Standard deviation converges for random image steganography

The advent of the internet age has led to the increase of prominent network security issues. Information encryption has long been a method used for information security. With the rapid development of parallel computing capacities of computer hardware, this method alone could not be trusted to ensure security by increasing the key sizes, thus bringing in the information hiding techniques into the scenario. Cryptography scrambles the data to be secured while information hiding embeds the information into files which do not reveal the presence of information. Steganography and water marking are two information hiding techniques. While steganography is used for secretly embedding the sensitive information in files, watermarking is used to implement copyright protection. Steganographic techniques are being widely used these days to increase the security of information. A combination of cryptography and steganography results in very strong cryptosystems. This is a paper of unexampled prosperity, which elicits easy-to-implement, difficult-to-sense proficiency for image steganography enforcing the statistical distribution's profound laws. Bit length for embedding is adjudicated via some delineated conditions and is done so by making use of Least Significant Bit . These conditions are the index for increasing complexity as well as security. Experimental ensues in terms of BPP, embedding capacity, and stego outputs also vindicate this paper. This paper prognosticates the crucial imputes of steganography.

[1]  J. Rayappan,et al.  Wavelet Pave the Trio Travel for a Secret Mission – A Stego Vision , 2011 .

[2]  Amirtharajan,et al.  Security Building at the Line of Control for Image Stego , 2010 .

[3]  Ja-Chen Lin,et al.  A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function , 2003, Pattern Recognit..

[4]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[5]  K. Thenmozhi,et al.  Firmware for Data Security: A Review , 2012 .

[6]  Jiaohua Qin,et al.  Random Image Steganography and Steganalysis: Present Status and Future Directions , 2012 .

[7]  O. Roeva,et al.  Information Hiding: Techniques for Steganography and Digital Watermarking , 2000 .

[8]  Bernard P. Zajac Applied cryptography: Protocols, algorithms, and source code in C , 1994 .

[9]  Lee-Ming Cheng,et al.  Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..

[10]  Rengarajan Amirtharaj,et al.  Survey and Analysis of Hardware Cryptographic and Steganographic Systems on FPGA , 2012 .

[11]  Kevin Curran,et al.  Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..

[12]  K. Thenmozhi,et al.  OFDM+CDMA+Stego = Secure Communication: A Review , 2012 .

[13]  V. Meena,et al.  Seeable visual but not sure of it , 2012, IEEE-International Conference On Advances In Engineering, Science And Management (ICAESM -2012).

[14]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..

[15]  Rengarajan Amirtharajan,et al.  Horse Riding & Hiding in Image for Data Guarding , 2012 .

[16]  Niels Provos,et al.  Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..

[17]  J. Nandhini,et al.  Who decides hiding capacity? I, the pixel intensity , 2012, 2012 International Conference on Recent Advances in Computing and Software Systems.

[18]  Rengarajan Amirtharaj,et al.  Stego on 2n:1 Platform for Users and Embedding , 2011 .

[19]  Rengarajan Amirtharajan,et al.  MSB over hides LSB — A dark communication with integrity , 2011, 2011 IEEE 5th International Conference on Internet Multimedia Systems Architecture and Application.

[20]  K. Thenmozhi,et al.  Pixel Forefinger for Gray in Color: A Layer by Layer Stego , 2012 .

[21]  Rengarajan Amirtharaj,et al.  Inverted Pattern in Inverted Time Domain for Icon Steganography , 2012 .

[22]  Bruce Schneier,et al.  Applied cryptography : protocols, algorithms, and source codein C , 1996 .

[23]  Rengarajan Amirtharajan,et al.  An intelligent chaotic embedding approach to enhance stego-image quality , 2012, Inf. Sci..

[24]  V. Mahalakshmi,et al.  Modulation of hiding intensity by channel intensity - Stego by pixel commando , 2012, 2012 International Conference on Computing, Electronics and Electrical Technologies (ICCEET).

[25]  R. Amirtharajan,et al.  Wave (let) decide choosy pixel embedding for stego , 2011, 2011 International Conference on Computer, Communication and Electrical Technology (ICCCET).