International Journal of Computer
Trends and Technology

Research Article | Open Access | Download PDF

Volume 4 | Issue 7 | Year 2013 | Article Id. IJCTT-V4I7P144 | DOI : https://doi.org/10.14445/22312803/IJCTT-V4I7P144

Advance Scheme for Secret Data Hiding System using Hop-field LSB


Ishwarjot Singh, J. P. Singh Raina

Citation :

Ishwarjot Singh, J. P. Singh Raina, "Advance Scheme for Secret Data Hiding System using Hop-field LSB," International Journal of Computer Trends and Technology (IJCTT), vol. 4, no. 7, pp. 2216-2221, 2013. Crossref, https://doi.org/10.14445/22312803/IJCTT-V4I7P144

Abstract

Security is a major concern where confidential data can be transfer through internet. Steganography is an effective means of hiding data to protect the data from unauthorized or unwanted viewing. In this work, Image can be used to hide confidential data. We use hop field algorithm & LSB technique in this work. Firstly Hop-field algorithm is used on the original image and it gives optimized results then key can be generating from these results using LSB technique. A secret data can be hide behind of this resulting image and it forms a stego image. All the data can be hide in the stego-image. This increases security means protecting our confidential information from unauthorized access. On the receiver side all the process work in inverse order and extract the hidden data from the image.

Keywords

Security, Data hiding, Steganography, Hop-field, LSB.

References

[1]   Khosravi Sara, Abbasi Dezfoli Mashallah, Yektaie Mohammad Hossein, et al,  A new steganography method based on hiop (higher intensity of pixel) algorithm and strassen's matrix multiplication, Journal of Global Research in Computer Science Volume 2, No. 1, January 2011.
[2] R.Amirtharajan, Adharsh.D, Vignesh.V, R.John Bosco Balaguru, et al, PVD blend with pixel indicator - OPAP composite for high fidelity steganography, International Journal of Computer Applications Volume 7– No.9, (0975 – 8887) October 2010.
[3]  Namita Tiwari, Madhu Shandilya, et al, Secure RGB Image Steganography from Pixel Indicator to Triple Algorithm-An Incremental Growth, International Journal of Security and Its Applications Vol. 4, No. 4, October, 2010.
[4]  Sandeep Kumar Behera, Motamarri Abhilash Swarup, Mohamed Ashfaaq K and John Bosco Balaguru Rayappan, R.Amirtharajan, et al, Colour Guided Colour Image Steganography,  Universal Journal of Computer Science and Engineering Technology 1 (1), 16-23, Oct. 2010. © 2010 UniCSE, ISSN: 2219-2158.
[5] Abdul-Rahman Shaheen, Mahmoud Ankeer, Muhammed Abu Ghalioun, et al, Using Pixel Indicator Technique in Images for Better Steganography, Journal Of Emerging Technologies In Web Intelligence, Vol. 2, No.1, February 2010.
[6]  Ali Akbar Nikoukar, et al, An Image Steganography Method with High Hiding Capacity Based on RGB Image,  International Journal of Signal and Image Processing Nikoukar / An Image Steganography Method with High Hiding Capacity / Vol.1/Iss.4 pp. 238-241, 2010.
[7] Hussain, M.  Hussain, M, et al, Pixel intensity based high capacity data embedding method, Information and Emerging Technologies (ICIET), 2010 International Conference, on page(s): 1 – 5, June 2010. 
[8] Adnan Abdul-Aziz Gutub, et al, Pixel Indicator Technique for RGB Image Steganography, Journal Of Emerging Technologies In Web Intelligence, Vol. 2, No.1, February 2010. 
[9] Piyush Marwaha, Paresh Marwaha, et al, Visual cryptographic steganography in images, 2010 Second International conference on Computing, Communication and Networking Technologies, 2010. 
[10] Gutub A., Al-Qahtani A., Tabakh A., et al, Triple-A: Secure RGB image steganography based on randomization, Computer Systems and Applications, 2009. AICCSA 2009. IEEE/ACS, on page(s): 400 – 403, May 2009. 
[11] Parvez, M.T.,  Gutub, A.A.-A., et al, RGB Intensity Based Variable-Bits Image Steganography, Asia-Pacific Services Computing Conference, 2008. APSCC '08. IEEE, on page(s): 1322 – 1327, Dec. 2008. 
[12] Adnan Gutub, Mahmoud Ankeer, Muhammad AbuGhalioun, Abdulrahman Shaheen, Aleem Alvi, et al, Pixel Indicator High Capacity Technique For RGB Image Based steganography, WoSPA 2008 – 5th IEEE International Workshop on Signal Processing and its Applications, University of Sharjah, U.A.E. March 2008.  
[13] Mohammad Tanvir Parvez and Adnan Abdul-Aziz Gutub, et al, RGB Intensity Based Variable-Bits Image Steganography, 2008 IEEE Asia-Pacific Services Computing Conference. 
[14] Bailey K., Curran K., et al, An evaluation of image based steganography methods, Journal of Multimedia Tools and Applications, Vol. 30, No. 1,pp. 55-88, July 2006.  
[15] Eiji Kawaguchi, et al, A Model of Anonymous Covert Mailing System Using Steganographic Scheme, in information modelling and knowledge bases xiv, H. Yaakkola et al (Eds), IOS Press, pp.81-85, 2003. 
[16] Eiji Kawaguchi, Michiro Maeta, Hideki Noda and Koichi Nozaki, et al, A Model of Digital Contents Access Control System Using Steganographic Information Hiding Scheme,  Information Modelling and Knowledge Bases IX, pp.255-265, 1998. 
[17] Shabir A. Parah, Javaid A. Sheikh, & G.M. Bhat, ―Data Hiding in Intermediate Significant Bit Planes,A High Capacity Blind Steganographic Technique‖ International Conference on Emerging Trends in Science, Engineering and Technology-2012.