32×32 Colour Image Steganography

  ijett-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
  
© 2013 by IJETT Journal
Volume-4 Issue-8                      
Year of Publication : 2013
Authors : Veerdeep Kaur Mann , Harmanjot Singh Dhaliwal

Citation 

Veerdeep Kaur Mann , Harmanjot Singh Dhaliwal. "32×32 Colour Image Steganography". International Journal of Engineering Trends and Technology (IJETT). V4(8):3687-3690 Aug 2013. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group.

Abstract

The word steganography is originally derived from Greek words which mean “Hidden Writing”. Due to the rapid growth of usage of internet over high bandwidth and low cost computer hardware has propelled the explosive growth of steganography. The objective of steganography is hiding the payload (embedded information) into the cover image such that the existence of payload in the cover image is imperceptible to the human beings . In this paper we worked on quality of stego - image. Stego image should have better data embedding capacity and should have small computational time.

References

[1] Prabhishek Singh, R S Chadha “A Survey of Digital Watermarking Techniques.
[2] A Tutorial Review on Steganography Samir K Bandyopadhyay, Debnath Bhat tacharyya ,Debashis Ganguly, Swarnendu Mukherjee and Poulami Das, IC3 – 2008 UFL & JIITU.
[3] P.Nithyanandam, T.Ravichandran, N.M.Santron and E.Priyadarshini, “A spatial domain image steganography technique based on matrix embedding and huffman encoding,” Int. J. of Computer Science and Security, vol. 5 , issue 5, 2011, pp. 456 - 468.
[4] C. - K. Chan, L.M. Cheng, “Hiding data in images by simple LSB substitution,” Pattern Recognition, vol. 37, issue 3, pp. 469 – 474, March 2004.
[5] C. - C. Chang ,T. - S. Chen, L. - Z. Chung, “A steganographic method based upon JPEG and quantization table modification,” Information Science, vol. 141, issue 1 - 2, pp. 123 - 138, March 2002.
[6] A. Almohammad, R. M. Hi erons, G. Ghinea, “High capacity steganographic method based upon JPEG,” IEEE 3rd Int. Conf. on Availability, Reliability and Security, 2008, pp. 544 - 549.
[7] A. Nag, S. Biswas, D. Sarkar and P. P. Sarkar, “A novel technique for image steganograph y based on DWT and huffman encoding,” Int. J. of Computer Science and Security, vol. 4, issue 6, 2011, pp. 561 - 570
[8] F. Alturki ,R. Mersereau, “Secure blind image steganographic technique using Discrete Fourier Transformation.” IEEE Proc. Int. Conf. on Image Processing, 2001, vol. 2, pp. 542 - 545.
[9] M.H. Lin, Y.C. Hu, C.C. Chang, Both color and gray scale secret images hiding in a color image, International Journal of Pattern Recognition and Artificial Intel ligence 16 (2002) ,pp. 697 – 713.
[10] Yuan - Hui Yu a,*, Chin - Chen Chang b, Iuon - Chang Lin c,” A new steganographic method for color and grayscale image hiding Received 16 March 2006; accepted 4 November 2006 .
[11] Adel Almohammad Robert M. Hierons" High Capacity Steganographic Method Based Upon JPEG The Third International Conference on Availability, Reliability and Security, June 21, 2009.
[12] Neha Batra Pooja Kaushik" Implementation of Modified 16×16 Quantization Table Steganography on Colour Images,Volume 2, Issue 10, October 2012 ISSN: 2277 128 X.
[13] Natee Vongurai and Suphakant Phimoltares”, Frequency - Based Steganography Using 32x32 Interpolated Quantization Table and Discrete Cosine Transform, 2012 Fourth International Conference on Computational Intelligence, Modelling and Simulation, 2166 - 8531/12.

Keywords
Steganography,DCT,IDCT,Cryptography.