A NEW APPROACH TO IDENTIFY THE STEGNO IMAGE USING EIGEN VALUE AND EIGEN VECTOR METHOD

  ijett-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
  
© 2012 by IJETT Journal
Volume-3 Issue-3                          
Year of Publication : 2012
Authors :  Dr.S.S Dinakaran , A.Ruby

Citation 

Dr.S.S Dinakaran , A.Ruby. "A NEW APPROACH TO IDENTIFY THE STEGNO IMAGE USING EIGEN VALUE AND EIGEN VECTOR METHOD". International Journal of Engineering Trends and Technology (IJETT). V3(3):346-352 May-Jun 2012. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group

Abstract

In this paper we propose a new BMP based Steganography image identification using Eigen values and Eigen Vectors Technique. This is new approach and this method is different from normal and Steganogr aphy image comparison, the steganography technique is normally based on BMP images by hiding information in other information. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the Intern et. For hiding secret information in images, there exists a large variety of steganographic techniques some are more complex than others and all of them have respective strong and weak points. Different applications have different requirements of the stega nography technique used. For example, some applications may require absolute invisibility of the secret information, while others require a larger secret message to be hidden. This paper intends to give an overview of steganography image identification usi ng Eigen values and Eigen Vectors Technique. It also attempts to identify the requirements of a good steganographic algorithm and briefly reflects on which steganographic techniques are more suitable for which applications.

References

[1] StegoArchive, “Steganography Information, Software and News to enhance your Privacy” 2001, URL: www.StegoArchive.com
[2] Petitcolas, Fabien A.P., “The Information Hiding Homepage: Digital Watermarking and Steganography”, URL: http://www.cl.cam.ac.uk/~fapp2/s teganography/
[3] Johnson, Neil F., “Steganography”, 2000, URL: http://www.jjtc.com/stegdoc/index2.html
[4] Sellars, D., “An Introduction to Steganography”, URL: http:/ /www.cs.uct.ac.za/courses/CS400W/NIS/papers99/ dsellars/stego.html
[5] The WEPIN Store, “Steganography (Hidden Writing)”, 1995, URL: http://www.wepin.com/pgp/stego.html
[6] Krinn, J., “Introduction to Ste ganography”, 2000, URL: http://rr.sans.org/covertchannels/steganography.php
[7] Noto, M., “MP3Stego: Hiding Text in MP3 files”, 2001, URL: http://rr.sans.org/covertchannels/mp3stego.php
[8] Smith, B.T.; J.M. Boyle; J.J. Dongarra; B.S. Garbow; Y. Ikebe; V.C. Klema; and C.B. Moler."Matrix Eigensystem Routines -- (EISPACK) Guide" Springer - Verlag, Berlin. 1976
[9] Garbow, B.S.; J.M. Boyle ; J.J. Dongarra; and C.B. Moler. Matrix Eigensystem Routines -- (EISPACK) Guide Extension " Springer - Verlag, Berlin. 1977

Keyword
Eigen values, Eigen Vectors and BMP based steganography technique