A Method for Public Key Method of Steganography

作者: Samir Kumar Bandyopadhyay , Sarthak Parui

DOI: 10.5120/1063-1389

关键词:

摘要: ABSTRACT Security of the digital information is becoming primary concern prior to transmitting itself via some media. Information security means protecting and systems from unauthorized access, use, disclosure, disruption, modification or destruction. In this paper, a public key method Steganography proposed under standard cryptographic assumptions. The byte location in LSB which secret bit be embedded found out by receiver apply private reconstruct message following RSA General Terms time hiding based on particular Steganography, Security. Keywords Communication, Security, 1. INTRODUCTION technology that hides within an object, text, picture. It often confused with cryptography, not name but appearance usage. easiest way differentiate two remember steganography conceals only contents also mere existence message. original steganographic applications used “null ciphers” clear text. A null cipher conveys has been encrypted any way, whether it using basic character shifting, substitution advanced modern day encryption algorithm. So, plain view for reason can either detected as being present cannot seen once detected. As common its roots military government ingenuity complexity. science carrier file [1]. general into media like image audio thus transmitted so prevent opponent guessing transmitted. main objective let guess kind apart spatial domain Image file, we, general, invert Least Significant Bit embed Secret [2,3,4]. This known (Least Bit) masking Steganography. algorithm, encrypt find exact Byte embedded. For we employ algorithm generate cipher. Red Green Blue value pixel represented then inverted if one. Likewise, entire thereby send called stego intended recipient. Upon receiving, recipient XOR operation LSBs. Then applying Decryption LSB, get position file. Thus, scatters at -private combination.

参考文章(6)
Yusuk Lim, Changsheng Xu, David Dagan Feng, Web based image authentication using invisible Fragile watermark VIP '01 Proceedings of the Pan-Sydney area workshop on Visual information processing - Volume 11. pp. 31- 34 ,(2001)
Min Wu, Bede Liu, Data hiding in binary image for authentication and annotation IEEE Transactions on Multimedia. ,vol. 6, pp. 528- 538 ,(2004) , 10.1109/TMM.2004.830814
Samir K Bandyopadhyay, Debnath Bhattacharyya, Debashis Ganguly, Swarnendu Mukherjee, Poulami Das, None, A Secure Scheme for Image Transformation software engineering, artificial intelligence, networking and parallel/distributed computing. pp. 490- 493 ,(2008) , 10.1109/SNPD.2008.38
Nameer N. EL-Emam, Hiding a Large Amount of Data with High Security Using Steganography Algorithm Journal of Computer Science. ,vol. 3, pp. 223- 232 ,(2007) , 10.3844/JCSSP.2007.223.232
Ahmad T. Al-Taani, Fadhil J. Kadhim, Rehab H. Alwan, Data Embedding Based on Better Use of Bits in Image Pixels World Academy of Science, Engineering and Technology, International Journal of Computer, Electrical, Automation, Control and Information Engineering. ,vol. 2, pp. 2785- 2788 ,(2008)