In recent years, everything is trending toward digitalization
and with the rapid development of the Internet technologies,
digital media needs to be transmitted conveniently over the network.
Attacks, misuse or unauthorized access of information is of great
concern today which makes the protection of documents through
digital media a priority problem. This urges us to devise new data
hiding techniques to protect and secure the data of vital significance.
In this respect, steganography often comes to the fore as a tool for
hiding information. Steganography is a process that involves hiding
a message in an appropriate carrier like image or audio. It is of
Greek origin and means "covered or hidden writing". The goal of
steganography is covert communication. Here the carrier can be sent
to a receiver without any one except the authenticated receiver only
knows existence of the information. Considerable amount of work
has been carried out by different researchers on steganography. In this
work the authors propose a novel Steganographic method for hiding
information within the spatial domain of the gray scale image. The
proposed approach works by selecting the embedding pixels using
some mathematical function and then finds the 8 neighborhood of
the each selected pixel and map each bit of the secret message in
each of the neighbor pixel coordinate position in a specified manner.
Before embedding a checking has been done to find out whether the
selected pixel or its neighbor lies at the boundary of the image or not.
This solution is independent of the nature of the data to be hidden
and produces a stego image with minimum degradation.
[1] Ahmad T. Al-Taani. and Abdullah M. AL-Issa. A novel steganographic
method for gray-level images. International Journal of Computer,
Information, and Systems Science, and Engineering, 3, 2009.
[2] RJ Anderson. Stretching the limits of steganography. Information
Hiding, Springer Lecture Notes in Computer Science, 1174:39-48, 1996.
[3] Ross J. Anderson. and Fabien A.P.Petitcolas. On the limits of steganography.
IEEE Journal on Selected Areas in Communications (J-SAC),
Special Issue on Copyright and Privacy Protection, 16:474-481, 1998.
[4] Souvik Bhattacharyya. and Gautam Sanyal. Study of secure steganography
model. In Proceedings of International Conference on AdvancedComputing
and Communication Technologies (ICACCT-2008),
Panipath,India, 2008.
[5] Souvik Bhattacharyya. and Gautam Sanyal. An image based steganography
model for promoting global cyber security. In Proceedings of
International Conference on Systemics, Cybernetics and Informatics,
Hyderabad,India, 2009.
[6] Souvik Bhattacharyya. and Gautam Sanyal. Implementation and design
of an image based steganographic model. In Proceedings of IEEE
International Advance Computing Conference, Patiala ,India, 2009.
[7] J.Y. Hsiao. C.C. Chang. and C.-S. Chan. Finding optimal leastsignificant-
bit substitution in image hiding by dynamic programming
strategy. Pattern Recognition, 36:1583-1595, 2003.
[8] C.K. Chan. and L. M.Cheng. Hiding data in images by simple lsb
substitution. Pattern Recognition, 37:469-474, 2004.
[9] Scott. Craver. On public-key steganography in the presence of an active
warden. In Proceedings of 2nd International Workshop on Information
Hiding., pages 355-368, Portland,Oregon, USA, 1998.
[10] Potdar V.and Chang E. Gray level modification steganography for
secret communication. In IEEE International Conference on Industria
lInformatics., pages 355-368, Berlin, Germany, 2004.
[11] P Huang. K.C. Chang., C.P Chang. and T.M Tu. A novel image
steganography method using tri-way pixel value differencing. Journal
of Multimedia, 3, 2008.
[12] Y. K. Lee. and L. H.Chen. High capacity image steganographic model.
IEE Proc.-Vision, Image and Signal Processing, 147:288-294, 2000.
[13] N.F.Johnson. and S. Jajodia. Steganography: seeing the unseen. IEEE
Computer, 16:26-34, 1998.
[14] C.F. Lin. R.Z. Wang. and J.C. Lin. Image hiding by optimal lsb
substitution and genetic algorithm. Pattern Recognition, 34:671-683,
2001.
[15] Gustavus J. Simmons. The prisoners- problem and the subliminal
channel. Proceedings of CRYPTO., 83:51-67, 1984.
[16] JHP Eloff. T Mrkel. and MS Olivier. An overview of image steganography.
In Proceedings of the fifth annual Information Security South
Africa Conference., 2005.
[17] D.C. Wu. and W.H. Tsai. A steganographic method for images by pixelvalue
differencing. Pattern Recognition Letters, 24:1613-1626, 2003.
[1] Ahmad T. Al-Taani. and Abdullah M. AL-Issa. A novel steganographic
method for gray-level images. International Journal of Computer,
Information, and Systems Science, and Engineering, 3, 2009.
