A secured steganography algorithm for hiding an image in an image

N. Gopalakrishna Kini, Vishwas G. Kini, Gautam

Research output: Chapter in Book/Report/Conference proceedingChapter

Abstract

Recent developments in computer security have shown that steganography rather than cryptography is the better method of securing data. A commonly used technique in steganography is the least significant bits (LSB) method, which is, however, vulnerable to attacks due to its simplicity. Nonetheless, it would be difficult or impractical to discern encrypted data if a stego key is added. In this chapter, we show how a carrier image is used to hide another image and present a modified approach for embedding a stego key within it. A 24-bit color carrier image is used to hide the secret image and the same is further used to hide the stego key. We compare the peak signal-to-noise ratio (PSNR) and mean squared error (MSE) and conduct a histogram analysis to determine to what level the stego image is blurred in the carrier image.

LanguageEnglish
Title of host publicationStudies in Computational Intelligence
PublisherSpringer Verlag
Pages539-546
Number of pages8
DOIs
Publication statusPublished - 01-01-2019

Publication series

NameStudies in Computational Intelligence
Volume771
ISSN (Print)1860-949X

Fingerprint

Steganography
Security of data
Cryptography
Signal to noise ratio
Color

All Science Journal Classification (ASJC) codes

  • Artificial Intelligence

Cite this

Kini, N. G., Kini, V. G., & Gautam (2019). A secured steganography algorithm for hiding an image in an image. In Studies in Computational Intelligence (pp. 539-546). (Studies in Computational Intelligence; Vol. 771). Springer Verlag. https://doi.org/10.1007/978-981-10-8797-4_54
Kini, N. Gopalakrishna ; Kini, Vishwas G. ; Gautam. / A secured steganography algorithm for hiding an image in an image. Studies in Computational Intelligence. Springer Verlag, 2019. pp. 539-546 (Studies in Computational Intelligence).
@inbook{abadd7352c8142f99c0c1edbaf29ec42,
title = "A secured steganography algorithm for hiding an image in an image",
abstract = "Recent developments in computer security have shown that steganography rather than cryptography is the better method of securing data. A commonly used technique in steganography is the least significant bits (LSB) method, which is, however, vulnerable to attacks due to its simplicity. Nonetheless, it would be difficult or impractical to discern encrypted data if a stego key is added. In this chapter, we show how a carrier image is used to hide another image and present a modified approach for embedding a stego key within it. A 24-bit color carrier image is used to hide the secret image and the same is further used to hide the stego key. We compare the peak signal-to-noise ratio (PSNR) and mean squared error (MSE) and conduct a histogram analysis to determine to what level the stego image is blurred in the carrier image.",
author = "Kini, {N. Gopalakrishna} and Kini, {Vishwas G.} and Gautam",
year = "2019",
month = "1",
day = "1",
doi = "10.1007/978-981-10-8797-4_54",
language = "English",
series = "Studies in Computational Intelligence",
publisher = "Springer Verlag",
pages = "539--546",
booktitle = "Studies in Computational Intelligence",
address = "Germany",

}

Kini, NG, Kini, VG & Gautam 2019, A secured steganography algorithm for hiding an image in an image. in Studies in Computational Intelligence. Studies in Computational Intelligence, vol. 771, Springer Verlag, pp. 539-546. https://doi.org/10.1007/978-981-10-8797-4_54

A secured steganography algorithm for hiding an image in an image. / Kini, N. Gopalakrishna; Kini, Vishwas G.; Gautam.

Studies in Computational Intelligence. Springer Verlag, 2019. p. 539-546 (Studies in Computational Intelligence; Vol. 771).

Research output: Chapter in Book/Report/Conference proceedingChapter

TY - CHAP

T1 - A secured steganography algorithm for hiding an image in an image

AU - Kini, N. Gopalakrishna

AU - Kini, Vishwas G.

AU - Gautam,

PY - 2019/1/1

Y1 - 2019/1/1

N2 - Recent developments in computer security have shown that steganography rather than cryptography is the better method of securing data. A commonly used technique in steganography is the least significant bits (LSB) method, which is, however, vulnerable to attacks due to its simplicity. Nonetheless, it would be difficult or impractical to discern encrypted data if a stego key is added. In this chapter, we show how a carrier image is used to hide another image and present a modified approach for embedding a stego key within it. A 24-bit color carrier image is used to hide the secret image and the same is further used to hide the stego key. We compare the peak signal-to-noise ratio (PSNR) and mean squared error (MSE) and conduct a histogram analysis to determine to what level the stego image is blurred in the carrier image.

AB - Recent developments in computer security have shown that steganography rather than cryptography is the better method of securing data. A commonly used technique in steganography is the least significant bits (LSB) method, which is, however, vulnerable to attacks due to its simplicity. Nonetheless, it would be difficult or impractical to discern encrypted data if a stego key is added. In this chapter, we show how a carrier image is used to hide another image and present a modified approach for embedding a stego key within it. A 24-bit color carrier image is used to hide the secret image and the same is further used to hide the stego key. We compare the peak signal-to-noise ratio (PSNR) and mean squared error (MSE) and conduct a histogram analysis to determine to what level the stego image is blurred in the carrier image.

UR - http://www.scopus.com/inward/record.url?scp=85053475400&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85053475400&partnerID=8YFLogxK

U2 - 10.1007/978-981-10-8797-4_54

DO - 10.1007/978-981-10-8797-4_54

M3 - Chapter

T3 - Studies in Computational Intelligence

SP - 539

EP - 546

BT - Studies in Computational Intelligence

PB - Springer Verlag

ER -

Kini NG, Kini VG, Gautam. A secured steganography algorithm for hiding an image in an image. In Studies in Computational Intelligence. Springer Verlag. 2019. p. 539-546. (Studies in Computational Intelligence). https://doi.org/10.1007/978-981-10-8797-4_54