Optimum Pixel & Bit location for Colour Image Stego- A Distortion Resistant Approach

A conventional Secret key Steganography scheme focuses mainly to reduce the distortion when secret information is embedded into the cover image. On the other hand, the transmitted images may be compressed or faces transmitting errors. If such errors occur, the receiver cannot extract the correct information from the stegoimage. Furthermore the three main attributes of steganography are capacity, invisibility and Robustness. In the previous models [3, 4] we mainly concentrated on capacity and invisibility but in this method equal importance will be given to robustness. To increase the stochasticity of information hiding we use pixel indicator techniques which are implemented using three methods. Among these the first method enjoins that red channel steers the other two channels and the second method gives us the liberty to select the steering channel which successively increases the robustness of the shrouded message but its limits when MSE is considered. In third method, the steering channel is selected in a cyclic mode which enhances further the capacity along with security of the shrouded message as the MSE gets equally distributed. To increase the robustness here we introduce a factor E which gives us an option to select the position to plant the message to be concealed. The factor E addresses the bit where the embedding can be started. Once an image is compressed the LSBs of the covered media will get affected which defiles the concealed message. The essence of this method rests in the withstanding capability of the carrier media as the factor E is altered. As the value of E increases the MSE gets stepped up and hence the imperceptibility of the carrier image gets diluted. This can be heightened by using Optimal Pixel Adjustment Process (OPAP).

[1]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[2]  Rengarajan Amirtharajan,et al.  Colour Guided Colour Image Steganography , 2010, ArXiv.

[3]  O. Roeva,et al.  Information Hiding: Techniques for Steganography and Digital Watermarking , 2000 .

[4]  R. Akila,et al.  A Comparative Analysis of Image Steganography , 2010 .

[5]  Chin-Chen Chang,et al.  Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy , 2003, Pattern Recognit..

[6]  Peter Jorgensen,et al.  Applied cryptography: Protocols, algorithm, and source code in C: By Bruce Schneier. New York: John Wiley, 1993. 618 p. $44.95 (paper). ISBN 0-471-59756-2 , 1996 .

[7]  Chin-Chen Chang,et al.  A steganographic method for digital images using side match , 2004, Pattern Recognit. Lett..

[8]  Adnan Abdul-Aziz Gutub,et al.  Pixel Indicator High Capacity Technique for RGB Image Based Steganography , 2008 .

[9]  Niels Provos,et al.  Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..

[10]  Peter Wayner,et al.  Disappearing Cryptography: Information Hiding: Steganography and Watermarking , 2008 .

[11]  Po-Yueh Chen,et al.  A DWT Based Approach for Image Steganography , 2006 .

[12]  Ja-Chen Lin,et al.  A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function , 2003, Pattern Recognit..

[13]  R. Amirtharajan,et al.  Tri-layer stego for enhanced security - a keyless random approach , 2009, 2009 IEEE International Conference on Internet Multimedia Services Architecture and Applications (IMSAA).

[14]  Lee-Ming Cheng,et al.  Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..

[15]  Ja-Chen Lin,et al.  Image hiding by optimal LSB substitution and genetic algorithm , 2001, Pattern Recognit..

[16]  Peter Wayner,et al.  Disappearing Cryptography: Information Hiding: Steganography and Watermarking (2nd Edition) , 2002 .

[17]  Kevin Curran,et al.  Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..

[18]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..