Advertisement

Image Steganography Using Random Image

  • S. KiranEmail author
  • R. Pradeep Kumar Reddy
  • N. Subramanyan
Conference paper
Part of the Learning and Analytics in Intelligent Systems book series (LAIS, volume 3)

Abstract

Now-a-days every person depends on computer and Internet. Security is one of the major problem in public communication systems, the information may be accessed by third parties during the transmission of data through a network. Network security is not sufficient, and cybercrime is also increasing. It is possible to provide more security to data with the combination of cryptography and steganography. Cryptography is basically secret writing and steganography is the method hiding data in an object. Cryptography and steganography both methods can be used for preventing, and protecting data from different types of attacks. In the existing system data bits are encrypted and then embedded into cover image using, it results degradation of cover image. The degradation and security of hidden data are the drawbacks. To overcome these drawbacks, a new technique is proposed using random image. Initially text is converted to an image, and it is embedded into a random cover image. The proposed method may provide more security with the help of random image. It is not easy to perform the steg analysis on random image. Performance measures such as MSE, PSNR are showing good results when compared with the existing method.

Keywords

Cryptography Network Random image Steganography Steg analysis 

References

  1. 1.
    Stallings W (2005) Cryptography and network security: principles and practices, 4th edn, p 592, NovemberGoogle Scholar
  2. 2.
    Gonzalez RC (2009) Digital image processing, 3rd edn, Pearson Education India, p 954Google Scholar
  3. 3.
    Kiran S, Pradeep Kumar Reddy R, Subramanyan N, Naga Sravanthi D (2017) A novel high capacity data embedding image steganography using spiral scan, 4(12), DecemberGoogle Scholar
  4. 4.
    Joseph P, Vishnu Kumar S (2015) A study on stenographic techniques. In: Proceedings of IEEE global conference on communication technologies (GCCT), pp 206–210Google Scholar
  5. 5.
    Samidha D, Agrawa D (2013) Random image steganography in spatial domain. In: IEEE international conferences on emerging trends in VLSI, embedded system, nano electronics and telecommunications system (ICEVENT), pp 1–3Google Scholar
  6. 6.
    Singh A, Singh H (2015) An improved LSB based image steganography techniques for RGB color images. In: IEEE international conferences on electrical computer and communication technologies, pp 1–4Google Scholar
  7. 7.
    Suri S, Joshi H, Minocha V, Tyagi A (2014) Comparative analysis of steganography for colored images. Int J Comput Sci Eng (IJCSE) 2(4):180–184Google Scholar
  8. 8.
    Kumar V, Kumar A, Bhardwaj A (2012) Performance evaluation of image compression techniques. In: 2012 international conference on devices, circuits and systems (ICDCS)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • S. Kiran
    • 1
    Email author
  • R. Pradeep Kumar Reddy
    • 1
  • N. Subramanyan
    • 1
  1. 1.Department of CSEY.S.R. Engineering College of YVUProddaturIndia

Personalised recommendations