A NOVEL RGB BASED STEGANOGRAPHY USING PRIME COMPONENT ALTERATION TECHNIQUE

被引:0
|
作者
Sathyan, Anil [1 ]
Thirugnanam, Mythili [1 ]
Hazra, Sumit [1 ]
机构
[1] VIT Univ, Sch Comp Sci & Engn, Vellore, Tamil Nadu, India
关键词
Steganography; RGB; First Component Alternate; LSB; Steganalysis;
D O I
暂无
中图分类号
Q5 [生物化学]; Q7 [分子生物学];
学科分类号
071010 ; 081704 ;
摘要
Steganography is the science with the help of which secret or confidential data is hidden within any media like text, images, audio or video and protocol-based network. As privacy concerns continue to develop, it is in widespread use because it enables to hide the secret data in cover images. Steganographic techniques are best suited for digital image processing. In general, Steganography is classified into spatial and transform domain techniques. This paper presents a new RGB based algorithm in spatial domain called Prime Pixel Alternation technique. In the present scenario, many spatial domain algorithms like LSB, first component alternate, pixel indicator are usually used for steganography since they are easier to implement and less complex. Even though their hiding capacity is high, they are more prone to steganalysis. A new RGB-based algorithm is designed to store data in Random prime numbered multiple pixel locations and the encrypted key is also stored along with the data in a co-prime location (co-prime to the aforesaid 3 numbers). This algorithm requires to choose 3 random numbers to store data in R(Red), G(Green) and B(Blue) components of the cover image(24 bit image). Blue component is given the priority to store more data (lowest prime no: multiple pixel location) because a research was conducted by Hecht [14], which reveals that the blue objects, if visually perceived, are intense and are comparatively less distinct than the red and green objects. Since the key size is fixed, it is stored in coprime pixel locations, which will be least in number. Key bits will be stored in R, G, B components one at a time in a cyclic manner, in the above mentioned co-prime locations, in which the security is improved. A null terminator bit pattern may be used to indicate end of key or data. The reverse process of the encoding algorithm is used to decode the message.
引用
收藏
页码:58 / 73
页数:16
相关论文
共 50 条
  • [31] A Novel Image Steganography Technique Using AES Encryption in DCT Domain
    Sahu, Aman
    Pradhan, Chittaranjan
    DISTRIBUTED COMPUTING AND INTELLIGENT TECHNOLOGY, ICDCIT 2023, 2023, 13776 : 349 - 354
  • [32] Robust Technique For Steganography on Red Component Using 3-DWT -DCT Transform
    Sharma, Pooja
    Sharma, Ashutosh
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON INVENTIVE SYSTEMS AND CONTROL (ICISC 2018), 2018, : 1049 - 1054
  • [33] VIDEO STEGANOGRAPHY BASED ON EMBEDDING THE VIDEO USING PCF TECHNIQUE
    Rajalakshmi, K.
    Mahesh, K.
    2017 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2017,
  • [34] Threshold-based Steganography: A Novel Technique for Improved Payload and SNR
    Khan, Zakir
    Shah, Mohsin
    Naeem, Muhammad
    Mahmood, Toqeer
    Khans, Shah
    Amin, Noor Ul
    Shahzad, Danish
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2016, 13 (04) : 380 - 386
  • [35] Quality based JPEG Steganography using balanced Embedding Technique
    Ishaque, Mohammed
    Sattar, Syed Abdul
    2009 SECOND INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN ENGINEERING AND TECHNOLOGY (ICETET 2009), 2009, : 320 - +
  • [36] Novel Secure Hybrid Image Steganography Technique Based on Pattern Matching
    Hamza, Ali
    Shehzad, Danish
    Sarfraz, Muhammad Shahzad
    Habib, Usman
    Shafi, Numan
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2021, 15 (03): : 1051 - 1077
  • [37] Photomontage detection using steganography technique based on a neural network
    Jarusek, Robert
    Volna, Eva
    Kotyrba, Martin
    NEURAL NETWORKS, 2019, 116 : 150 - 165
  • [38] RGB Intensity Based Variable-Bits Image Steganography
    Parvez, Mohammad Tanvir
    Gutub, Adnan Abdul-Aziz
    2008 IEEE ASIA-PACIFIC SERVICES COMPUTING CONFERENCE, VOLS 1-3, PROCEEDINGS, 2008, : 1322 - 1327
  • [39] A Huffman code LSB based image steganography technique using multi-level encryption and achromatic component of an image
    Shahid Rahman
    Jamal Uddin
    Hameed Hussain
    Aftab Ahmed
    Ayaz Ali Khan
    Muhammad Zakarya
    Afzal Rahman
    Muhammad Haleem
    Scientific Reports, 13
  • [40] A Huffman code LSB based image steganography technique using multi-level encryption and achromatic component of an image
    Rahman, Shahid
    Uddin, Jamal
    Hussain, Hameed
    Ahmed, Aftab
    Khan, Ayaz Ali
    Zakarya, Muhammad
    Rahman, Afzal
    Haleem, Muhammad
    SCIENTIFIC REPORTS, 2023, 13 (01)