Data Hiding Method Based on Inter-Block Difference in Eight Queens Solutions and LSB Substitution

2014 ◽  
Vol 8 (2) ◽  
pp. 55-68 ◽  
Author(s):  
Vinay Kumar ◽  
Abhishek Bansal ◽  
Sunil Kumar Muttoo

Data hiding is an emerging field of research for secure data transmission over internet, ensuring ownership identification and copyright protection. A couple of techniques have been proposed based on pixel value differencing (PVD) and eight queens' solutions. In this paper, a new data hiding method based on inter-block difference in eight queen's solutions is presented. The result of inter-block difference is XORED with ASCII code of character from the message and the resultant value is embedded in LSB position. The presented approach is more efficient and it provides a more capacity with good imperceptibility. The approach supports different digital image file formats such as bmp, png and tiff.

2016 ◽  
Vol 47 (8) ◽  
pp. 617-628 ◽  
Author(s):  
Masoumeh Khodaei ◽  
Bahram Sadeghi Bigham ◽  
Karim Faez

Author(s):  
Agung Lestari ◽  
Abdul Sani Sembiring ◽  
Taronisokhi Zebua

Optimization of data security techniques is very necessary so that the data or information that is secured is really safe from attack. Data that has been encrypted based on cryptographic techniques very quickly raises suspicion that the data is confidential or important. Therefore, this technique is better combined with steganography techniques. Utilization of steganography techniques can minimize the attacker's suspicion of data that is secured, because by using steganography data techniques can be hidden on certain objects. This study discusses how to encode a text based on the Merkle-Hellman Knapsack algorithm and the resulting password is hidden in a grayscale digital image as a hiding object based on the pixel value differencing algorithm. This is done to minimize suspicion and make it difficult for attackers to find out confidential or important data.Keywords: cryptography,steganography, merkle-hellmankanpsack, PVD, image


2011 ◽  
Vol 84 (4) ◽  
pp. 669-678 ◽  
Author(s):  
Cheng-Hsing Yang ◽  
Chi-Yao Weng ◽  
Hao-Kuan Tso ◽  
Shiuh-Jeng Wang

2012 ◽  
Vol 6 (4) ◽  
pp. 55-70 ◽  
Author(s):  
Sunil Kumar Muttoo ◽  
Vinay Kumar ◽  
Abhishek Bansal

The 8-queens problem of placing 8 non-attacking queens on an 8x8 chessboard is used to hide message in an image. The method helps in randomizing the bit selection in a cover image for hiding purpose. Cover image is divided into blocks of 8x1 bytes and then masked with solutions of the 8-queens problem. Bits from the block are collected corresponding to the 8-queen solution to make a 7 bit string. LSB of the block is not considered. It gives a number in the range of 0 to 127. If a bit string, corresponding to the 8-queens solutions, matches with ASCII code of the first character from message, the corresponding solution number of the 8-queens problem is encrypted using RC4, and the cipher is stored in first block of the cover. This encrypted value works as key. The solution number corresponding to next character is XORED with the key and the resultant value is embedded in the LSB of next block. The algorithm has been tested with cover of different image file formats like BMP, PNG and TIFF. The algorithm provides very good capacity, imperceptibility and robustness.


2015 ◽  
Vol 8 (4) ◽  
pp. 32
Author(s):  
Sabarish Sridhar

Steganography, water marking and encryption are widely used in image processing and communication. A general practice is to use them independently or in combination of two - for e.g. data hiding with encryption or steganography alone. This paper aims to combine the features of watermarking, image encryption as well as image steganography to provide reliable and secure data transmission .The basics of data hiding and encryption are explained. The first step involves inserting the required watermark on the image at the optimum bit plane. The second step is to use an RSA hash to actually encrypt the image. The final step involves obtaining a cover image and hiding the encrypted image within this cover image. A set of metrics will be used for evaluation of the effectiveness of the digital water marking. The list includes Mean Squared Error, Peak Signal to Noise Ratio and Feature Similarity.


Sign in / Sign up

Export Citation Format

Share Document