MSB over hides LSB — A dark communication with integrity

Man toddled into a new era where huge monitors are replaced by palm size screens, and they boom alive to perform millions of activity in a millisecond!!! Seated in one place today, man can do just about anything with his portable palm size gadgets. But as the sizes of gadgets shrunk, iniquity and espionage magnified to monstrosity. Scientists over the years while devised techniques to shrink gadgets, also cerebrated algorithms to check the infraction. This paper proposes yet another method using the pixel indicator technology to increase the capacity of the message carrier; i.e. cover object. The pixel indicator is used to decide where the clandestine information has been embedded and to which colour plane of the cover image. Later how many clandestine data would be embedded on the chosen plane of the pixels is decided by the MSB of all the three planes. This proposed method also includes additional integrity check mechanism with improved randomness and hence the security. Simulation tests & complexity analysis were performed to evaluate the dexterity and complexity of the proposed algorithm.

[1]  Adnan Abdul-Aziz Gutub,et al.  Pixel Indicator High Capacity Technique for RGB Image Based Steganography , 2008 .

[2]  Rengarajan Amirtharajan,et al.  PVD Blend with Pixel Indicator - OPAP Composite for High Fidelity Steganography , 2010 .

[3]  Niels Provos,et al.  Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..

[4]  Peter Jorgensen,et al.  Applied cryptography: Protocols, algorithm, and source code in C: By Bruce Schneier. New York: John Wiley, 1993. 618 p. $44.95 (paper). ISBN 0-471-59756-2 , 1996 .

[5]  Tuomas Aura,et al.  Practical Invisibility in Digital Communication , 1996, Information Hiding.

[6]  Rengarajan Amirtharaj,et al.  Stego on 2n:1 Platform for Users and Embedding , 2011 .

[7]  R. Amirtharajan,et al.  Publication of Little Lion Scientific R & D , Islamabad PAKISTAN DATA BATTLE ON THE DIGITAL FIELD BETWEEN HORSE CAVALRY AND INTERLOPERS , 2011 .

[8]  Lisa M. Marvel,et al.  Spread spectrum image steganography , 1999, IEEE Trans. Image Process..

[9]  Walter Bender,et al.  Techniques for data hiding , 1995, Electronic Imaging.

[10]  Ja-Chen Lin,et al.  A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function , 2003, Pattern Recognit..

[11]  John Bosco Optimum Pixel & Bit location for Colour Image Stego- A Distortion Resistant Approach , 2010 .

[12]  Rengarajan Amirtharajan,et al.  Design and Analysis of Prototype Hardware for Secret Sharing Using 2-D Image Processing , 2010 .

[13]  Rengarajan Amirtharajan,et al.  Covered CDMA multi-user writing on spatially divided image , 2011, 2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE).

[14]  R. Amirtharajan,et al.  Wave (let) decide choosy pixel embedding for stego , 2011, 2011 International Conference on Computer, Communication and Electrical Technology (ICCCET).

[15]  Rengarajan Amirtharajan,et al.  Colour Guided Colour Image Steganography , 2010, ArXiv.

[16]  Kevin Curran,et al.  Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..

[17]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..

[18]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[19]  O. Roeva,et al.  Information Hiding: Techniques for Steganography and Digital Watermarking , 2000 .

[20]  R. Amirtharajan,et al.  Tri-layer stego for enhanced security - a keyless random approach , 2009, 2009 IEEE International Conference on Internet Multimedia Services Architecture and Applications (IMSAA).

[21]  Lee-Ming Cheng,et al.  Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..

[22]  K. Thenmozhi,et al.  Steg-OFDM blend for highly secure multi-user communication , 2011, 2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE).

[23]  Bruce Schneier,et al.  Applied cryptography : protocols, algorithms, and source codein C , 1996 .