Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

Securing Web Communication using Three Layer Image Shielding

Print
PDF
IJCA Proceedings on International Conference on Distributed Computing and Internet Technology 2014
© 2013 by IJCA Journal
ICDCIT 2014
Year of Publication: 2013
Authors:
Kamal Pradhan
Gaurav Gohil

Kamal Pradhan and Gaurav Gohil. Article: Securing Web Communication using Three Layer Image Shielding. IJCA Proceedings on International Conference on Distributed Computing and Internet Technology 2014 ICDCIT-2014:8-13, December 2013. Full text available. BibTeX

@article{key:article,
	author = {Kamal Pradhan and Gaurav Gohil},
	title = {Article: Securing Web Communication using Three Layer Image Shielding},
	journal = {IJCA Proceedings on International Conference on Distributed Computing and Internet Technology 2014},
	year = {2013},
	volume = {ICDCIT-2014},
	pages = {8-13},
	month = {December},
	note = {Full text available}
}

Abstract

Communication security has taken an important role with the advancement in digital communication. The difficulties in ensuring an individual's privacy has become increasingly challenging. Techniques such as digital watermarking, cryptography and Steganography are used for information hiding. This paper introduces a new Steganography algorithm to hide data inside images using three layer image shielding. Steganography is the art and science of hiding the existence of data in another transmission medium. It helps in achieving a secure and safe communication. The proposed algorithm uses spatial domain Steganography technique in the transformed color space. Here the three layers RGB (red, green, blue) of the cover image are transformed to HSV (hue, saturation, value) layers. The pixels of any two HSV layers are used to embed the message inside it. The remaining layer act as an indicator to store and retrieve the message from the other two layers efficiently. The final image is the stego image. Different sizes of data are stored inside the images and the PSNR (Peak signal-to-noise ratio) is also captured for each of the tested images. Based on the PSNR value of tested images, the stego image has a higher PSNR value.

References

  • Stefan katzenbeisser, Fabien a. p. petitcolas, "Information hiding techniques for steganography and digital watermarking", 2000, pp.
  • Coron, J. -S. , "what is cryptography? IEEE Security and Privacy, 2006. 4(1): p. 70-73"
  • Akhil khare, Meenu kumarl, J Palla vi khare , "Efficient Algorithm for Digital Image Steganography". Journal of information, knowledge and research in computer science applications.
  • T. Morkel, j. h. p. eloff and M. s. olivier, "An Overview of Image Steganography",information and computer security architecture (icsa) research group.
  • Jarno mielikainen, "lsb matching revisited", Signal Processing Letters, IEEE, Publication date: may 2006 Volume: 13, issue: 5, pp. 285- 287.
  • Kanzariya nitin k. and Nimavat ashish v, "Comparison of Various Images Steganography Techniques", vol 2 issue 1 jan13.
  • Gandharba swain and Saroj Kumar lenka , "A novel Approach to RGB Channel Based Image Steganography Technique". International Arab journal of e-technology, vol. 2 no. 4 , june 2012.
  • S. agaian1 and Juan p. perez2, "New Pixel Sorting Method for Palette Based Steganography and Color Model Selection.
  • Mei-ching Chen, S. agaian, and C. L. philip chen,"Generalized collage steganography on images", IEEE, 2008.
  • Chandramouli, r. & Memon, n. (2001). proceedings of ICPC '01: IEEE International conference on image processing. thessaloniki: Institute of electrical and electronics engineers computer society.
  • Fridrich, j. , Goljan, m. , &Du, r. (2001). "Detecting lsb steganography in color and gray-scale images. " IEEE multimedia, 8(4), 22-28.
  • Wen chen1, Yun q. shi1, Guorong xuan2 , "Identifying computer graphics using hsv color model and statistical moments of characteristic functions. "
  • Adnan Gutub, Mahmoud Ankeer, Muhammad Abu- Ghalioun, Abdulrahman Shaheen, and Aleem Alvi, Pixel indicator high capacity technique for RGB image based Steganography, WoSPA 2008 – 5th IEEE International Workshop on Signal Processing and its Applications, University of Sharjah, Sharjah, U. A. E. 18 – 20 March 2008.
  • N. N. El-Emam, Hiding a large amount of data with high security using steganography algorithm, Journal of Computer Science 3 (2007) 223-232.
  • Mohammed tanver parver and Adnan Abdul Aziz-gutub, RGB intensity based variable-bits image Steganography, IEEE Asia-Pacific services computing conference.