Academic
Publications
Grey level modification steganography for secret communication

Grey level modification steganography for secret communication,10.1109/INDIN.2004.1417333,V. M. Potdar,E. Chang

Grey level modification steganography for secret communication   (Citations: 12)
BibTex | RIS | RefWorks Download
Security, privacy, anti-virus, trusted computing, intrusion detection and information protection are major concerns in today's industrial informatics. They are regarded as critical components for industrial based IT solutions (Zincheng, N et al.,2003). Most industrial software systems rely on the third party vendors to provide the safeguards. This approach in turn brings up a major issue regarding the trust of the third parties. We often see that in one industrial system, there may be several other parties' trustees in order to provide all the security needs, in this paper, we describe an approach that can provide security and information protection through steganography, without a need for third party trustees. We present a steganographic algorithm, which is an information hiding technique which allows secret communication, to cover and recover hidden information within the spatial domain of the image. It has low computational complexity and high information hiding capacity. The principle behind the algorithm is to embed information by modifying the grey level values of the grey scale image pixels. We demonstrate this method by giving examples as proof of the concepts
Cumulative Annual
View Publication
The following links allow you to view full publications. These links are maintained by other sources not affiliated with Microsoft Academic Search.
    • ...A common grayscale image has also various modifiable redundant regions [11-14]...
    • ...Conventional methods for embedding watermarks in grayscale images are based on the tacit assumption that the image data is comprised of continuous-tone pixels and that there are many gray levels (200 or more), like a photograph of a typical landscape [3, 11-14]...

    Takaaki Yamadaet al. Maintaining image quality when watermarking grayscale comic images for...

    • ...Several methods [1-5] have been proposed for image based steganography both in gray sale as well as in the color image domain and still, a lot of scope exists for future work...

    Kirti Upretiet al. Variable Bits Secure System for Color Images

    • ...In image steganography [3-5], the information is hidden exclusively in an image which is called the cover image...

    Ahmed A. Abdelwahabet al. A discrete wavelet transform based technique for image data hiding

    • ...Vidyasagar M. Potdor and Elizabeth Chang [15], presented a steganographic algorithm in which the information or the message to be hidden is embedded into the carrier by modifying the grey n level values of the grey scale image pixels...

    K Suresh Babuet al. Authentication of secret information in image Steganography

    • ...Mapping method: Inthis method thepixels ofthecover imageisaltered basedon somemathematical function selected atthetransmitter whichhastobeknownbythe receiver toretrieve thehidden dataintheimagepixels [1]...
    • ...[4]Proposed pixel selection method andSpherical Coding structure method using Shared Colour Palette (SCP)toincrease thepayload capacity between 1.5 and2.4bpp.Thedisadvantage ispoorperceptibility for PSNRof40db...
    • ...number ofbits embeded inacover image bpp= total number ofpixels inacover image (1)...
    • ...(iv) Coding Structure: Measure theminimumnumberof levels L thattouches theboundary ofeachblockandthe number ofbits h,1 tobehidden inthecentroid CQiscalculated fromequation 5...
    • ...Assumptions. 1.Coverandpayload images areTIFF,JPEG,BMP formats...
    • ...Table 1:Experimental data ofCapacity, PSNRbefore andafter error control (EC)fordifferent centroids andcover images...

    K. B. Rajaet al. Secure Steganography using Colour Palette Decomposition

Sort by: