Hiding Data in Images Using PCP

In recent years, everything is trending toward digitalization and with the rapid development of the Internet technologies, digital media needs to be transmitted conveniently over the network. Attacks, misuse or unauthorized access of information is of great concern today which makes the protection of documents through digital media a priority problem. This urges us to devise new data hiding techniques to protect and secure the data of vital significance. In this respect, steganography often comes to the fore as a tool for hiding information. Steganography is a process that involves hiding a message in an appropriate carrier like image or audio. It is of Greek origin and means "covered or hidden writing". The goal of steganography is covert communication. Here the carrier can be sent to a receiver without any one except the authenticated receiver only knows existence of the information. Considerable amount of work has been carried out by different researchers on steganography. In this work the authors propose a novel Steganographic method for hiding information within the spatial domain of the gray scale image. The proposed approach works by selecting the embedding pixels using some mathematical function and then finds the 8 neighborhood of the each selected pixel and map each bit of the secret message in each of the neighbor pixel coordinate position in a specified manner. Before embedding a checking has been done to find out whether the selected pixel or its neighbor lies at the boundary of the image or not. This solution is independent of the nature of the data to be hidden and produces a stego image with minimum degradation.




References:
[1] Ahmad T. Al-Taani. and Abdullah M. AL-Issa. A novel steganographic
method for gray-level images. International Journal of Computer,
Information, and Systems Science, and Engineering, 3, 2009.
[2] RJ Anderson. Stretching the limits of steganography. Information
Hiding, Springer Lecture Notes in Computer Science, 1174:39-48, 1996.
[3] Ross J. Anderson. and Fabien A.P.Petitcolas. On the limits of steganography.
IEEE Journal on Selected Areas in Communications (J-SAC),
Special Issue on Copyright and Privacy Protection, 16:474-481, 1998.
[4] Souvik Bhattacharyya. and Gautam Sanyal. Study of secure steganography
model. In Proceedings of International Conference on AdvancedComputing
and Communication Technologies (ICACCT-2008),
Panipath,India, 2008.
[5] Souvik Bhattacharyya. and Gautam Sanyal. An image based steganography
model for promoting global cyber security. In Proceedings of
International Conference on Systemics, Cybernetics and Informatics,
Hyderabad,India, 2009.
[6] Souvik Bhattacharyya. and Gautam Sanyal. Implementation and design
of an image based steganographic model. In Proceedings of IEEE
International Advance Computing Conference, Patiala ,India, 2009.
[7] J.Y. Hsiao. C.C. Chang. and C.-S. Chan. Finding optimal leastsignificant-
bit substitution in image hiding by dynamic programming
strategy. Pattern Recognition, 36:1583-1595, 2003.
[8] C.K. Chan. and L. M.Cheng. Hiding data in images by simple lsb
substitution. Pattern Recognition, 37:469-474, 2004.
[9] Scott. Craver. On public-key steganography in the presence of an active
warden. In Proceedings of 2nd International Workshop on Information
Hiding., pages 355-368, Portland,Oregon, USA, 1998.
[10] Potdar V.and Chang E. Gray level modification steganography for
secret communication. In IEEE International Conference on Industria
lInformatics., pages 355-368, Berlin, Germany, 2004.
[11] P Huang. K.C. Chang., C.P Chang. and T.M Tu. A novel image
steganography method using tri-way pixel value differencing. Journal
of Multimedia, 3, 2008.
[12] Y. K. Lee. and L. H.Chen. High capacity image steganographic model.
IEE Proc.-Vision, Image and Signal Processing, 147:288-294, 2000.
[13] N.F.Johnson. and S. Jajodia. Steganography: seeing the unseen. IEEE
Computer, 16:26-34, 1998.
[14] C.F. Lin. R.Z. Wang. and J.C. Lin. Image hiding by optimal lsb
substitution and genetic algorithm. Pattern Recognition, 34:671-683,
2001.
[15] Gustavus J. Simmons. The prisoners- problem and the subliminal
channel. Proceedings of CRYPTO., 83:51-67, 1984.
[16] JHP Eloff. T Mrkel. and MS Olivier. An overview of image steganography.
In Proceedings of the fifth annual Information Security South
Africa Conference., 2005.
[17] D.C. Wu. and W.H. Tsai. A steganographic method for images by pixelvalue
differencing. Pattern Recognition Letters, 24:1613-1626, 2003.