Security Building at the Line of Control for Image Stego

has virtually become an indispensable nonfunctional requirement for any technology that deals with data. Traditional methods of imparting security using encryption have given away themselves long ago to cryptanalytic ventures. A different method of secure data transfer without revealing the mere existence of secret, called Steganography is a promising technique to ensure security. This technique camouflages secret data into a casual cover image, without affecting its visually perceived quality. This paper proposes a novel technique, which is a hybrid of cryptography, edge detection and steganography. By differentially embedding secret data into edges and smooth pixels of cover image, so that edge pixels and smooth pixels have data with different encryptions, the cryptic effect can be boosted to a greater limit, making the unauthorized extraction of secret data impossible.

[1]  Rengarajan Amirtharajan,et al.  Constructive Role of SFC & RGB Fusion versus Destructive Intrusion , 2010 .

[2]  R. Amirtharajan,et al.  Tri-layer stego for enhanced security - a keyless random approach , 2009, 2009 IEEE International Conference on Internet Multimedia Services Architecture and Applications (IMSAA).

[3]  R. Akila,et al.  A Comparative Analysis of Image Steganography , 2010 .

[4]  Lee-Ming Cheng,et al.  Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..

[5]  Ja-Chen Lin,et al.  Image hiding by optimal LSB substitution and genetic algorithm , 2001, Pattern Recognit..

[6]  Chin-Chen Chang,et al.  Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy , 2003, Pattern Recognit..

[7]  Kevin Curran,et al.  Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..

[8]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..

[9]  Bruce Schneier,et al.  Applied cryptography : protocols, algorithms, and source codein C , 1996 .

[10]  Peter Wayner,et al.  Disappearing Cryptography: Information Hiding: Steganography and Watermarking , 2008 .

[11]  Rengarajan Amirtharajan,et al.  PVD Blend with Pixel Indicator - OPAP Composite for High Fidelity Steganography , 2010 .

[12]  Chin-Chen Chang,et al.  A steganographic method for digital images using side match , 2004, Pattern Recognit. Lett..

[13]  O. Roeva,et al.  Information Hiding: Techniques for Steganography and Digital Watermarking , 2000 .

[14]  Niels Provos,et al.  Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..

[15]  Ja-Chen Lin,et al.  A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function , 2003, Pattern Recognit..

[16]  John Bosco Optimum Pixel & Bit location for Colour Image Stego- A Distortion Resistant Approach , 2010 .

[17]  Po-Yueh Chen,et al.  A DWT Based Approach for Image Steganography , 2006 .

[18]  Adnan Abdul-Aziz Gutub,et al.  Pixel Indicator Technique for RGB Image Steganography , 2010 .

[19]  Rengarajan Amirtharajan,et al.  Colour Guided Colour Image Steganography , 2010, ArXiv.

[20]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[21]  Peter Jorgensen,et al.  Applied cryptography: Protocols, algorithm, and source code in C: By Bruce Schneier. New York: John Wiley, 1993. 618 p. $44.95 (paper). ISBN 0-471-59756-2 , 1996 .