Research Article

Steganalysis Technique on Gray Scale Image by Varying Message Length using Adaptive Histogram Equalization Attack

by  Anuj Kumar, Shivani Khurana
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 90 - Issue 14
Published: March 2014
Authors: Anuj Kumar, Shivani Khurana
10.5120/15790-4540
PDF

Anuj Kumar, Shivani Khurana . Steganalysis Technique on Gray Scale Image by Varying Message Length using Adaptive Histogram Equalization Attack. International Journal of Computer Applications. 90, 14 (March 2014), 33-36. DOI=10.5120/15790-4540

                        @article{ 10.5120/15790-4540,
                        author  = { Anuj Kumar,Shivani Khurana },
                        title   = { Steganalysis Technique on Gray Scale Image by Varying Message Length using Adaptive Histogram Equalization Attack },
                        journal = { International Journal of Computer Applications },
                        year    = { 2014 },
                        volume  = { 90 },
                        number  = { 14 },
                        pages   = { 33-36 },
                        doi     = { 10.5120/15790-4540 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2014
                        %A Anuj Kumar
                        %A Shivani Khurana
                        %T Steganalysis Technique on Gray Scale Image by Varying Message Length using Adaptive Histogram Equalization Attack%T 
                        %J International Journal of Computer Applications
                        %V 90
                        %N 14
                        %P 33-36
                        %R 10.5120/15790-4540
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

Steganography considered as a technique for secret communication without knowing the others and only an authorized user can access the information which is embedding in the cover medium. Steganalysis is the process to detect of presence of Steganography and to destroy, extract it. In this Paper There is Adaptive Histogram Equalization Technique that performed on the Stego Image that is category of the Histogram Equalization attack and measuring the quality of Image after applying the Attack.

References
  • Atallah M. Al-Shatnawi(2012) "A New Method in Image Steganography with Improved Image Quality. " Al-albayt University, Vol. 6, 2012, no. 79, 3907 - 3915. http://www. m-hikari. com/ams/ams-2012/ams-77-80-2012/alshatnawiAMS77-80-2012. pdf
  • Ankita Agarwal(2012)" Security Enhancement Scheme for Image Steganography using S-DES Technique ". International Journal of Advanced Research in Computer Science and Software Engineering , April 2012/volume 2 issue 4/V2I400162. http://www. ijarcsse. com/docs/papers/April2012/Volume_2_issue_4/V2I400162. pdf
  • Nazanin Zaker , Ali Hamzeh(2011)"A novel steganalysis for TPVD steganographic method based on differences of pixel difference histogram"Shiraz University, 25 january 2011. http://connection. ebscohost. com/c/articles/73762949/novel-steganalysis-tpvd-steganographic-method-based-differences-pixel-difference-histogram
  • Arpan Ghorai, Dibyendu Chowdhury, Satyajit Das(2011)," Design and Implementation of Public Key Steganography," International Journal of Soft Computing and Engineering (IJSCE) http://digitalcommons. unl. edu/cgi/viewcontent. cgi?article=1095&context=computerelectronicfacpub&sei
  • Dr. N. Meghanathan, " Least Significant Based (LSB) Steganography ,''Jackson State University. http://www. jsums. edu/cms/tues/docs/Steganography/LSB-Steganography. pdf
  • "Peak signal to noise ratio". http://en. wikipedia. org/wiki/Peak_signal-to-noise_ratio
  • V. Sharma, S. kumar, "A New Approach to Hide Text in Images Using Steganography"ijarcsse, 4 april 2013, V3I40401 volume 3. http://www. ijarcsse. com/docs/papers/Volume_3/4_April2013/V3I4-0401. pdf
  • A. Kumar and Km. Pooja, "Steganography : A Data Hiding technique," International journal of computer Application(0975-8887),vol-9 no. 7,november 2010. http://citeseerx. ist. psu. edu/viewdoc/download?rep=rep1&type=pdf&doi=10. 1. 1. 206. 5754
  • Kevin O'Bryant, "Principle of steganography". http://www. math. ucsd. edu/~crypto/Projects/MaxWeiss/steganography. pdf
  • Introduction to Stegnography. http://io. acad. athabascau. ca/~grizzlie/Comp607/menu. htm
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Least Significant Bit Steganography Secret Information Adaptive histogram equalization.

Powered by PhDFocusTM