A Study On Steganographic Lsb Images By Varying Encryption Algorithms

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2019 by IJCTT Journal
Volume-67 Issue-10
Year of Publication : 2019
Authors : Dr. Amit Kumar Chaturvedi, Jahangeer Mohi ud din Lone
DOI :  10.14445/22312803/IJCTT-V67I10P107

MLA

MLA Style:Dr. Amit Kumar Chaturvedi, Jahangeer Mohi ud din Lone"A Study On Steganographic Lsb Images By Varying Encryption Algorithms," International Journal of Computer Trends and Technology 67.10 (2019):39-45.

APA Style Dr. Amit Kumar Chaturvedi, Jahangeer Mohi ud din Lone. A Study On Steganographic Lsb Images By Varying Encryption Algorithms International Journal of Computer Trends and Technology, 67(10),39-45.

Abstract
In the digital world online exchange of information is utmost need. During the last decade internet world is more serious on the exchange of information using the steganography. Varieties of techniques are proposed to exchange information secretly so that mediators will not disturb the message and exchange of information takes place safely and successfully. The steganoraphy is the one technique used for exchanging the information or message secretly by hiding it in another multimedia cover. In this paper, we have tried to explore the underlying technology used for steganography and steganalysis. This paper is desiged to analyze the effects of encryption algorithms on the coloured image cover and on the LSB and it is found that research is required to develop a robust steganographic system to generate the stego-image

Reference
[1] Jie Yang, Songbin Li, ?Steganalysis of Joint Codeword Quantization Index Modulation Steganography Based on Codeword Bayesian Network?, Neurocomputing, Jun 2018.
[2] Mansi S. Subhedar, Vijay H. Mankar, ?Current status and key issues in image steganography: A survey?, Computer Science Review, Elsevier, Sep 2014
[3] Xiang-Yang Luo, Dao-Shun Wang, Ping Wang, Fen-Lin Liu, ?Journal of Signal Processing?, vol. 88 (2008), pp. 2138– 2157
[4] Konstantinos Karampidis, Ergina Kavallieratou, Giorgos Papadourakis, ?A review of image steganalysis techniques for digital forensics?, Journal of Information Security and Applications, vol 40 (2018), pp. 217–235, Apr 2018
[5] Shuming Jiaoa, Changyuan Zhoua, Yishi Shib, Wenbin Zoua, Xia Lia, ?Review on optical image hiding and watermarking techniques?, Optics and Laser Technology, vol. 109 (2019), pp. 370–380, May 2018.
[6] Ersin Esen, A. Ayd?n Alatan, ?Comparison of Forbidden Zone Data Hiding and Quantization Index Modulation?, Journal of Digital Signal Processing, Vol. 22 (2012), pp. 181–189, Oct 2011
[7] Oswaldo Juarez-Sandoval, Angelina Espejel-Trujillo, Mariko Nakano-Miyatake, Hector Perez-Meana, ?Robust Steganography Based on QIM Algorithm to Hide Secret Images?, INTERNATIONAL JOURNAL OF COMPUTERS, Issue 4, Volume 7, 2013, pp. 145-152
[8] Abbas Cheddad, Joan Condell, Kevin Curran, Paul McKevitt, ?Digital image steganography: Survey and analysis of current methods?, Journal of Signal Processing, vol 90 (2010), pp. 727–752, Sep 2009
[9] Hafiz Malik, K. P. Subbalakshmi, R. Chandramouli, ?Steganalysis of QIM Steganography?, IEEE Transactions on Multimedia, Science Direct, 2013
[10] Sofiane Braci, Claude Delpha, Remy Boyer, ?How quantization based schemes can be used in image steganographic context?, Elsevier, Signal Processing: Image Communication, vol. 26, Jul 2011, pp. 567–576
[11] Pascal Lefèvre, Philippe Carré, Philippe Gaborit, ?Application of rank metric codes in digital image watermarking?, Elsevier, Journal of Signal Processing Image Communication, Dec 2018
[12] Vitaly Mitekina, Victor Fedoseev, ?A new QIM-based watermarking algorithm robust against multiimage histogram attack?, 3rd International Conference ?Information Technology and Nanotechnology?, ITNT-2017, 25-27, April 2017, Samara, Russia, Procedia Engineering 201 (2017) 453–462
[13] Hai Tao, Li Chongmin,Jasni Mohamad Zain, Ahmed N. Abdalla, ?Robust Image Watermarking Theories and Techniques: A Review?, Robust Image Watermarking Theories and Techniques: A Review, pp. 122-138, Vol. 12, February 2014
[14] Amit Phadikar, ?Multibit quantization index modulation: A high-rate robust data-hiding method?, Journal of King Saud University – Computer and Information Sciences (2013), vol. 25, pp. 163–171
[15] Nisreen I. Yassin, Nancy M. Salem, Mohamed I. El Adawy, ?QIM blind video watermarking scheme based on Wavelet transform and principal component analysis?, Alexandria Engineering Journal (2014), vol 53, pp. 833–842
[16] Hafiz Malik, ?Steganalysis of QIM Steganography Using Irregularity Measure?, Conference: Proceedings of the 10th workshop on Multimedia & Security, MM&Sec 2008, Oxford, UK, September 22-23, 2008, available at 2008 ACM 978-1-60558-058-6
[17] Ismail Avc?bas, Nasir Memon, Bülent Sankur, ?Steganalysis Using Image Quality Metrics?, IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 12, NO. 2, FEBRUARY 2003, pp. 221-229.

Keywords
stego-image, steganography, steganalysis, encryption, DCT, IQM, embedding, hidden message.