Data Hiding with Digital Authentication in Spatial Domain Image Steganography

Author(s):  
Ayan Chatterjee ◽  
Soumen Kumar Pati
2018 ◽  
Vol 7 (3.6) ◽  
pp. 1 ◽  
Author(s):  
P Srilakshmi ◽  
Ch Himabindu ◽  
N Chaitanya ◽  
S V. Muralidhar ◽  
M V. Sumanth ◽  
...  

This paper proposed novel approach of image steganography for text embedding in spatial domain. In the proposed embedding the message is dumped into the image with reference to a random generated key, based on this key the extraction of text is done from the image. So this method is a highly secured from eavesdropping and highly complex to identify the text data in the image and retrieving the text message from the message is also a resilient process. The extraction is only possible when the key is known. 


The growth rate of the Internet is exceeding that of any previous technology. As the Internet has become the major medium for transferring sensitive information, the security of the transferred message has now become the utmost priority. To ensure the security of the transmitted data, Image steganography has emerged out as an eminent tool of information hiding. The frequency of availability of image file is high and provides high capacity. In this paper, a method of secure data hiding in image is proposed that uses knight tour positions and further 8-queen positions in 8*8 pixel blocks.The cover image is divided into 8*8 pixel blocks and pixels are selected from each block corresponding to the positions of Knight in 8*8 chessboard starting from different pixel positions. 8-pixel values are selected from alternate knight position. Selected pixels values converted to 8-bit ASCII code and result in 8* 8 bit matrix. 8-Queen’s solution on 8*8 chessboard is applied on 8*8 bit matrix. The bits selected from 8-Queens positions and compared with 8-bit ASCII code of message characters. The proposed algorithm changes the LSB of only some of the pixels based on the above comparison. Based on parameters like PSNR and MSE the efficiency of the method is checked after implementation. Then the comparison done with some already proposed techniques. This is how, image steganography showed interesting and promising results when compared with other techniques.


2021 ◽  
Author(s):  
N. Karthikeyan ◽  
K. Kousalya ◽  
N. Krishnamoorthy ◽  
N. Jayapandian

Sign in / Sign up

Export Citation Format

Share Document