[2] RJ Anderson. Stretching the limits of steganography. Information
Hiding, Springer Lecture Notes in Computer Science, 1174:39-48, 1996.
[3] Ross J. Anderson. and Fabien A.P.Petitcolas. On the limits of steganography.
IEEE Journal on Selected Areas in Communications (J-SAC),
Special Issue on Copyright and Privacy Protection, 16:474-481, 1998.
[4] Souvik Bhattacharyya. and Gautam Sanyal. Study of secure steganography
model. In Proceedings of International Conference on AdvancedComputing
and Communication Technologies (ICACCT-2008),
Panipath,India, 2008.
[5] Souvik Bhattacharyya. and Gautam Sanyal. An image based steganography
model for promoting global cyber security. In Proceedings of
International Conference on Systemics, Cybernetics and Informatics,
Hyderabad,India, 2009.
[6] Souvik Bhattacharyya. and Gautam Sanyal. Implementation and design
of an image based steganographic model. In Proceedings of IEEE
International Advance Computing Conference, Patiala ,India, 2009.
[7] J.Y. Hsiao. C.C. Chang. and C.-S. Chan. Finding optimal leastsignificant-
bit substitution in image hiding by dynamic programming
strategy. Pattern Recognition, 36:1583-1595, 2003.
[8] C.K. Chan. and L. M.Cheng. Hiding data in images by simple lsb
substitution. Pattern Recognition, 37:469-474, 2004.
[9] Scott. Craver. On public-key steganography in the presence of an active
warden. In Proceedings of 2nd International Workshop on Information
Hiding., pages 355-368, Portland,Oregon, USA, 1998.
[10] Potdar V.and Chang E. Gray level modification steganography for
secret communication. In IEEE International Conference on Industria
lInformatics., pages 355-368, Berlin, Germany, 2004.
[11] P Huang. K.C. Chang., C.P Chang. and T.M Tu. A novel image
steganography method using tri-way pixel value differencing. Journal
of Multimedia, 3, 2008.
[12] Y. K. Lee. and L. H.Chen. High capacity image steganographic model.
IEE Proc.-Vision, Image and Signal Processing, 147:288-294, 2000.
[13] N.F.Johnson. and S. Jajodia. Steganography: seeing the unseen. IEEE
Computer, 16:26-34, 1998.
[14] C.F. Lin. R.Z. Wang. and J.C. Lin. Image hiding by optimal lsb
substitution and genetic algorithm. Pattern Recognition, 34:671-683,
2001.
[15] Gustavus J. Simmons. The prisoners- problem and the subliminal
channel. Proceedings of CRYPTO., 83:51-67, 1984.
[16] JHP Eloff. T Mrkel. and MS Olivier. An overview of image steganography.
In Proceedings of the fifth annual Information Security South
Africa Conference., 2005.
[17] D.C. Wu. and W.H. Tsai. A steganographic method for images by pixelvalue
differencing. Pattern Recognition Letters, 24:1613-1626, 2003.
@article{"International Journal of Information, Control and Computer Sciences:49270", author = "Souvik Bhattacharyya and Gautam Sanyal", title = "Hiding Data in Images Using PCP", abstract = "In recent years, everything is trending toward digitalization
and with the rapid development of the Internet technologies,
digital media needs to be transmitted conveniently over the network.
Attacks, misuse or unauthorized access of information is of great
concern today which makes the protection of documents through
digital media a priority problem. This urges us to devise new data
hiding techniques to protect and secure the data of vital significance.
In this respect, steganography often comes to the fore as a tool for
hiding information. Steganography is a process that involves hiding
a message in an appropriate carrier like image or audio. It is of
Greek origin and means "covered or hidden writing". The goal of
steganography is covert communication. Here the carrier can be sent
to a receiver without any one except the authenticated receiver only
knows existence of the information. Considerable amount of work
has been carried out by different researchers on steganography. In this
work the authors propose a novel Steganographic method for hiding
information within the spatial domain of the gray scale image. The
proposed approach works by selecting the embedding pixels using
some mathematical function and then finds the 8 neighborhood of
the each selected pixel and map each bit of the secret message in
each of the neighbor pixel coordinate position in a specified manner.
Before embedding a checking has been done to find out whether the
selected pixel or its neighbor lies at the boundary of the image or not.
This solution is independent of the nature of the data to be hidden
and produces a stego image with minimum degradation.", keywords = "Cover Image, LSB, Pixel Coordinate Position (PCP),
Stego Image.", volume = "3", number = "3", pages = "496-7", }