• DocumentCode
    618445
  • Title

    Standard deviation converges for random image steganography

  • Author

    Amirtharajan, Rengarajan ; Archana, P. ; Rajesh, V. ; Devipriya, G. ; Rayappan, J.B.B.

  • fYear
    2013
  • fDate
    11-12 April 2013
  • Firstpage
    1064
  • Lastpage
    1069
  • Abstract
    The advent of the internet age has led to the increase of prominent network security issues. Information encryption has long been a method used for information security. With the rapid development of parallel computing capacities of computer hardware, this method alone could not be trusted to ensure security by increasing the key sizes, thus bringing in the information hiding techniques into the scenario. Cryptography scrambles the data to be secured while information hiding embeds the information into files which do not reveal the presence of information. Steganography and water marking are two information hiding techniques. While steganography is used for secretly embedding the sensitive information in files, watermarking is used to implement copyright protection. Steganographic techniques are being widely used these days to increase the security of information. A combination of cryptography and steganography results in very strong cryptosystems. This is a paper of unexampled prosperity, which elicits easy-to-implement, difficult-to-sense proficiency for image steganography enforcing the statistical distribution´s profound laws. Bit length for embedding is adjudicated via some delineated conditions and is done so by making use of Least Significant Bit . These conditions are the index for increasing complexity as well as security. Experimental ensues in terms of BPP, embedding capacity, and stego outputs also vindicate this paper. This paper prognosticates the crucial imputes of steganography.
  • Keywords
    Internet; copyright; cryptography; image watermarking; parallel processing; statistical distributions; steganography; Internet; computer hardware; cryptography; image watermarking; information encryption; information hiding techniques; information security; least significant bit; network security; parallel computing; random image steganography; sensitive information; standard deviation; statistical distribution; steganographic techniques; Communications technology; Conferences; Cryptography; Histograms; Image edge detection; Standards; Data hiding; Information hiding; Modified LSB; Random Image Steganography (RIS);
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Information & Communication Technologies (ICT), 2013 IEEE Conference on
  • Conference_Location
    JeJu Island
  • Print_ISBN
    978-1-4673-5759-3
  • Type

    conf

  • DOI
    10.1109/CICT.2013.6558256
  • Filename
    6558256