scholarly journals Data Hiding Technique using EOF Method and Modular Multiplication Block Cipher Algorithm for Image Steganography

2018 ◽  
Author(s):  
Robbi Rahim

This is pre-print version article for MICOMS

Author(s):  
Robbi Rahim ◽  
Darmawan Napitupulu ◽  
Heri Nurdiyanto ◽  
Usti Fatimah Sari ◽  
Firahmi Rizky ◽  
...  

The growth rate of the Internet is exceeding that of any previous technology. As the Internet has become the major medium for transferring sensitive information, the security of the transferred message has now become the utmost priority. To ensure the security of the transmitted data, Image steganography has emerged out as an eminent tool of information hiding. The frequency of availability of image file is high and provides high capacity. In this paper, a method of secure data hiding in image is proposed that uses knight tour positions and further 8-queen positions in 8*8 pixel blocks.The cover image is divided into 8*8 pixel blocks and pixels are selected from each block corresponding to the positions of Knight in 8*8 chessboard starting from different pixel positions. 8-pixel values are selected from alternate knight position. Selected pixels values converted to 8-bit ASCII code and result in 8* 8 bit matrix. 8-Queen’s solution on 8*8 chessboard is applied on 8*8 bit matrix. The bits selected from 8-Queens positions and compared with 8-bit ASCII code of message characters. The proposed algorithm changes the LSB of only some of the pixels based on the above comparison. Based on parameters like PSNR and MSE the efficiency of the method is checked after implementation. Then the comparison done with some already proposed techniques. This is how, image steganography showed interesting and promising results when compared with other techniques.


2018 ◽  
Vol 197 ◽  
pp. 03011
Author(s):  
Robbi Rahim ◽  
Nuning Kurniasih ◽  
Frisma Handayanna ◽  
Linda Sari Dewi ◽  
Erene Gernaria Sihombing ◽  
...  

The combination of Steganography and cryptography algorithms can improve the security of data you want to keep secret. Pixel Value Differencing (PVD) algorithm combined with Word Auto Key Encryption (WAKE) algorithm and Modular Multiplication Block Cipher algorithm can produce good ciphertext and inserted on image media by using PVD algorithm that convert each ciphertext into pixel.


Sign in / Sign up

Export Citation Format

Share Document