A NOVEL RGB BASED STEGANOGRAPHY USING PRIME COMPONENT ALTERATION TECHNIQUE

被引:0
|
作者
Sathyan, Anil [1 ]
Thirugnanam, Mythili [1 ]
Hazra, Sumit [1 ]
机构
[1] VIT Univ, Sch Comp Sci & Engn, Vellore, Tamil Nadu, India
关键词
Steganography; RGB; First Component Alternate; LSB; Steganalysis;
D O I
暂无
中图分类号
Q5 [生物化学]; Q7 [分子生物学];
学科分类号
071010 ; 081704 ;
摘要
Steganography is the science with the help of which secret or confidential data is hidden within any media like text, images, audio or video and protocol-based network. As privacy concerns continue to develop, it is in widespread use because it enables to hide the secret data in cover images. Steganographic techniques are best suited for digital image processing. In general, Steganography is classified into spatial and transform domain techniques. This paper presents a new RGB based algorithm in spatial domain called Prime Pixel Alternation technique. In the present scenario, many spatial domain algorithms like LSB, first component alternate, pixel indicator are usually used for steganography since they are easier to implement and less complex. Even though their hiding capacity is high, they are more prone to steganalysis. A new RGB-based algorithm is designed to store data in Random prime numbered multiple pixel locations and the encrypted key is also stored along with the data in a co-prime location (co-prime to the aforesaid 3 numbers). This algorithm requires to choose 3 random numbers to store data in R(Red), G(Green) and B(Blue) components of the cover image(24 bit image). Blue component is given the priority to store more data (lowest prime no: multiple pixel location) because a research was conducted by Hecht [14], which reveals that the blue objects, if visually perceived, are intense and are comparatively less distinct than the red and green objects. Since the key size is fixed, it is stored in coprime pixel locations, which will be least in number. Key bits will be stored in R, G, B components one at a time in a cyclic manner, in the above mentioned co-prime locations, in which the security is improved. A null terminator bit pattern may be used to indicate end of key or data. The reverse process of the encoding algorithm is used to decode the message.
引用
收藏
页码:58 / 73
页数:16
相关论文
共 50 条
  • [41] Secure RGB image steganography based on modified LSB substitution
    Almazaydeh, Laiali
    INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2020, 12 (04) : 453 - 457
  • [42] A map-based image steganography scheme for RGB images
    Department of Computer Applications, National Institute of Technology, Durgapur, India
    不详
    Int. J. Inf. Comput. Secur., 2-4 (196-215): : 196 - 215
  • [43] Triple-A: Secure RGB Image Steganography Based on Randomization
    Gutub, Adnan
    Al-Qahtani, Ayed
    Tabakh, Abdulaziz
    2009 IEEE/ACS INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, VOLS 1 AND 2, 2009, : 400 - 403
  • [44] A Novel Active Warden Technique for Image Steganography
    Bisio, Igor
    Lavagetto, Fabio
    Luzzati, Giulio
    Sciarrone, Andrea
    2016 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2016,
  • [45] A Novel Prime Numbers Based Hashing Technique for Minimizing Collisions
    Bhullar, Rohit K.
    Pawar, Lokesh
    Kumar, Vijay
    Anjali
    PROCEEDINGS ON 2016 2ND INTERNATIONAL CONFERENCE ON NEXT GENERATION COMPUTING TECHNOLOGIES (NGCT), 2016, : 522 - 527
  • [46] A Novel Multiplicative Steganography Technique in Contourlet Domain
    Saleh, Farid
    Amirmazlaghani, Maryam
    2017 14TH INTERNATIONAL ISC (IRANIAN SOCIETY OF CRYPTOLOGY) CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2017, : 105 - 110
  • [47] A novel technique for texture description and image classification based in RGB compositions
    Leyferman, Carlos Eduardo Padilla
    Bonilla, Jose Trinidad Guillen
    Gutierrez, Juan Carlos Estrada
    Rodriguez, Maricela Jimenez
    IET COMMUNICATIONS, 2023, 17 (10) : 1162 - 1176
  • [48] CHAOS BASED CRYPTOGRAPHY AND RECTANGULAR SHAPE BASED STEGANOGRAPHY TECHNIQUE USING LSB
    Aiswarya, S.
    Gomathi, R.
    MALAYSIAN JOURNAL OF COMPUTER SCIENCE, 2023, 36 (04)
  • [49] Person Identification Technique Using RGB Based Dental Images
    Datta, Soma
    Chaki, Nabendu
    COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL MANAGEMENT, 2015, 9339 : 169 - 180
  • [50] Steganography technique using modulus arithmetic
    Jaafar, Sayuthi
    Manaf, Azizah A.
    Zeki, Akram M.
    2007 9TH INTERNATIONAL SYMPOSIUM ON SIGNAL PROCESSING AND ITS APPLICATIONS, VOLS 1-3, 2007, : 676 - 679