Steganography in Colored Images Using Information Reflector with 2^k Correction

Steganography is a process that involves hiding a message in an appropriate carrier for example an image or an audio file. The carrier can then be sent to a receiver without anyone else knowing that it contains a hidden message. The aim of this study was to investigate the various steganograhy methods & how they are implemented .LSB is a very well known method in this field. In binary images we are very much restricted in the scope as there are only 4 bits or 8 bits to represent a pixel so we are very much restricted to most popular LSB methods .But in colored images there are generally up to 24 bits images with three different RGB channels, if using RGB color space .So, we can explore a lot many new methods which can manipulate or use various channels of colored images in regular or arbitrary pattern to hide the information. Using this concept we have explored the various existing methods of data hiding in colored images & taken an intersection between the arbitrary pixel manipulation & LSB method to propose our work which uses arbitrary channel of a pixel to reflect the presence of data in one or two other channels. Finally we have used the 2k correction method to improve the stego image so as to assure the maximum security against the visual attacks. We have proved that this work shows an attractive result as compared to the other present algorithms on the various parameters like security, imperceptibility capacity & robustness.At the end the new steganography technique is also compared with the available techniques.

[1]  Gary C. Kessler,et al.  An Overview of Steganography for the Computer Forensics Examiner , 2004 .

[2]  Lahouari Ghouti,et al.  Utilizing Extension Character 'Kashida' with Pointed Letters for Arabic Text Digital Watermarking , 2007, SECRYPT.

[3]  Sushil Jajodia,et al.  Exploring steganography: Seeing the unseen , 1998 .

[4]  Kee-Young Yoo,et al.  A New Image Steganography Based on 2k Correction and Edge-Detection , 2008, Fifth International Conference on Information Technology: New Generations (itng 2008).

[5]  Ross Anderson,et al.  Information hiding terminology , 1996 .

[6]  Tricia Walker,et al.  Computer science , 1996, English for academic purposes series.

[7]  Adnan Abdul-Aziz Gutub,et al.  A Novel Arabic Text Steganography Method Using Letter Points and Extensions , 2007 .

[8]  Kevin Curran,et al.  An evaluation of image based steganography methods , 2006, Multimedia Tools and Applications.

[9]  Andreas Pfitzmann,et al.  Attacks on Steganographic Systems , 1999, Information Hiding.

[10]  Sushil Jajodia,et al.  Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking - Attacks and Countermeasures , 2000, IH 2012.

[11]  D. Artz,et al.  Digital steganography: hiding data within data , 2001 .

[12]  Kathryn Hempstalk,et al.  Hiding Behind Corners : Using Edges in Images for Better Steganography , 2006 .

[13]  Marco Furini,et al.  International Journal of Computer and Applications , 2010 .

[14]  Ajith Abraham,et al.  Significance of steganography on data security , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..

[15]  Naveed Sarfraz Khattak,et al.  A Robust Method for Encrypted Data Hiding Technique Based on Neighborhood Pixels Information , 2007 .