Open Access Open Access  Restricted Access Subscription or Fee Access

Modified and Highly Enhanced Matrix Approach Method of Steganography

Sridevi Thota, Bhanu Prakash Panchakarla, Phanindra Sai Srinivas Gudipudi, Ramana Vara Mounika Penugonda

Abstract


Data security is a major threat in every field today. Data security can be provided in several ways, but one of the most common disadvantages is that it is highly difficult to retrieve the message unless the encoded key is known. Also these algorithms reveal the existence of message; although the message is encoded, and so reliability on these algorithms is of no use. One approach to overcome most of these drawbacks is to use Steganographic techniques. Steganography process hides the data in multimedia file so that no one knows the existence of hidden data except the sender and receiver. This paper presents a highly enhanced matrix approach algorithm through which a large amount of data can be hidden inside an image file. This algorithm ensures the security and safety of hidden data. Thus the algorithm can be extended to the fields of Defence, Internet and other applications where data security is of primary concern.

Keywords


Cryptography, Embed Messages, LSB Algorithm, Steganography

Full Text:

PDF

References


Y. Chen, H. Pan, and Y. Tseng, “A secure Data Hiding Scheme for Two-Color Images,” IEEE Symposium on Computers and Communications, 2000.

C. Cachin,”An Information-Theoritic Model for Steganography”, Proc. of the 2nd International Workshop on Information Hiding, Portland, Oregon, USA, 15-17 Apr 1998, Lecture notes in CS, Vol.1525, Springer-Verlag.

N. Johnson and S. Jajodia, “Exploring steganography: seeing the unseen,” IEEE Computer, pp. 26-34, February 1998.

R. Chandramouli and Nasir Memon, "Analysis of LSB Based Image Steganography Techniques",2001 International Conference on Image Processing, October 7-10, 2001, Thessaloniki, Greece, Vol. 3, pp. 1019-1022.

1. Johnson, N. F. and Jajodia, S. (1998). Exploring steganography: Seeing the unseen. Computer, 31(2):26–34.

C.T.Hsu and J.L.Wu.,”Hidden Signatures in Images”, Proc. IEEE International Conf. on Image Processing, ICIP-96, Vol.3, pp.223-226.

Niels-Provos, Peter Honeyman, Hide and Seek: Introduction to steganography (2003).

K. Curran and K. Bailey, "An Evaluation of Image Based Steganography Methods," International Journal of Digital Evidence, vol. 2, issue 2, pp. 1-40, Fall 2003.

Luis von Ahn, Nicholas J. Hopper., Public Key Steganography.

Robert Krenn. Steganography and steganalysis.

G Sahoo, R K Tiwari “Designing an Embedded Algorithms for Data Hiding using Steganographic Technique by File Hybridization” , IJCSNS, vol 8, No 1,pp-226-233, January 2008

Ahmed Al-Jaber, Khair Eddin Sabri “Data Hiding in a Binary Image”

Nirmalya Chowdhury, Puspitha Manna “An Efficient Method of Steganography using Matrix Approach”

James C. Judge “Steganography: past, present, future”, GSEC Version 1.2f

Gajendra Singh Chandel, Ravindra Gupta, Swati Jain“Proposed Model of dynamic encryption using Steganography”, IJETAE, vol 2, issue 9, 2012.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.