Image Steganography by Enhanced Pixel Indicator Method Using Most Significant Bit (MSB) Compare

International Journal of Computer Trends and Technology (IJCTT)
© 2014 by IJCTT Journal
Volume-15 Number-3
Year of Publication : 2014
Authors : Vijaya Raghava Kukapalli , Dr.B. Tarakeswara Rao , Mr.B.Satyanarayana Reddy
DOI :  10.14445/22312803/IJCTT-V15P122


Vijaya Raghava Kukapalli , Dr.B. Tarakeswara Rao , Mr.B.Satyanarayana Reddy. "Image Steganography by Enhanced Pixel Indicator Method Using Most Significant Bit (MSB) Compare". International Journal of Computer Trends and Technology (IJCTT) V15(3):97-101, Sep 2014. ISSN:2231-2803. Published by Seventh Sense Research Group.

Abstract -
Steganography is one of the secure ways of protecting data. It provides secrete communication between user and client. The current paper presents an enhanced Pixel Indicator Method (PIM) by comparing three MSB bits at each pixel to embed the data. And we also use Blowfish algorithm to convert message into cipher text. By using the combination of these two techniques we can achieve greater complexity. Due to this mechanism proposed method makes the message difficult to be discovered with less distortion and embedding rates.

[1]Enhanced chaotic key-based algorithm for low-entropy image encryptionYavuz, E.Yazici, R. Kasapbasi,M.C.Yamac, E.Signal Processing and Communications Applications Conference(SIU),s201422nd DOI: 10.1109/SIU.2014.6830246Publication Year: 2014, Page(s): 385 - 388
[2] A novel steganography method for image based on Huffman EncodingDas, R. ; Tuithung, T.Emerging Trends and Applications in Computer Science (NCETACS), 2012, 3rdNationalConference n DOI: 10.1109/NCETACS .2012.6203290 Publication Year: 2012, Page(s): 14 - 18.
[3] Enhancing the Security and Quality of LSB Based ImageSteganographyAkhtar, N. Johri,P. Khan,S.Computational Intelligence and Communication Networks (CICN), 20135 thInternational Conferenceon DOI: 10.1109/CICN.2013.85 Publication Year: 2013 , Page(s): 385 - 390
[4] Potdar, Vidyasagar M., Song Han, and Elizabeth Chang,"Finger printed secret sharing steganography for toughness against image crop attacks", INDIN`05. 2005 3rd IEEE International Conference, 2005, pp. 717-724.
[5] Lou, Der-Chyuan, and Jiang-Lung Liu, "Steganographic method for secure communications", Computers & Security 21, no. 5, 2002, pp. 449-460.
[6] Gutub, Adnan, Mahmoud Ankeer, Muhammad Abu-Ghalioun, AbdulrahmanShaheen, and AleemAlvi, "Pixel indicator soaring capacity performance for RGB image based Steganography", WoSPA 2008-5th IEEE International.
[7] Evaluating image steganography techniques: Future research challengesRoy, Ratnakirti Changder,Suvamoy ; Sarkar,Anirban ; Debnath, NarayanComputing, Management and Telecommunications (ComManTel), 2013 International Conference,on DOI: 10.1109/ComManTel.2013.6482411 Publication Year: 2013 , Page(s): 309 – 314.
[8]Free vibration analysis of circular cylindrical shells using transfer matrix methodGuanmoXie Electric Information and Control Engineering (ICEICE), 2011 International Conferenceon DOI: 10.1109/ ICEICE.2011.5778195 Publication Year: 2011 , Page(s): 423 – 426.
[9] RGB based dual key image steganography Dagar, S.Confluence 2013: The Next Generation Information Technology Summit (4th International Conference) DOI: 10.1049/cp.2013.2334 Publication Year: 2013, Page(s): 316 - 320
[10] Security analysis of blowfish algorithmAlabaichi, A. ; Ahmad, F. ; Mahmod,R. Informatics and Applications (ICIA) , 2013 Second International Conference on DOI: 10.1109/ ICoIA.2013.6650222 Publication Year: 2013 , Page(s): 12 – 18.
[11] Stego image quality and the reliability of PSNRAlmohammad, A. ; Ghinea,G. Image Processing Theory Tools and Applications (IPTA), 2010 2nd International Conference on DOI: 10.1109/IPTA.2010.5586786 Publication Year: 2010 , Page(s): 215 – 220.

Steganography, Pixel Indicator, Blowfish, Distortions, Embedding Rates.