Search. Read. Cite.

Easy to search. Easy to read. Easy to cite with credible sources.

Research Article
Brownian Motion of Binary and Gray-Binary and Gray Bits in Image for Stego

Rengarajan Amirtharajan and John Bosco Balagurn Rayappan

Journal of Applied Sciences, 2012, 12(5), 428-439.

Abstract

Computers have invaded all premises of the human world, starting from a grocery store to a missile launching center. Because of the omnipresence of computers, it becomes more and more difficult everyday to secure the confidential information from misuse. The fairly common technique of cryptography has been proved inadequate in recent years. Steganography, a contemporary yet an age-old technique to hide secret data into an unsuspected cover media like an image, thereby preventing the recognition of the very presence of secret data, is an alternative. In this study, an improved image steganographic approach is proposed. This method reduces the mean square error (MSE) by localizing the error-reduction process to every row. The error reduction is performed by selective embedding of the actual secret, its binary complement, gray-coded version or inverted gray-coded version. Of the four versions, the version giving the least MSE is embedded on a row-by-row basis. This method reduces the MSE by a factor of 1.8 and boosts the peak signal to noise ratio (PSNR) by a 0.25 db and considerably increases the security.

ASCI-ID: 35-4436

Cited References Fulltext

Related Articles


A Novel Embedding Method to Increase Capacity and Robustness of Low-bit Encoding Audio Steganography Technique Using Noise Gate Software Logic Algorithm

Journal of Applied Sciences, 2010, 10(1), 59-64.

On the Capacity and Security of Steganography Approaches: An Overview

Journal of Applied Sciences, 2010, 10(16), 1825-1833.

On the Differences between Hiding Information and Cryptography Techniques: An Overview

Journal of Applied Sciences, 2010, 10(15), 1650-1655.

Hiding Data in Video File: An Overview

Journal of Applied Sciences, 2010, 10(15), 1644-1649.

An Overview on Hiding Information Technique in Images

Journal of Applied Sciences, 2010, 10(18), 2094-2100.

Investigate the Capability of Applying Hidden Data in Text File: An Overview

Journal of Applied Sciences, 2010, 10(17), 1916-1922.

Survey and Analysis of Hardware Cryptographic and Steganographic Systems on FPGA

Journal of Applied Sciences, 2012, 12(3), 201-210.

Sub Carriers Carry Secret: An Absolute Stego Approach

Journal of Applied Sciences, 2014, 14(15), 1728-1735.

Coded Crypted Converted Hiding (C3H)-A Stego Channel

Journal of Applied Sciences, 2014, 14(16), 1786-1797.

Adaptive Data Hiding Based on Visual Cryptography

Journal of Applied Sciences, 2014, 14(15), 1674-1688.

Random Image Steganography using Pixel Indicator to Enhance Hiding Capacity

Journal of Applied Sciences, 2014, 14(16), 1798-1808.

Multi (Carrier+Modulator) Adaptive System-an Anti Fading Stego Approach

Journal of Applied Sciences, 2014, 14(16), 1836-1843.