Honey Algorithm to Secure Steganographic Images

The honey algorithm is developed to secure steganographic images, which cannot be detected by hackers. Image steganography is the process of inserting the data into an image. This type of steganography entirely depends upon the secrecy. Steganography uses a cover image in which the data is to be inserted, personal information is to be transmitted, and embedding/extraction algorithms are used to embed the data into an image. In LSB, the steganographic images can be detected easily by bits comparison tool and security is a major drawback. In order to overcome this drawback, an algorithm called honey algorithm to secure image steganography is developed. Honey algorithm technique brings a secret text that when tried with a wrong password or key provides a fake data for every incorrect guess of the password and, so the attackers cannot say when the process has been completed. Hence, the data is safe.

[1]  Tieyong Zeng,et al.  Detecting LSB matching by applying calibration technique for difference image , 2008, MM&Sec '08.

[2]  Jessica J. Fridrich,et al.  Distortion-Free Data Embedding for Images , 2001, Information Hiding.

[3]  Yun Q. Shi,et al.  Lossless data hiding: fundamentals, algorithms and applications , 2004, 2004 IEEE International Symposium on Circuits and Systems (IEEE Cat. No.04CH37512).

[4]  Jessica J. Fridrich,et al.  Detecting LSB Steganography in Color and Gray-Scale Images , 2001, IEEE Multim..

[5]  Wen-Hsiang Tsai,et al.  A steganographic method for images by pixel-value differencing , 2003, Pattern Recognit. Lett..

[6]  Wei Su,et al.  Reversible data hiding , 2006, IEEE Transactions on Circuits and Systems for Video Technology.

[7]  Zhicheng Ni,et al.  Distortionless data hiding based on integer wavelet transform , 2002 .

[8]  Christophe De Vleeschouwer,et al.  Circular interpretation of histogram for reversible watermarking , 2001, 2001 IEEE Fourth Workshop on Multimedia Signal Processing (Cat. No.01TH8564).

[9]  Guanrong Chen,et al.  A Novel Fast Image Encryption Scheme Based on 3D Chaotic Baker Maps , 2004, Int. J. Bifurc. Chaos.