Color Image Restoration for an Effective Steganography

D.P. Gaikwad*, S.J. Wagh **
* Department of Computer Engineering, AISSM'S College of Enginering, Pune.
** Department of Computer Engineering, MAE College of Engineering, Pune.
Periodicity:January - March'2010
DOI : https://doi.org/10.26634/jse.4.3.1119

Abstract

The word steganography comes from the Greek Steganos, which mean covered or secret and graphy mean writing or drawing. There are many techniques in steganography such as least significant bit insertion (LSB), masking and filtering, and transformation techniques. The LSB technique is common, which randomly select the pixels of the cover-object that is used to hide the secret message. It is possible to combine the techniques by encrypting message using cryptography and then hides the encrypted message using steganography. The resulting stego-image can be transmitted without revealing that secret information is being exchanged. Furthermore, even if an attacker were to defeat the steganographic technique and detect the message from the stego-object, he would still require the cryptographic decoding key to decipher the encrypted message. In this paper we proposed the image restoration technique in Stenography. In this paper we blur image before hiding the message image using special Point Spread Function and randomly generated key. We have used two input key values as parameters of PSP. At the time of blurring the image, the different new third key value is generated for different message images. These keys are used at the time of the deblurring of  the message image which are kept secrete. For recovering the real message image we need to get image from stego image and then restore it. It is very difficult to restore message image without knowing PSF and third key value. We found, this technique is less time consuming, simple and robust.

Keywords

Image Restoration, Cover Image, Stago Image, LSB, PSF, ME, MAP, key3.

How to Cite this Article?

D.P. Gaikwad and S.J. Wagh (2010). Color Image Restoration for an Effective Steganography.i-manager’s Journal on Software Engineering, 4(3),65-71. https://doi.org/10.26634/jse.4.3.1119

References

[1]. Anderson, R.J., Kuhn, M.G., Peticolas, F.A.P. (1999). “Information Hiding – A Survey”, in Proceeding of IEEE, pp. 1062-1078, July.
[2]. Arezoo Yadollahpour and Hossein Miar Naimi, Attack on LSB Steganography in Color and Grayscale Images Using Autocorrelation Coefficients.
[3]. Artz, D. (2001). “Digital Steganography: Hiding Data within Data”, IEEE Internet Computing, pp. 75-80, May-Jun.
[4]. Cachin, C. (1998). “An Information-Theoretic Model for Steganography”, in Proceeding 2nd Information Hiding Workshop, Vol. 1525, pp. 306-318.
[5]. Frieden, B.R. (1972)."Restoring with maximum likelihood and maximum entropy", Journal on Opt. Soc. Am, Vol. 62, pp. 511-518
[6]. Honeyman, P., and Provos, N. (2001). “Detecting Steganography Content on the Internet”. CITI Technical Report 01-11.
[7]. KaK, A.C., and Rosenfeld, A. (1982). Digital Picture Processing, 2nd Edition, Academic Press, New York.
[8]. Popa, R. (1998). ”An Analysis of Steganographic System”, The "Politehnica" University of Timisoara, Faculty of Automatics and Computers, Department of Computer Science and Software Engineering, May 25.
[9]. Provos, N. (2001). “Probabilistic Methods for Improving Information Hiding”, CITI Technical Report 01-1, January 31.
[10]. Sugimura, T., Tanako, S., & Tanaka, K. (2000). “Data Hiding via Steganographic Image Transformation”, IEICE Trans. Fundamentals, Vol. E83-A, pp. 311-319, February.
[11]. Yen-Wei Chen, Zensho Nakao, and Makoto Iguchi, Image Restoration by a Constrained Genetic Algorithm.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.