Contact Us Search Paper

An Algorithm for Security Enhancement in Image Transmission Using Steganography

M. Saravanan 1, *, A. Priya 2

Corresponding Author:

M. Saravanan

Affiliation(s):

1. Hindustan Institute of Technology and Science, Department of ECE, Chennai, Tamilnadu, India.
[email protected]
2. B. S. Abdur Rahman Crescent Institute of Science and Technology, Department of ECE, Chennai, Tamilnadu, India.
[email protected]
*Corresponding Author: M.Saravanan, Email: [email protected]

Abstract:

Data communication through the public communication channels is insecure due to advanced technology available for interception of third party users. Therefore, an efficient data hiding technology is vital for secure data transmission especially when the system is connected with internet services. Audio steganography is one of the promising solutions for where the information is hidden over audio file. In this paper, a novel method for the hiding of image information by converting into another format thereby reduces the computational complexity.

Keywords:

Image Enhancement, Image Restoration, Image Scaling, Steganography, Steganalysis

Downloads: 796 Views: 4442
Cite This Paper:

M. Saravanan and A. Priya (2019). An Algorithm for Security Enhancement in Image Transmission Using Steganography. Journal of the Institute of Electronics and Computer, 1, 1-8. https://doi.org/10.33969/JIEC.2019.11001.

References:

[1] Weiqi Luo, Fangjun Huang, Jiwu Huang, “Edge Adaptive Image Steganography Based on LSB Matching Revisited”, in IEEE Transactions on Information Forensics and Security, Volume: 5, Issue: 2, pp. 201-214, 2010, DOI: 10.1109/TIFS.2010.2041812.
[2] Xinpeng Zhang, Shuozhong Wang, “Efficient Steganographic Embedding by Exploiting Modification Direction”, in  IEEE Communications Letters,Volume:10,Issue:11,November2006,DOI: 10.1109/LCOMM.2006.060863.
[3] Bin Li; Ming Wang, Xiaolong Li, Shunquan Tan, Jiwu Huang, “A Strategy of Clustering Modification Directions in Spatial Image Steganography”, in IEEE Transactions on Information Forensics and Security, Volume: 10, Issue: 9, pp. 1905-1917, 2015, DOI: 10.1109/TIFS.2015.2434600.
[4] Bingwen Feng, Wei Lu, Wei Sun, “Secure Binary Image Steganography Based on Minimizing the Distortion on the Texture”, in IEEE Transactions on Information Forensics and Security,  Volume: 10, Issue: 2, pp. 243-255, 2015, DOI: 10.1109/ TIFS.2014.2368364.
[5] Linjie Guo, Jiangqun Ni, Wenkang Su, Chengpei Tang, Yun-Qing Shi, “Using Statistical Image Model for JPEG Steganography: Uniform Embedding Revisited”, in IEEE Transactions on Information Forensics and Security, Volume: 10, Issue: 12, pp: 2669 – 2680, 2015, DOI: 10.1109/TIFS.2015.2473815.
[6] Debnath Bhattacharyya, Tai-hoon Kim  & Poulami Dutta, “A method of data hiding in audio signal”, in Journal of the Chinese Institute of Engineers, Vol 35, Issue 5, pp. 523-528, 2012, DOI: 10.1080/02533839.2012.679054.
[7] Alexandre Santos Brandao, David Calhau Jorge, “Artificial Neural Networks Applied to Image Steganography”, in IEEE Journals & Magazines, Volume: 14, Issue: 3, pp.1361- 1366, 2016, DOI: 10.1109/TLA.2016.7459621.
[8] Vahid Sedighi, Rémi Cogranne, Jessica Fridrich, “Content-Adaptive Steganography by Minimizing Statistical Detectability”, in IEEE Transactions on Information Forensics and Security, Volume: 11, Issue: 2, pp: 221 - 234, 2016,  DOI: 10.1109/TIFS.2015.2486744.