A Data Hiding Model with High Security Features Combining Finite State Machines and PMM method

Recent years have witnessed the rapid development of the Internet and telecommunication techniques. Information security is becoming more and more important. Applications such as covert communication, copyright protection, etc, stimulate the research of information hiding techniques. Traditionally, encryption is used to realize the communication security. However, important information is not protected once decoded. Steganography is the art and science of communicating in a way which hides the existence of the communication. Important information is firstly hidden in a host data, such as digital image, video or audio, etc, and then transmitted secretly to the receiver.In this paper a data hiding model with high security features combining both cryptography using finite state sequential machine and image based steganography technique for communicating information more securely between two locations is proposed. The authors incorporated the idea of secret key for authentication at both ends in order to achieve high level of security. Before the embedding operation the secret information has been encrypted with the help of finite-state sequential machine and segmented in different parts. The cover image is also segmented in different objects through normalized cut.Each part of the encoded secret information has been embedded with the help of a novel image steganographic method (PMM) on different cuts of the cover image to form different stego objects. Finally stego image is formed by combining different stego objects and transmit to the receiver side. At the receiving end different opposite processes should run to get the back the original secret message.




References:
[1] Ahmad T. Al-Taani. and Abdullah M. AL-Issa. A novel steganographic
method for gray-level images. International Journal of Computer,
Information, and Systems Science, and Engineering, 3, 2009.
[2] RJ Anderson. Stretching the limits of steganography. Information
Hiding, Springer Lecture Notes in Computer Science, 1174:39-48, 1996.
[3] Ross J. Anderson. and Fabien A.P.Petitcolas. On the limits of steganography.
IEEE Journal on Selected Areas in Communications (J-SAC),
Special Issue on Copyright and Privacy Protection, 16:474-481, 1998.
[4] Souvik Bhattacharyya. and Gautam Sanyal. Study of secure steganography
model. In Proceedings of International Conference on AdvancedComputing
and Communication Technologies (ICACCT-2008),
Panipath,India, 2008.
[5] Souvik Bhattacharyya. and Gautam Sanyal. An image based steganography
model for promoting global cyber security. In Proceedings of
International Conference on Systemics, Cybernetics and Informatics,
Hyderabad,India, 2009.
[6] Souvik Bhattacharyya. and Gautam Sanyal. Implementation and design
of an image based steganographic model. In Proceedings of IEEE
International Advance Computing Conference, Patiala ,India, 2009.
[7] Souvik Bhattacharyya. and Gautam Sanyal. Hiding data in images
using pixel mapping method (pmm). In Proceedings of 9th annual
Conference on Security and Management (SAM) under The 2010 World
Congress in Computer Science,Computer Engineering, and Applied
Computing(WorldComp 2010), LasVegas,USA, July 12-15,2010.
[8] J.Y. Hsiao. C.C. Chang. and C.-S. Chan. Finding optimal leastsignificant-
bit substitution in image hiding by dynamic programming
strategy. Pattern Recognition, 36:1583-1595, 2003.
[9] C.K. Chan. and L. M.Cheng. Hiding data in images by simple lsb
substitution. Pattern Recognition, 37:469-474, 2004.
[10] Scott. Craver. On public-key steganography in the presence of an active
warden. In Proceedings of 2nd International Workshop on Information
Hiding., pages 355-368, Portland,Oregon, USA, 1998.
[11] Potdar V.and Chang E. Gray level modification steganography for
secret communication. In IEEE International Conference on Industria
lInformatics., pages 355-368, Berlin, Germany, 2004.
[12] Nameer N. EL-Emam. Hiding a large amount of data with high security
using steganography algorithm. Journal of Computer Science, 3:223-
232.
[13] K.R. Venugopal K.B. Raja, C.R. Chowdary and L.M. Patnaik. A secure
image steganography using lsb, dct and compression techniques on raw
images. In ICISIP 2005 Third International Conference on Intelligent
Sensing and Information Processing, pages 170- 176.
[14] P Huang. K.C. Chang., C.P Chang. and T.M Tu. A novel image
steganography method using tri-way pixel value differencing. Journal
of Multimedia, 3, 2008.
[15] Y. K. Lee. and L. H.Chen. High capacity image steganographic model.
IEE Proc.-Vision, Image and Signal Processing, 147:288-294, 2000.
[16] N.F.Johnson. and S. Jajodia. Steganography: seeing the unseen. IEEE
Computer, 16:26-34, 1998.
[17] C.F. Lin. R.Z. Wang. and J.C. Lin. Image hiding by optimal lsb
substitution and genetic algorithm. Pattern Recognition, 34:671-683,
2001.
[18] J. Shi and J. Malik. Normalized cuts and image segmentation. IEEE
Trans. PAMI, 22:888-905.
[19] J. Shi and J. Malik. Normalized cuts and image segmentation. In Int.
Conf. Computer Vision and Pattern Recognition, San Juan, Puerto Rico,
1997.
[20] Gustavus J. Simmons. The prisoners- problem and the subliminal
channel. Proceedings of CRYPTO., 83:51-67, 1984.
[21] JHP Eloff. T Mrkel. and MS Olivier. An overview of image steganography.
In Proceedings of the fifth annual Information Security South
Africa Conference., 2005.
[22] D.C. Wu. and W.H. Tsai. A steganographic method for images by pixelvalue
differencing. Pattern Recognition Letters, 24:1613-1626, 2003.
[23] Y.K.Lee. and L.H.Chen. High capacity image steganographic model. In
IEEprocedings online no. 20000341, 2000.