首页    期刊浏览 2024年11月24日 星期日
登录注册

文章基本信息

  • 标题:Pixel Indicated Triple Layer: A Way for Random Image Steganography
  • 本地全文:下载
  • 作者:R. Amirtharajan ; R. Subrahmanyam ; Jasti Nithin Teja
  • 期刊名称:Research Journal of Information Technology
  • 印刷版ISSN:1815-7432
  • 电子版ISSN:2151-7959
  • 出版年度:2013
  • 卷号:5
  • 期号:2
  • 页码:87-99
  • DOI:10.3923/rjit.2013.87.99
  • 出版社:Academic Journals Inc., USA
  • 摘要:In this study, a secure mode of steganography is projected in which three main entities are exercised. They are Pseudo random generator, Least Significant Bit (LSB) substitution and Optimal Pixel Adjustment Process (OPAP). A popular cliché “All roads lead to Rome” says that there endure countless ways to attain a target. Likewise, this goes very well with Steganography than any other things. Digital epoch of steganography embraces numerous trials to surmount the universal hitch of concealment and refuge in every form of computer communication. This study reveals one more methodology for the same but with unique characteristics. Here, cyclic pixel indicator technique is used wherein two channels are used as data channels and the remaining channel is used as an indicator channel. Red plane is taken as the indicator channel for the first pixel for the subsequent pixels the indicator channels follows a periodic cycle of R, G, B. barring the indicator channel, the other two channels act as the data channels for the corresponding pixels. The pixel intensity determines the bits to be embedded. i.e., LSB’s of the indicator channel. If the LSB’s of indicator channel say R channel are 00 Embed 1 bit in G and 2 bits in B; in case of 01, embed 2 bits in G and B each. If LSB(R) is 10, 2 are inlayed in G and 3 bits in B. Finally id LSB(R) equals 11 and then 3 bits are ingrained in G and 3 bits in B. A novel 2-key based pseudo random generator is employed which is used to embed data completely in a unique random fashion based on user’s choice. Thus, it introduces obscurity, while composite embedding of secret bits will result in additional intricacy. Therefore, this study is yet another practical cum unassailable means for secret sharing. Justification for this study is provided by the analytical results.
国家哲学社会科学文献中心版权所有