A Data Hiding Model with High Security Features Combining Finite State Machines and PMM method
Recent years have witnessed the rapid development of
the Internet and telecommunication techniques. Information security
is becoming more and more important. Applications such as covert
communication, copyright protection, etc, stimulate the research of
information hiding techniques. Traditionally, encryption is used to
realize the communication security. However, important information
is not protected once decoded. Steganography is the art and science
of communicating in a way which hides the existence of the communication.
Important information is firstly hidden in a host data, such
as digital image, video or audio, etc, and then transmitted secretly
to the receiver.In this paper a data hiding model with high security
features combining both cryptography using finite state sequential
machine and image based steganography technique for communicating
information more securely between two locations is proposed.
The authors incorporated the idea of secret key for authentication
at both ends in order to achieve high level of security. Before the
embedding operation the secret information has been encrypted with
the help of finite-state sequential machine and segmented in different
parts. The cover image is also segmented in different objects through
normalized cut.Each part of the encoded secret information has been
embedded with the help of a novel image steganographic method
(PMM) on different cuts of the cover image to form different stego
objects. Finally stego image is formed by combining different stego
objects and transmit to the receiver side. At the receiving end different
opposite processes should run to get the back the original secret
message.
[1] Ahmad T. Al-Taani. and Abdullah M. AL-Issa. A novel steganographic
method for gray-level images. International Journal of Computer,
Information, and Systems Science, and Engineering, 3, 2009.
[2] RJ Anderson. Stretching the limits of steganography. Information
Hiding, Springer Lecture Notes in Computer Science, 1174:39-48, 1996.
[3] Ross J. Anderson. and Fabien A.P.Petitcolas. On the limits of steganography.
IEEE Journal on Selected Areas in Communications (J-SAC),
Special Issue on Copyright and Privacy Protection, 16:474-481, 1998.
[4] Souvik Bhattacharyya. and Gautam Sanyal. Study of secure steganography
model. In Proceedings of International Conference on AdvancedComputing
and Communication Technologies (ICACCT-2008),
Panipath,India, 2008.
[5] Souvik Bhattacharyya. and Gautam Sanyal. An image based steganography
model for promoting global cyber security. In Proceedings of
International Conference on Systemics, Cybernetics and Informatics,
Hyderabad,India, 2009.
[6] Souvik Bhattacharyya. and Gautam Sanyal. Implementation and design
of an image based steganographic model. In Proceedings of IEEE
International Advance Computing Conference, Patiala ,India, 2009.
[7] Souvik Bhattacharyya. and Gautam Sanyal. Hiding data in images
using pixel mapping method (pmm). In Proceedings of 9th annual
Conference on Security and Management (SAM) under The 2010 World
Congress in Computer Science,Computer Engineering, and Applied
Computing(WorldComp 2010), LasVegas,USA, July 12-15,2010.
[8] J.Y. Hsiao. C.C. Chang. and C.-S. Chan. Finding optimal leastsignificant-
bit substitution in image hiding by dynamic programming
strategy. Pattern Recognition, 36:1583-1595, 2003.
[9] C.K. Chan. and L. M.Cheng. Hiding data in images by simple lsb
substitution. Pattern Recognition, 37:469-474, 2004.
[10] Scott. Craver. On public-key steganography in the presence of an active
warden. In Proceedings of 2nd International Workshop on Information
Hiding., pages 355-368, Portland,Oregon, USA, 1998.
[11] Potdar V.and Chang E. Gray level modification steganography for
secret communication. In IEEE International Conference on Industria
lInformatics., pages 355-368, Berlin, Germany, 2004.
[12] Nameer N. EL-Emam. Hiding a large amount of data with high security
using steganography algorithm. Journal of Computer Science, 3:223-
232.
[13] K.R. Venugopal K.B. Raja, C.R. Chowdary and L.M. Patnaik. A secure
image steganography using lsb, dct and compression techniques on raw
images. In ICISIP 2005 Third International Conference on Intelligent
Sensing and Information Processing, pages 170- 176.
[14] P Huang. K.C. Chang., C.P Chang. and T.M Tu. A novel image
steganography method using tri-way pixel value differencing. Journal
of Multimedia, 3, 2008.
[15] Y. K. Lee. and L. H.Chen. High capacity image steganographic model.
IEE Proc.-Vision, Image and Signal Processing, 147:288-294, 2000.
[16] N.F.Johnson. and S. Jajodia. Steganography: seeing the unseen. IEEE
Computer, 16:26-34, 1998.
[17] C.F. Lin. R.Z. Wang. and J.C. Lin. Image hiding by optimal lsb
substitution and genetic algorithm. Pattern Recognition, 34:671-683,
2001.
[18] J. Shi and J. Malik. Normalized cuts and image segmentation. IEEE
Trans. PAMI, 22:888-905.
[19] J. Shi and J. Malik. Normalized cuts and image segmentation. In Int.
Conf. Computer Vision and Pattern Recognition, San Juan, Puerto Rico,
1997.
[20] Gustavus J. Simmons. The prisoners- problem and the subliminal
channel. Proceedings of CRYPTO., 83:51-67, 1984.
[21] JHP Eloff. T Mrkel. and MS Olivier. An overview of image steganography.
In Proceedings of the fifth annual Information Security South
Africa Conference., 2005.
[22] D.C. Wu. and W.H. Tsai. A steganographic method for images by pixelvalue
differencing. Pattern Recognition Letters, 24:1613-1626, 2003.
[23] Y.K.Lee. and L.H.Chen. High capacity image steganographic model. In
IEEprocedings online no. 20000341, 2000.
[1] Ahmad T. Al-Taani. and Abdullah M. AL-Issa. A novel steganographic
method for gray-level images. International Journal of Computer,
Information, and Systems Science, and Engineering, 3, 2009.
