Research Article

Secure BMP Image Steganography Using Dual Security Model (I.D.E.A, image intensity and Bit Randomization)and Max-Bit Algorithm.

by  Nabarun Bagchi
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 1 - Issue 21
Published: February 2010
Authors: Nabarun Bagchi
10.5120/67-657
PDF not available

Nabarun Bagchi . Secure BMP Image Steganography Using Dual Security Model (I.D.E.A, image intensity and Bit Randomization)and Max-Bit Algorithm.. International Journal of Computer Applications. 1, 21 (February 2010), 18-22. DOI=10.5120/67-657

                        @article{ 10.5120/67-657,
                        author  = { Nabarun Bagchi },
                        title   = { Secure BMP Image Steganography Using Dual Security Model (I.D.E.A, image intensity and Bit Randomization)and Max-Bit Algorithm. },
                        journal = { International Journal of Computer Applications },
                        year    = { 2010 },
                        volume  = { 1 },
                        number  = { 21 },
                        pages   = { 18-22 },
                        doi     = { 10.5120/67-657 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2010
                        %A Nabarun Bagchi
                        %T Secure BMP Image Steganography Using Dual Security Model (I.D.E.A, image intensity and Bit Randomization)and Max-Bit Algorithm.%T 
                        %J International Journal of Computer Applications
                        %V 1
                        %N 21
                        %P 18-22
                        %R 10.5120/67-657
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

A new BMP image based steganography algorithm is proposed based on image intensity, added extended encryption algorithm and a more superior insertion technique of encrypted data bit to increase data insertion level in a BMP image. Image size, clarity, noise is also taken care of in this algorithm.

References
  • Adnan Gutub, Mahmoud Ankeer, Muhammad Abu-Ghalioun, Abdulrahman Shaheen, and Aleem Alvi, “Pixel Indicator high capacity Technique for RGB image Based Steganography”, WoSPA 2008 – 5th IEEE International Workshop on Signal Processing and its Applications, University of Sharjah, Sharjah, U.A.E. 18 – 20 March 2008.
  • Donovan Artz, Los Alamos National Laboratory, “Digital Steganography: Hiding Data within Data”, IEEE Internet Computing: May, 2001
  • Neil F. Johnson. Sushil Jajodia, "Exploring Steganography: Seeing the Unseen", IEEE computer, 1998.
  • Kevin Curran, Karen Bailey, “An Evaluation of Image Based Steganography Methods”, Multimedia Tools and Applications, Vol. 30, No. 1, Pages: 55 – 88, July 2006.
  • Mohammad Tanvir Parvez and Adnan Gutub, “RGB Intensity Based Variable-Bits Image Steganography”, APSCC 2008 – Proceedings of 3rd IEEE Asia-Pacific Services Computing Conference, Yilan, Taiwan, 9-12 December 2008.
  • Adnan Gutub, Ayed Al-Qahtani, Abdulaziz Tabakh “Triple-A: Secure RGB Image Steganography Based on Randomization” aiccsa, pp.400-403, 2009 IEEE/ACS International Conference on Computer Systems and Applications, Rabat, Morocco May 10-13, 2009
  • C. Kurak and J. McHugh, “A Cautionary Note On Image Downgrading,” Proc. IEEE Eighth Ann. Computer Security Applications Conf., IEEE Press, Piscataway, N.J., 1992, pp. 153-159.
  • B. Pfitzmann, “Information Hiding Terminology,” Proc. First Int’l Workshop Information Hiding, Lecture Notes in Computer Science No. 1,174, Springer-Verlag, Berlin, 1996, pp. 347-356.
  • T. Aura, “Invisible Communication,” EET 1995, technical report, Helsinki Univ. of Technology, Finland, Nov. 1995; http://deadlock.hut.fi/ste/ste_html.html.
  • I. Cox et al., “A Secure, Robust Watermark for Multimedia,”Proc. First Int’l Workshop Information Hiding, Lecture Notes in Computer Science No. 1, 174, Springer- Verlag, Berlin, 1996, pp. 185-206.
  • A. Brown, S-Tools for Windows, 1994, ftp://idea.sec.dsi.unimi.it/pub/security/crypt/code/s-tools3.zip.
  • E. Koch, J. Rindfrey, and J. Zhao, “Copyright Protection for Multimedia Data,” Proc. Int’l Conf. Digital Media and Electronic Publishing, Leeds, UK, 1994.
  • W. Brown and B.J. Shepherd, Graphics File Formats: Reference and Guide, Manning Publications, Greenwich, Conn., 1995.
  • X-G. Xia, C.G. Boncelet, and G.R. Arce, “A Multiresolution Watermark for Digital Images,” IEEE Int’l Conf. Image Processing, IEEE Press, Piscataway, N.J., 1997.
  • W. Bender et al., “Techniques for Data Hiding,” IBM Systems J., Vol. 35, Nos. 3 and 4, 1996, pp. 313-336.
  • I.J. Cox et al., “Secure Spread Spectrum Watermarking for Multimedia,” Tech. Report 95-10, NEC Research Inst., Princeton, N.J., 1995.
  • M.P. Leong, O.Y.H. Cheung, K.H. Tsoi and P.H.W. Leong, “A Bit-Serial Implementation of the International Data Encryption Algorithm IDEA,” 2000 IEEE Symposium on Field-Programmable Custom Computing Machines, IEEE (2000), pp. 122-131.
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Algorithms Hiding data behind image Cryptography Steganography Max-Bit Algorithm

Powered by PhDFocusTM