A New Approach for Information Security using an Improved Steganography Technique

Mamta Juneja and Parvinder Singh Sandhu
Volume: 9, No: 3, Page: 405 ~ 424, Year: 2013
10.3745/JIPS.2013.9.3.405
Keywords: Adaptive LSB Steganography, AES; Hybrid Feature Detection, Random Pixel Embeddin g, Steganography, Two Component based LSB Steganography
Full Text:

Abstract
This research paper proposes a secured, robust approach of information security using steganography. It presents two component based LSB (Least Significant Bit) steganography methods for embedding secret data in the least significant bits of blue components and partial green components of random pixel locations in the edges of images. An adaptive LSB based steganography is proposed for embedding data based on the data available in MSB’s (Most Significant Bits) of red, green, and blue components of randomly selected pixels across smooth areas. A hybrid feature detection filter is also proposed that performs better to predict edge areas even in noisy conditions. AES (Advanced Encryption Standard) and random pixel embedding is incorporated to provide two-tier security. The experimental results of the proposed approach are better in terms of PSNR and capacity. The comparison analysis of output results with other existing techniques is giving the proposed approach an edge over others. It has been thoroughly tested for various steganalysis attacks like visual analysis, histogram analysis, chi-square, and RS analysis and could sustain all these attacks very well.

Article Statistics
Multiple requests among the same broswer session are counted as one view (or download).
If you mouse over a chart, a box will show the data point's value.


Cite this article
IEEE Style
Mamta Juneja and Parvinder Singh Sandhu, "A New Approach for Information Security using an Improved Steganography Technique," Journal of Information Processing Systems, vol. 9, no. 3, pp. 405~424, 2013. DOI: 10.3745/JIPS.2013.9.3.405.

ACM Style
Mamta Juneja and Parvinder Singh Sandhu, "A New Approach for Information Security using an Improved Steganography Technique," Journal of Information Processing Systems, 9, 3, (2013), 405~424. DOI: 10.3745/JIPS.2013.9.3.405.