Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available

(984.2KB)
This is an Open Access publication published under CSC-OpenAccess Policy.
Publications from CSC-OpenAccess Library are being accessed from over 158 countries worldwide.
On Text Realization Image Steganography
Mohammed Nasser Hussein Al-Turfi
Pages - 1 - 9     |    Revised - 15-01-2012     |    Published - 21-02-2012
Volume - 6   Issue - 1    |    Publication Date - February 2012  Table of Contents
MORE INFORMATION
KEYWORDS
Steganography , Text Stream, Secured Data
ABSTRACT
In this paper the steganography strategy is going to be implemented but in a different way from a different scope since the important data will neither be hidden in an image nor transferred through the communication channel inside an image, but on the contrary, a well known image will be used that exists on both sides of the channel and a text message contains important data will be transmitted. With the suitable operations, we can re-mix and re-make the source image. MATLAB7 is the program where the algorithm implemented on it, where the algorithm shows high ability for achieving the task to different type and size of images. Perfect reconstruction was achieved on the receiving side. But the most interesting is that the algorithm that deals with secured image transmission transmits no images at all
1 CiteSeerX 
2 refSeek 
3 Scribd 
4 SlideShare 
5 PdfSR 
1 Juneja, M. --- Sandhu, P.S., “Designing of robust image steganography technique based on LSB insertion and encryption” International Conference on Advances in Recent Technologies in Communication and Computing Year: 2009 Pages: 302-305 Provider: IEEE Publisher: IEEE DOI: 10.1109/ARTCom.2009.228.
2 Raja, K.B. --- Chowdary, C.R. --- Venugopal, K.R. --- Patnaik, L.M. “A secure image steganography using LSB, DCT and compression technique on raw image” Intelligent Sensing and Information Processing, 2005. ICISIP 2005. Third International Conference on ISBN: 0780395883 Year: 2005 Pages: 171-176 Provider: IEEE Publisher: IEEE.
3 Neeta, D. --- Snehal, K. --- Jacobs, D., “Implementation of LSB steganography and its evaluation for various bits”, 1st International Conference on Digital Information Management ISBN: 142440682X Year: 2007 Pages: 173-178 Provider: IEEE Publisher: IEEE DOI: 10.1109/ICDIM.2007.369349.
4 Hanling Zhang --- Guangzhi Geng --- Caiqiong Xiong ,“Image steganography using pixel – value differencing” , Second International Symposium on Electronic Commerce and Security Year: 2009 Volume: 2 Pages: 109-112 Provider: IEEE Publisher: IEEE DOI: 10.1109/ISECS.2009.139.
5 Nasser Hamad Faculty of Information Technology, Arab American University, Palestine, Hiding Text Information in a Digital Image Based on Entropy Function , The International Arab Journal of Information Technology, Vol. 7, No. 2, April 2010
6 Muhalim Mohamed, Mohamed Amin, Subariah Ibrahim, Mazleen Salleh, Mohd Rozi Katmin. , “Information Hiding Using Steganography”, Department of Computer System & Communication Faculty of Computer Science and Information system University Technology Malaysia, 2003.
7 Sukhpreet Kaur , Department of Computer Science and Engineering Baba Farid College of Engineering and Technology Bathinda-India & Sumeet Kaur, Department of Computer Engineering Yadavindra College of Engineering Punjabi ,University Guru Kashi Campus Talwandi Sabo, A Novel Approach for Hiding Text Using Image Steganography , (IJCSIS) International Journal of Computer Science and Information Security ,Vol. 8, No. 7, Punjab, India October2010.
8 H.B.Kekre, Archana Athawale, and Pallavi N.Halarnkar , Increased Capacity of Information Hiding in LSB’s Method for Text and Image, International Journal of Electrical and Electronics Engineering 2:4:2008
9 K Suresh Babu*, K B Raja*, Kiran Kumar K*, Manjula Devi T H*, Venugopal K R*, L M Patnaik** “Authentication of Secret Information in Image Steganography” , TENCON 2008 - 2008 IEEE Region 10 Conference Year: 2008 Pages: 1-6 Provider: IEEE Publisher: IEEE DOI: 10.1109/TENCON.2008.4766581
10 *Department of Computer Science and Engineering University Visvesvaraya College of Engineering, Bangalore University, Bangalore 560 001
11 ** Microprocessor Applications Laboratory, Indian Institute of Science, Bangalore ksureshbabu uvce@rediff.com
12 K. Pramitha1, Dr. L.Padma Suresh2, K.L.Shunmuganathan3 “ Image Steganography Using MOD-4 Embedding Algorithm Based on Image Contrast” TENCON 2008 - 2008 IEEE Region 10 Conference Year: 2008 Pages: 1-6 Provider: IEEE Publisher: IEEE DOI: 10.1109/TENCON.2008.4766581
13 1 Department of Electrical and Electronics Engineering, P.G. Scholar, NIU, Kumaracoil. E-mail:pramitha2007@gmail.com
14 2 Department of Electrical and Electronics Engineering, HOD, NIU, Kumaracoil. E-mail: suresh_lps@yahoo.co.in
15 3 Department of Computer Science Engineering, Professor, RMK Engineering College. E-mail:kls_nathan@yahoo.com
16 Deshpande Neeta, Kamalapur Snehal Computer Science Dept. K.K.Wagh Institute of Engineering Education & Research, Nashik India , deshpande_neeta@yahoo.com, kamalapur_snehal@yahoo.com Daisy Jacobs School of Information Technology University of Pretoria, Pretoria 002 South Africa daisy.jacobs@up.ac.za, “Implementation of LSB Steganography and Its Evaluation for Various Bits”, : 1st International Conference on Digital Information Management ISBN: 142440682X Year: 2007 Pages: 173-178 Provider: IEEE Publisher: IEEE DOI: 10.1109/ICDIM.2007.369349
17 Hossein Malekmohamadi and Shahrokh Ghaemmaghami Sharif University of Technology, Tehran, Iran h_malekmohamadi@ee.sharif.ir, ghaemmag@sharif.edu “Steganalysis of LSB Based Image Steganography Using Spatial and Frequency Features”, IEEE International Conference on Multimedia and Expo ISSN: 19457871 Year: 2009 Pages: 1744-1747 Provider: IEEE Publisher: IEEE DOI: 10.1109/ICME.2009.5202858
18 Lisa M. Marvel and Charles T. Retter U.S. Army Research Laboratory Aberdeen Proving Ground, MD 21005 marvelQar1. Mil Charles G. Boncelet, Jr University of Delaware Newark, DE 19716 boncelet @ee.udel.edu, “Hiding Information in Images *” Image Processing, 1998. ICIP 98. Proceedings. 1998 International Conference on ISBN: 08186882 Year: 1998 Volume: 2 Pages: 396-398 vol.2 Provider: IEEE Publisher: IEEE Comput. Soc
19 14) Mohammad Shirali-Shahreza, Sajad Shirali- Shahreza. d Shirali- Shahreza”Steganography in TeX Documents”, 3rd International Conference on Intelligent System and Knowledge Engineering Year: 2008 Volume: 1 Pages: 1363- 1366 Provider: IEEE Publisher: IEEE DOI: 10.1109/ISKE.2008.4731144
20 1.Computer Science Department Sharif University of Technology Tehran, IRAN
21 2.Computer Engineering Department Sharif University of Technology Tehran, IRAN shirali@cs.sharif.edu, shirali@ce.sharif.edu
Dr. Mohammed Nasser Hussein Al-Turfi
Department of Computer and Software Engineering - Iraq
mohammed_alturfi@yahoo.com