Research Article

Snake and Ladder based Algorithm for Steganographic Application of Specific Streamline Bits on Prime Gap Method

by  Jas R Sheth
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 94 - Issue 3
Published: May 2014
Authors: Jas R Sheth
10.5120/16320-5567
PDF

Jas R Sheth . Snake and Ladder based Algorithm for Steganographic Application of Specific Streamline Bits on Prime Gap Method. International Journal of Computer Applications. 94, 3 (May 2014), 1-5. DOI=10.5120/16320-5567

                        @article{ 10.5120/16320-5567,
                        author  = { Jas R Sheth },
                        title   = { Snake and Ladder based Algorithm for Steganographic Application of Specific Streamline Bits on Prime Gap Method },
                        journal = { International Journal of Computer Applications },
                        year    = { 2014 },
                        volume  = { 94 },
                        number  = { 3 },
                        pages   = { 1-5 },
                        doi     = { 10.5120/16320-5567 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2014
                        %A Jas R Sheth
                        %T Snake and Ladder based Algorithm for Steganographic Application of Specific Streamline Bits on Prime Gap Method%T 
                        %J International Journal of Computer Applications
                        %V 94
                        %N 3
                        %P 1-5
                        %R 10.5120/16320-5567
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

Steganography is the art of hiding data in a particular form of media and making it accessible for the recipient. This process of encrypting data can be embedded in media like image and audio. This paper represents a snake and ladder based algorithm for encrypting a streamline of bits in a greyscale image.

References
  • N. F. Johnson, S. Jajodia, Exploring Steganography: seeing the unseen, IEEE Computer 31 (2) (1998) 26–34.
  • J. Tian, "Reversible Data Embedding using a Difference Expansion," IEEE Trans. Circuits Syst. Video Technol. , vol. 13, no. 8, pp. 890–896, Aug. 2003
  • T Morkel, J. H. P Eloff, M. S Olivier, "AN OVERVIEW OF IMAGE STEGANOGRAPHY Proceedings of the Fifth Annual Information Security South Africa Conference (ISSA2005), 2005
  • Z. Ni, Y. Q. Shi, N. Ansari and W. Su, "Reversible Data Hiding", IEEE Trans. on Circuits and Systems for Video Technology, vol. 16, no. 3 , pp. 354-362,Mar 2006.
  • D. M. Thodi and J. J. Rodriguez, "Expansion EmbeddingTechniques for G. K. Wallace, "The JPEG still-picture compression standard," Commun. ACM, vol. 34, pp. 30–44, Apr. 1991.
  • W. B. Pennebaker and J. L. Mitchell, JPEG Still Image Data Compression Standard. New York: Van Nostrand Reinhold, 1992.
  • "MPEG-2 video," ITU-T Recommendation H. 262-ISO/IEC 13818-2, Jan. 1995.
  • "Video coding for low bitrate communication," ITU-T Recommendation H. 263, Dec. 1995. Reversible Watermarking, " IEEE Trans. on Image Processing, vol. 16, no. 3, pp. 721–730, Mar. 2007.
  • K. L. chung, Y. H. Huang, W. M. Yen, W. C. Teng "Distortion Reduction for Histogram Modification Based Reversible Data Hiding" Applied Mathematics and computation, vol. 218, no. 22, pp. 5819-5826, Dec 2011.
  • R. Chandramouli, Nasir Memon, "Analysis of LSB based Image Steganography Techniques",Proc. International Conference on Image Processing, 2001, Vol. 3, pp. 1019-1022, 2001.
  • Mehdi Kharrazi, Husrev T. Sencar,Nasir Memon, "Image Steganography: Concepts and Practice", WPSC/Lecture Note Series,pp. 3,April,2004. Source: www2. ims. nus. edu. sg/preprints/ab2004-25. pdf.
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Image Stegnography Snake and Ladder Algorithm LSB bit plane Stenography Edge encryption Prime Gap.

Powered by PhDFocusTM