A Dynamic RGB Intensity Based Steganography Scheme

Steganography meaning covered writing. Steganography includes the concealment of information within computer files [1]. In other words, it is the Secret communication by hiding the existence of message. In this paper, we will refer to cover image, to indicate the images that do not yet contain a secret message, while we will refer to stego images, to indicate an image with an embedded secret message. Moreover, we will refer to the secret message as stego-message or hidden message. In this paper, we proposed a technique called RGB intensity based steganography model as RGB model is the technique used in this field to hide the data. The methods used here are based on the manipulation of the least significant bits of pixel values [3][4] or the rearrangement of colors to create least significant bit or parity bit patterns, which correspond to the message being hidden. The proposed technique attempts to overcome the problem of the sequential fashion and the use of stego-key to select the pixels.





References:
[1] Provos, N., Honeyman, P, Hide and seek: An introduction to
steganography, IEEE Security & Privacy Magazine 1 (2003) pp. 32-44.
[2] Karen Bailey, Kevin Curran, An evaluation of image based
steganography methods using visual inspection and automated detection
techniques, Multimedia Tools and Applications, Vol 30 , Issue 1 (2006)
pp. 55-88.
[3] Adnan Gutub, Mahmoud Ankeer, Muhammad Abu- Ghalioun,
Abdulrahman Shaheen, and Aleem Alvi, Pixel indicator high capacity
technique for RGB image based Steganography, WoSPA 2008 - 5th
IEEE International Workshop on Signal Processing and its Applications,
University of Sharjah, Sharjah, U.A.E. 18 - 20 March 2008.
[4] S. Venkatraman, A. Abraham, M. Paprzycki, "Significance of
Steganography on Data Security", International Conference on
Information Technology: Coding and Computing (ITCC'04), Las Vegas,
5-7 April 2004.
[5] N.F. Johnson, S. Jajodia, "Exploring Steganography: Seeing the
Unseen", IEEE computer, Vol. 31, No. 2, pages 26-34, February 1998.
[6] K. Bailey, K. Curran, "An Evaluation of Image Based Steganography
Methods", Multimedia Tools & Applications, Vol. 30, No. 1, pages 55-
88, July 2006.
[7] Artz, "Digital Steganography: Hiding Data within Data", Los Alamos
NationalLaboratory,
http://www.cc.gatech.edu/classes/AY2003/cs6262_fall/digital_steg
nography.pdf, May 2001.
[8] Silman, J., Steganography and Steganalysis: An Overview, SANS
Institute 2001.
[9] (Zollner98) Zollner J., H. Federrath, H. Klimant, A. Pfitzmann, R.
Piotraschke, A. Westfeld, G. Wicke, G. Wolf, Modelling the Security of
Steganographic Systems, Information Hiding, 2nd International
Workshop, IH'98 Portland, Oregon, USA, Computer Science 1525. pp.
344-354, April 1998.
[10] S. Lyu and H. Farid, steganalysis using higher-order image statistics,
IEEE Transactions on Information Forensics and Security, 1(1)(2006)
111-119.
[11] D. Kahn, The Codebreakers: The comprehensive history of secret
communication from ancient times to the Internet, Scribner, December 5,
1996. C. Hosmer, Discovering hidden evidence, Journal of Digital
Forensic Practice, (1)(2006)47-56.
[12] J.C. Hernandez-Castro, I. Blasco-Lopez and J.M. Estevez-Tapiador,
Steganography in games: A general methodology and its application to
the game of Go, Computers and Security, Elsevier Science, 25(2006) 64-
71.
[13] P. Hayati, V. Potdar, E. Chang, A survey of steganographic and
steganalytic tools for the digital forensic investigator,available from:
http://debii.curtin.edu.au/~pedram/images/docs/survey_of_steganograph
y_and_steganalytic_tools.pdf
[14] W. Bender, W. Butera, D. Gruhl, R. Hwang, F.J. Paiz and S. Pogreb,
Applications for data hiding, IBM Systems Journal, 39 (3&4)(2000)
547-568.
[15] F.A.P. Petitcolas, "Introduction to information hiding", in: S.
Katzenbeisser and F.A.P. Petitcolas, (ed.) (2000) Information hiding
techniques for steganography and digital watermarking, Norwood:
Artech House, INC.
[16] N. F. Johnson and S. Katzenbeisser, "A survey of steganographic
techniques," in Proc. Information Hiding, Norwood, MA, 2000, pp. 43-
78.
[17] J.-L. Dugelay and S. Roche, "A survey of current watermarking
techniques," in Information Hiding Techniques for Steganography and
Digital Watermarking, S. Katzenbeisser and F. A. P. Petitcolas, Eds.
Norwood, MA: Artech House, 1999, ch. 6
[18] A.Westfeld and A. Pfitzmann, "Attacks on steganographic systems," in
Proc. 3rd Information Hiding Workshop, Dresden, Germany, 1999, pp.
61-76.
[19] N. Provos and P. Honeyman, Detecting steganographic content on the
Internet, Center for Information Technology Integration, University of
Michigan, technical report, August 31, 2001.
[20] M. Kharrazi, H.T. Sencar and N. Memon, Performance study of common
image steganography and steganalysis techniques, Journal of Electrical
Imaging, 15(4)(2006)1-16.
[21] J. Fridrich, Application of data hiding in digital images, Tutorial for the
ISSPA-99, Brisbane, Australia, August 22-25 1999.
[22] S.C. Katzenbeisser, Principles of steganography, in: S. Katzenbeisser
and F.A.P Petitcolas, (ed.), Information hiding techniques for
steganography and digital watermarking, Norwood: Artech House,
INC,2000.
[23] P. Kruus, C. Scace, M. Heyman and M. Mundy, A survey of
steganographic techniques for image files, Advanced Security Research
Journal, V (I) (2003)41-51.