A High Capacitive and Confidentiality Steganography Using Private key

Abstract

Steganography and Steganalysis are two important areas of research that involve a number of applications. These two areas of research are important especially when reliable and secure information exchange is required. To enhance the embedding capacity of image steganography and provide an imperceptible stego-image for human vision, a novel adaptive number of least significant bits substitution method with private stego-key based on gray-level ranges is proposed in this paper. The new technique embeds binary bit stream in 8-bits gray-scale image. The method also verifies whether the attacker has tried to modify the secret hidden (or stego-image also) information in the stego-image. The technique embeds the hidden information in the spatial domain of the cover image and uses simple (Ex-OR operation based) digital signature using 140-bit key to verify the integrity from the stego-image.

Authors and Affiliations

Smriti Gupta| Department Of Computer Science and Engineering NRI Institute of Science and Technology Bhopal, MP,India smriti.gupta@gmail.com

Keywords

Related Articles

Monitoring and Protection of Oil and Gas Condition in Industrial Using Wireless Sensor Networks

Wireless Sensor Networks (WSNs) are one of the fastest growing and emerging technologies in the field of Wireless networking today. WSNs have a vast amount of applications including environmental monitoring, military, ec...

A Mathematical Approach towards Mitigating the Effects of Wormhole Attack

Mobile Ad-hoc or spontaneous wireless networks are threatened by a powerful attack known as the wormhole attack. The wormhole attack is very powerful and preventing the attack has proven to be difficult. A strategic plac...

User Driven Feedback Control System driven using CAN Protocol

Industrial automation is a sector having vast possibilities for major improvements. The system described in this paper consists of a console master computer (CMC) which will monitor various physical nodes usually found i...

Reconstruction of Cloud Contaminated Remote Sensing Images Using Inpainting Strategy

This paper focuses a method for cloud detection and their reconstruction technique. Detecting these portions of an image and then filling in the missing data is an important photo editing work. The filling-in approach su...

Overlap Wavelet Transform for Image Segmentation

A new color image segmentation approach based on OWT is presented in this work. OWT extracts wavelet features which give a good separation of different patterns. Moreover the proposed algorithm uses morphological oper...

Download PDF file
  • EP ID EP8264
  • DOI -
  • Views 554
  • Downloads 27

How To Cite

Smriti Gupta (2011). A High Capacitive and Confidentiality Steganography Using Private key. International Journal of Electronics Communication and Computer Technology, 1(1), 9-14. https://europub.co.uk./articles/-A-8264