Downloads provided by UsageCounts
{"references": ["Ahmad T. Al-Taani. and Abdullah M. AL-Issa. A novel steganographic\nmethod for gray-level images. International Journal of Computer,\nInformation, and Systems Science, and Engineering, 3, 2009.", "RJ Anderson. Stretching the limits of steganography. Information\nHiding, Springer Lecture Notes in Computer Science, 1174:39-48, 1996.", "Ross J. Anderson. and Fabien A.P.Petitcolas. On the limits of steganography.\nIEEE Journal on Selected Areas in Communications (J-SAC),\nSpecial Issue on Copyright and Privacy Protection, 16:474-481, 1998.", "Souvik Bhattacharyya. and Gautam Sanyal. Study of secure steganography\nmodel. In Proceedings of International Conference on AdvancedComputing\nand Communication Technologies (ICACCT-2008),\nPanipath,India, 2008.", "Souvik Bhattacharyya. and Gautam Sanyal. An image based steganography\nmodel for promoting global cyber security. In Proceedings of\nInternational Conference on Systemics, Cybernetics and Informatics,\nHyderabad,India, 2009.", "Souvik Bhattacharyya. and Gautam Sanyal. Implementation and design\nof an image based steganographic model. In Proceedings of IEEE\nInternational Advance Computing Conference, Patiala ,India, 2009.", "Souvik Bhattacharyya. and Gautam Sanyal. Hiding data in images\nusing pixel mapping method (pmm). In Proceedings of 9th annual\nConference on Security and Management (SAM) under The 2010 World\nCongress in Computer Science,Computer Engineering, and Applied\nComputing(WorldComp 2010), LasVegas,USA, July 12-15,2010.", "J.Y. Hsiao. C.C. Chang. and C.-S. Chan. Finding optimal leastsignificant-\nbit substitution in image hiding by dynamic programming\nstrategy. Pattern Recognition, 36:1583-1595, 2003.", "C.K. Chan. and L. M.Cheng. Hiding data in images by simple lsb\nsubstitution. Pattern Recognition, 37:469-474, 2004.\n[10] Scott. Craver. On public-key steganography in the presence of an active\nwarden. In Proceedings of 2nd International Workshop on Information\nHiding., pages 355-368, Portland,Oregon, USA, 1998.\n[11] Potdar V.and Chang E. Gray level modification steganography for\nsecret communication. In IEEE International Conference on Industria\nlInformatics., pages 355-368, Berlin, Germany, 2004.\n[12] Nameer N. EL-Emam. Hiding a large amount of data with high security\nusing steganography algorithm. Journal of Computer Science, 3:223-\n232.\n[13] K.R. Venugopal K.B. Raja, C.R. Chowdary and L.M. Patnaik. A secure\nimage steganography using lsb, dct and compression techniques on raw\nimages. In ICISIP 2005 Third International Conference on Intelligent\nSensing and Information Processing, pages 170- 176.\n[14] P Huang. K.C. Chang., C.P Chang. and T.M Tu. A novel image\nsteganography method using tri-way pixel value differencing. Journal\nof Multimedia, 3, 2008.\n[15] Y. K. Lee. and L. H.Chen. High capacity image steganographic model.\nIEE Proc.-Vision, Image and Signal Processing, 147:288-294, 2000.\n[16] N.F.Johnson. and S. Jajodia. Steganography: seeing the unseen. IEEE\nComputer, 16:26-34, 1998.\n[17] C.F. Lin. R.Z. Wang. and J.C. Lin. Image hiding by optimal lsb\nsubstitution and genetic algorithm. Pattern Recognition, 34:671-683,\n2001.\n[18] J. Shi and J. Malik. Normalized cuts and image segmentation. IEEE\nTrans. PAMI, 22:888-905.\n[19] J. Shi and J. Malik. Normalized cuts and image segmentation. In Int.\nConf. Computer Vision and Pattern Recognition, San Juan, Puerto Rico,\n1997.\n[20] Gustavus J. Simmons. The prisoners- problem and the subliminal\nchannel. Proceedings of CRYPTO., 83:51-67, 1984.\n[21] JHP Eloff. T Mrkel. and MS Olivier. An overview of image steganography.\nIn Proceedings of the fifth annual Information Security South\nAfrica Conference., 2005.\n[22] D.C. Wu. and W.H. Tsai. A steganographic method for images by pixelvalue\ndifferencing. Pattern Recognition Letters, 24:1613-1626, 2003.\n[23] Y.K.Lee. and L.H.Chen. High capacity image steganographic model. In\nIEEprocedings online no. 20000341, 2000."]}
Recent years have witnessed the rapid development of the Internet and telecommunication techniques. Information security is becoming more and more important. Applications such as covert communication, copyright protection, etc, stimulate the research of information hiding techniques. Traditionally, encryption is used to realize the communication security. However, important information is not protected once decoded. Steganography is the art and science of communicating in a way which hides the existence of the communication. Important information is firstly hidden in a host data, such as digital image, video or audio, etc, and then transmitted secretly to the receiver.In this paper a data hiding model with high security features combining both cryptography using finite state sequential machine and image based steganography technique for communicating information more securely between two locations is proposed. The authors incorporated the idea of secret key for authentication at both ends in order to achieve high level of security. Before the embedding operation the secret information has been encrypted with the help of finite-state sequential machine and segmented in different parts. The cover image is also segmented in different objects through normalized cut.Each part of the encoded secret information has been embedded with the help of a novel image steganographic method (PMM) on different cuts of the cover image to form different stego objects. Finally stego image is formed by combining different stego objects and transmit to the receiver side. At the receiving end different opposite processes should run to get the back the original secret message.
Melaymachine, Finite state sequential machine, Pixel Mapping Method (PMM), NCUT., Stego Image, Cover Image
Melaymachine, Finite state sequential machine, Pixel Mapping Method (PMM), NCUT., Stego Image, Cover Image
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 0 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
| views | 2 | |
| downloads | 2 |

Views provided by UsageCounts
Downloads provided by UsageCounts