Abstract
Recent developments in computer security have shown that steganography rather than cryptography is the better method of securing data. A commonly used technique in steganography is the least significant bits (LSB) method, which is, however, vulnerable to attacks due to its simplicity. Nonetheless, it would be difficult or impractical to discern encrypted data if a stego key is added. In this chapter, we show how a carrier image is used to hide another image and present a modified approach for embedding a stego key within it. A 24-bit color carrier image is used to hide the secret image and the same is further used to hide the stego key. We compare the peak signal-to-noise ratio (PSNR) and mean squared error (MSE) and conduct a histogram analysis to determine to what level the stego image is blurred in the carrier image.
Language | English |
---|---|
Title of host publication | Studies in Computational Intelligence |
Publisher | Springer Verlag |
Pages | 539-546 |
Number of pages | 8 |
DOIs | |
Publication status | Published - 01-01-2019 |
Publication series
Name | Studies in Computational Intelligence |
---|---|
Volume | 771 |
ISSN (Print) | 1860-949X |
Fingerprint
All Science Journal Classification (ASJC) codes
- Artificial Intelligence
Cite this
}
A secured steganography algorithm for hiding an image in an image. / Kini, N. Gopalakrishna; Kini, Vishwas G.; Gautam.
Studies in Computational Intelligence. Springer Verlag, 2019. p. 539-546 (Studies in Computational Intelligence; Vol. 771).Research output: Chapter in Book/Report/Conference proceeding › Chapter
TY - CHAP
T1 - A secured steganography algorithm for hiding an image in an image
AU - Kini, N. Gopalakrishna
AU - Kini, Vishwas G.
AU - Gautam,
PY - 2019/1/1
Y1 - 2019/1/1
N2 - Recent developments in computer security have shown that steganography rather than cryptography is the better method of securing data. A commonly used technique in steganography is the least significant bits (LSB) method, which is, however, vulnerable to attacks due to its simplicity. Nonetheless, it would be difficult or impractical to discern encrypted data if a stego key is added. In this chapter, we show how a carrier image is used to hide another image and present a modified approach for embedding a stego key within it. A 24-bit color carrier image is used to hide the secret image and the same is further used to hide the stego key. We compare the peak signal-to-noise ratio (PSNR) and mean squared error (MSE) and conduct a histogram analysis to determine to what level the stego image is blurred in the carrier image.
AB - Recent developments in computer security have shown that steganography rather than cryptography is the better method of securing data. A commonly used technique in steganography is the least significant bits (LSB) method, which is, however, vulnerable to attacks due to its simplicity. Nonetheless, it would be difficult or impractical to discern encrypted data if a stego key is added. In this chapter, we show how a carrier image is used to hide another image and present a modified approach for embedding a stego key within it. A 24-bit color carrier image is used to hide the secret image and the same is further used to hide the stego key. We compare the peak signal-to-noise ratio (PSNR) and mean squared error (MSE) and conduct a histogram analysis to determine to what level the stego image is blurred in the carrier image.
UR - http://www.scopus.com/inward/record.url?scp=85053475400&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85053475400&partnerID=8YFLogxK
U2 - 10.1007/978-981-10-8797-4_54
DO - 10.1007/978-981-10-8797-4_54
M3 - Chapter
T3 - Studies in Computational Intelligence
SP - 539
EP - 546
BT - Studies in Computational Intelligence
PB - Springer Verlag
ER -