[2] RJ Anderson. Stretching the limits of steganography. Information
Hiding, Springer Lecture Notes in Computer Science, 1174:39-48, 1996.
[3] Ross J. Anderson. and Fabien A.P.Petitcolas. On the limits of steganography.
IEEE Journal on Selected Areas in Communications (J-SAC),
Special Issue on Copyright and Privacy Protection, 16:474-481, 1998.
[4] Souvik Bhattacharyya. and Gautam Sanyal. Study of secure steganography
model. In Proceedings of International Conference on AdvancedComputing
and Communication Technologies (ICACCT-2008),
Panipath,India, 2008.
[5] Souvik Bhattacharyya. and Gautam Sanyal. An image based steganography
model for promoting global cyber security. In Proceedings of
International Conference on Systemics, Cybernetics and Informatics,
Hyderabad,India, 2009.
[6] Souvik Bhattacharyya. and Gautam Sanyal. Implementation and design
of an image based steganographic model. In Proceedings of IEEE
International Advance Computing Conference, Patiala ,India, 2009.
[7] Souvik Bhattacharyya. and Gautam Sanyal. Hiding data in images
using pixel mapping method (pmm). In Proceedings of 9th annual
Conference on Security and Management (SAM) under The 2010 World
Congress in Computer Science,Computer Engineering, and Applied
Computing(WorldComp 2010), LasVegas,USA, July 12-15,2010.
[8] J.Y. Hsiao. C.C. Chang. and C.-S. Chan. Finding optimal leastsignificant-
bit substitution in image hiding by dynamic programming
strategy. Pattern Recognition, 36:1583-1595, 2003.
[9] C.K. Chan. and L. M.Cheng. Hiding data in images by simple lsb
substitution. Pattern Recognition, 37:469-474, 2004.
[10] Scott. Craver. On public-key steganography in the presence of an active
warden. In Proceedings of 2nd International Workshop on Information
Hiding., pages 355-368, Portland,Oregon, USA, 1998.
[11] Potdar V.and Chang E. Gray level modification steganography for
secret communication. In IEEE International Conference on Industria
lInformatics., pages 355-368, Berlin, Germany, 2004.
[12] Nameer N. EL-Emam. Hiding a large amount of data with high security
using steganography algorithm. Journal of Computer Science, 3:223-
232.
[13] K.R. Venugopal K.B. Raja, C.R. Chowdary and L.M. Patnaik. A secure
image steganography using lsb, dct and compression techniques on raw
images. In ICISIP 2005 Third International Conference on Intelligent
Sensing and Information Processing, pages 170- 176.
[14] P Huang. K.C. Chang., C.P Chang. and T.M Tu. A novel image
steganography method using tri-way pixel value differencing. Journal
of Multimedia, 3, 2008.
[15] Y. K. Lee. and L. H.Chen. High capacity image steganographic model.
IEE Proc.-Vision, Image and Signal Processing, 147:288-294, 2000.
[16] N.F.Johnson. and S. Jajodia. Steganography: seeing the unseen. IEEE
Computer, 16:26-34, 1998.
[17] C.F. Lin. R.Z. Wang. and J.C. Lin. Image hiding by optimal lsb
substitution and genetic algorithm. Pattern Recognition, 34:671-683,
2001.
[18] J. Shi and J. Malik. Normalized cuts and image segmentation. IEEE
Trans. PAMI, 22:888-905.
[19] J. Shi and J. Malik. Normalized cuts and image segmentation. In Int.
Conf. Computer Vision and Pattern Recognition, San Juan, Puerto Rico,
1997.
[20] Gustavus J. Simmons. The prisoners- problem and the subliminal
channel. Proceedings of CRYPTO., 83:51-67, 1984.
[21] JHP Eloff. T Mrkel. and MS Olivier. An overview of image steganography.
In Proceedings of the fifth annual Information Security South
Africa Conference., 2005.
[22] D.C. Wu. and W.H. Tsai. A steganographic method for images by pixelvalue
differencing. Pattern Recognition Letters, 24:1613-1626, 2003.
[23] Y.K.Lee. and L.H.Chen. High capacity image steganographic model. In
IEEprocedings online no. 20000341, 2000.
@article{"International Journal of Information, Control and Computer Sciences:60917", author = "Souvik Bhattacharyya and Gautam Sanyal", title = "A Data Hiding Model with High Security Features Combining Finite State Machines and PMM method", abstract = "Recent years have witnessed the rapid development of
the Internet and telecommunication techniques. Information security
is becoming more and more important. Applications such as covert
communication, copyright protection, etc, stimulate the research of
information hiding techniques. Traditionally, encryption is used to
realize the communication security. However, important information
is not protected once decoded. Steganography is the art and science
of communicating in a way which hides the existence of the communication.
Important information is firstly hidden in a host data, such
as digital image, video or audio, etc, and then transmitted secretly
to the receiver.In this paper a data hiding model with high security
features combining both cryptography using finite state sequential
machine and image based steganography technique for communicating
information more securely between two locations is proposed.
The authors incorporated the idea of secret key for authentication
at both ends in order to achieve high level of security. Before the
embedding operation the secret information has been encrypted with
the help of finite-state sequential machine and segmented in different
parts. The cover image is also segmented in different objects through
normalized cut.Each part of the encoded secret information has been
embedded with the help of a novel image steganographic method
(PMM) on different cuts of the cover image to form different stego
objects. Finally stego image is formed by combining different stego
objects and transmit to the receiver side. At the receiving end different
opposite processes should run to get the back the original secret
message.", keywords = "Cover Image, Finite state sequential machine,Melaymachine,Pixel Mapping Method (PMM), Stego Image,NCUT.", volume = "4", number = "8", pages = "1293-8", }