receiver only knows existence of the information. Steganography is an emerging area which is used for secured data transmission over any public media. Considerable amount of work has been carried out by different researchers on steganography. In this paper, a specific image based steganography technique for communicating information more securely between two locations is proposed. The author incorporated the idea of secret key and password security features for authentication at both ends in order to achieve high level of security. As a further improvement of security level, the information has been permuted, encoded and then finally embedded on an image to form the stego image. Besides this segmented objects extraction and reassembly of the stego image through normalized cut method has been carried out at the sender side and receiver side respectively in order to prevent distortion of the Stego image during transmission.


Keywords


Steganography, Cover Image, Stego Image, Normalized Cut.

Full Text:

PDF

References


Gustavus J. Simmons, "The Prisoners' Problem and the Subliminal Channel", in Proceedings of CRYPTO '83, pp 51-67. Plenum Press (1984).

“Stretching the Limits of Steganography", RJ Anderson in Information Hiding, Springer Lecture Notes in Computer Science v 1174 (1996) pp 39-48

D. Kahn, The Codebreakers - the comprehensive history of secret communication from ancient times to the Internet, Scribner, New York (1996).

J. Shi and J. Malik, "Normalized Cuts and Image Segmentation," Int.Conf. Computer Vision and Pattern Recognition, San Juan, Puerto Rico, June 1997.

Scott Craver, "On Public-key Steganography in the Presence of an Active Warden," in Proceedings of 2nd International Workshop on Information Hiding, April 1998, Portland, Oregon, USA. pp. 355 - 368.

Ross J. Anderson and Fabien A.P. Petitcolas, "On the limits of steganography," IEEE Journal on Selected Areas in Communications (J-SAC), Special Issue on Copyright & Privacy Protection, vol. 16 no.4, pp 474-481, May 1998.

N. F. Johnson and S. Jajodia, "Steganography: seeing the unseen," IEEE Computer.,Feb., 26-34 (1998).

L. M. Marvel, C. G. Boncelet, Jr. and C. T. Retter, "Spread spectrum image steganography," IEEE Trans. on Image Processing, 8(8), 1075-1083 (1999).

Digital Watermarking :A Tutorial Review S.P.Mohanty ,1999.

J. Shi and J. Malik, "Normalized cuts and image segmentation.,"IEEE Trans. PAMI, vol. 22, no. 8, pp. 888-905, 2000.

Y. K. Lee and L. H. Chen, "High capacity image steganographic model," IEE Proc.-Vision, Image and Signal Processing, 147(3), 288-294 (2000).

Analysis of LSB Based Image Steganography Techniques ,R. Chandramouli, Nasir Memon, Proc. IEEE ICIP, 2001.

An Evaluation of Image Based Steganography Methods,Kevin Curran, Kran Bailey, International Journal of Digital Evidence,Fall 2003

Silvia Torres Maya,Mariko Nakano and Ruben Vazquez Medina “Robust Steganography using Bit Plane Complexity Segmentation”1st International Conference on Electrical and Electronics Engineering ,2004.

T Mrkel,JHP Eloff and MS Olivier .”An Overview of Image Steganography,”in proceedings of the fifth annual Information Security South Africa Conference, 2005.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.