Curve Approach to hide Image based Information in a Digital Cover

Ruchi Kawatra*, Vinay Kumar**, Sushila Madan***
* Assistant Professor, Department of IT, Institute of Information Technology & Management (IITM), Janakipur, India.
** Dean, Vivekananda Institute of Professional Studies (affiliated to GGSIPU), Delhi, India.
*** Sushila Madan, Associate Professor, Department of Computer Science, Lady Shri Ram College, Delhi University, India.
Periodicity:September - November'2016
DOI : https://doi.org/10.26634/jit.5.4.10335

Abstract

Information or data is a very important resource. It becomes very essential to secure it. The communication channel through which we transmit our data does not provide data security and privacy. Hiding message using information hiding techniques play a vital role. Steganography is one of the methods of secret communication that usually hides the existence of hidden message. It can be defined as the study of invisible communication that usually deals with the ways of hiding the existence of the communicated message. The hidden message may be text, image, audio, and video. In this paper, the authors have selected a JPEG image as cover. A two dimensional elliptic curve is taken as the stego key to find location in the digital image and a secret message is embedded in it. The approach is to hide the message in such a way that no suspicion is raised.

Keywords

Steganography, Information Hiding, Elliptic Curve, Stego Object, Stego Key

How to Cite this Article?

Kawatra. R, Kumar. V and Madan. S (2016). Curve Approach to hide Image based Information in a Digital Cover. i-manager’s Journal on Information Technology, 5(4), 26-32. https://doi.org/10.26634/jit.5.4.10335

References

[1]. Petitcolas, Fabien A.P., and Stefan Katzenbeisser, (2000). Information Hiding Techniques for Steganography and Digital Watermarking. Artech House, Boston, London.
[2]. Richard Pierre, (2003). Steganalysis: Detecting Hidden Information with Computer Forensic Analysis. SANS Institute Infosec Reading Room. Retrieved from https://www.sans.org/reading-room/whitepapers/ stenganography/steganalysis-detecting-hiddeninformation- computer-forensic-analysis-1014
[3]. Silverman Joseph, (2006). An Introduction to Theory of Elliptic Curves. Summer School on Computational Number Theory and Applications to Cryptography, University of Wyoming. Retrieved from www.math.brown. edu/~jhs/ Presentations/Wyoming EllipticCurve.pdf
[4]. Milne J.S., (2006). Elliptic Curves. BookSurge Publishing. Retrieved from www.jmilne.org/math /Books/ectext5.pdf
[5]. Murray, William, (2004). Microsoft Windows Bitmap File Format Summary. Retrieved from http://www.file format.info/format/bmp/egff.htm
[6]. Mutoo, Kumar V., (2012). “Secure data hiding using Eight Queens Solution”. International Journal of Information Security and Privacy (IJISP), Vol. 6, No. 4. Retrieved from http://www.igi-global.com/article/securedata- hiding-using-eight/ 75322
[7]. Mayukh, (2015). Hiding Text in Image File: Image Encryption in Matlab. Retrieved from http://www. instructables.com/id/ Hide-data-in-an-Image-file-using- Matlab/step0/Hide-data-in-an-Image-file-using-Matlab
[8]. Cherma Rajan A., (2007). Hiding Test in an Image. Retrieved from https://in.mathworks.com/matlabcentral /fileexchange/13698-hiding-multiple-text-pages-into-acolor- image/content/html/main.html
[9]. Sakakura Tadakazu, and Hayashi Akira, (2010). “A Simple Detection Scheme of LSB Steganography based on Statistics of Image Difference Signal”. 2010 International Symposium on Information Theory and its Application, IEEE, October 17 – 20, pp 320-325.
[10]. Johnson N.F. and Jajodia S., (1998). “Steganalysis of Images Created using Current Steganography Software”. Lecture Notes in Computer Science, Vol.1525, Springer- Verlag, Berlin, pp. 273289.
[11]. Muttoo S.K., Kumar, V., (2012). “Watermarking Digital Vector Map Using Graph Theoretic Approach”. Annals of GIS, Taylor & Francis. Vol. 18, No. 2, pp. 135-146.
[12]. Kumar, V., and Muttoo S.K., (2011). “A Graph Theoretic Approach to Sustainable Steganography”. MIS Review: An Int. Journal, Vol. 17, No. 1, pp. 19-37.
[13]. Thiyagarajan P., Natarajan V., Aghilia G., Pranna Venkatesan, and Anitha R., (2013). “Pattern based 3D Image Steganography”. 3D Research, Vol. 4, No.1, pp. 1-8.
[14]. Juneja Mamta and Sandhu Parvinder, (2013). “A New Approach for Information Security using and Improved Steganography technique”. Journal of Info. Pro. Systems, Vol. 9, No. 3, pp. 405-424.
[15]. Gupta Richa, and Singhal Anuradha, (2014). “Importance and Techniques of Information hiding: A Review”. 2014, International Journal of Computer Trends and Technology (IJCTT), Vol. 9, No. 5, pp. 260-265.
[16]. Dunbar Bret, (2002). A Detailed look at Steganographic Techniques and their use in an Open- Systems Environment. SANS Institute Infosec Reading Room
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.