Performance Analysis of Two Level Multiple Image Formats

Prakriti Gautam*, Deepak Sharma**
* PG Scholar, Department of Electronics and Telecommunication Engineering, CSIT, Durg, India.
** Associate Professor, Department of Electronics and Telecommunication Engineering, CSIT, Durg, India.
Periodicity:April - June'2016

Abstract

Steganography is the process of hiding information in a carrier in order to provide the secrecy of text, music, audio and images. It can be defined as the study of imperceptible communication that deals with the ways of concealing the existence of communicating messages. For hiding secret information in various file formats, there exists a large variety of Steganographic techniques where some are more complex than others and all of them have respective strong and weak points. The aim of the paper is to provide the user, a comparative analysis of the first and second level steganography using the MLSB embedding technique in various types of file formats as the cover image like JPEG, BMP, PNG, etc. With the help of results obtained, the best format for both the levels of hiding can be concluded. The secret image used is also taken of all different formats so that a conclusion can be drawn that which type of format is suitable for the cover as well as secret image.

Keywords

Steganography, Various Techniques, MLSB, DCT, JPEG, BMP, PNG, TIFF, GIF, PSNR, MSE.

How to Cite this Article?

Gautam, P., and Sharma, D. (2016). Performance Analysis of Two Level Multiple Image Formats. i-manager's Journal on Image Processing, 3(2), 35-40.

References

[1]. Simmons, G. J., (1984). “The Prisoners' Problem and the Subliminal Channel”. In Advances in Cryptology, Proceedings of CRYPTO '83, Plenum Press, pp. 51-67.
[2]. Chandramouli R, Kharrazi M, and Memon N, (2003). “Image steganography and steganalysis: Concepts and practice”. In Digital Watermarking, pp. 35-49. Springer Berlin Heidelberg.
[3]. Luo, Weiqi, Fangjun Huang, and Jiwu Huang, (2010). “Edge adaptive image steganography based on LSB matching revisited”. Information Forensics and Security, IEEE Transactions, Vol. 5, No. 2, pp. 201-214.
[4]. Cheddad A, Condell J, Curran K, and Mc Kevitt P, (2010). “Digital image steganography: Survey and analysis of current methods”. Signal Processing, Vol. 90, No. 3, pp. 727-52.
[5]. Hung-Min Sun, Chi-Yao Weng, Chin-Feng Lee, and Cheng-Hsing Yang, (2011). “Anti-Forensics with Steganographic Data Embedding in Digital Images”. IEEE Journal on Selected Areas in Communications, Vol. 29, No. 27, pp. 1392-1403.
[6]. V. Lokeswara Reddy, A. Subramanyam, and P. Chenna Reddy, (2011). “Implementation of LSB Steganography and its Evaluation for Various File Formats”. International Journals of Advanced Networking and Applications, Vol. 02, No. 05, pp. 868-872.
[7]. Sun HM, Weng CY, Lee CF, and Yang CH, (2011). “Antiforensics with steganographic data embedding in digital images”. Selected Areas in Communications, IEEE Journal on, 2011, Vol. 29, No. 7, pp. 1392-1403.
[8]. Naghamhamid, Abid Yanhya, R. Badlishah Ahmad, and Osamah M. Al-Qershi, (2012) . “ Image Steganography Techniques : An Overview”. International Journal of Computer Science and Security (IJCSS), Vol. 6, No. 3.
[9]. M. Pavani, S. Naganjaneyulu, and C. Nagaraj, (2013). “A survey on LSB based steganography methods”. International Journal of Engineering and Computer Science, Vol. 2, No. 8, pp. 2464-2467.
[10]. Eltyeb E. Abed Elgabar, and Haysam A. Ali Alamin, (2013). “Comparison of LSB Steganography in GIF and BMP Images”. International Journal of Soft Computing and Engineering (IJSCE), Vol. 3, No. 4.
[11]. Jassim F A, (2013). “A novel steganography algorithm to hide a grayscale BMP image in two grayscale BMP images for dual secrecy”. In Information Assurance nd (NCIA), 2 National Conference on, IEEE, pp. 73-77.
[12]. Jasleen Kour, and Deepankar Verma, (2014). “Steganography techniques – A review paper”. International Journal of Emerging Research in Management & Technology, Vol. 3, No. 5.
[13]. Greg Kipper, (2004). The Book of Investigator's Guide to Steganography, ISBN:0849324335, Auerbach Publications © (240 pages).
[14]. Stefan Katzen, (2000). The Book of Information Hiding Techniques for Steganography & Digital Watermarking. Fabien A. P. Petitcolas.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.