scispace - formally typeset
Search or ask a question
Book ChapterDOI

An Indirect Addressing Image Steganographic Scheme Using 9 × 9 Sudoku Matrix

TL;DR: The proposed method uses Sudoku puzzle to hide secret message within a cover image and uses RGB value, whereas the most of the methods used grayscale value to transmit the secret message more securely.
Abstract: In recent world, everybody wants to transmit their valuable information securely without the knowledge of the intruder. One of the way-out is steganography. Using steganography, information can be transferred using cover media. Cover media can be image, video, sound, or text. Most popularly used cover media is a digital image because the slight modification of a cover image is difficult to distinguish by human eye. In our paper, the proposed method uses Sudoku puzzle to hide secret message within a cover image. The benefit of using Sudoku is if any intruder modifies the secret message then receiver will be able to detect this. In this proposed method, the length of the secret message is directly proportional to the resolution of the cover image. The proposed method has been developed to transmit the secret message more securely. Here, a single 9 × 9 Sudoku puzzle is used, and this Sudoku puzzle is embedded within the image by modifying the RGB value of pixels. Within each cell of the Sudoku puzzle we indirectly store one character of the secret data; hence, the intruder cannot fetch the secret message directly, to detect if intruder modifies the secret message or not, and associated information is stored which makes the proposed method more reliable than other existing methods. This proposed method is better than the existing methods because it uses RGB value, whereas the most of the methods used grayscale value.
Citations
More filters
Proceedings ArticleDOI
20 Jan 2022
TL;DR: In this research work machine intelligence algorithms are used to track book recommendation task and fetch information easily and the results are outperformance the methodology and compete with current technology.
Abstract: The book recommendation systems provide practical information from datamining platform with the evidence of Valuable sources. The Artificial intelligence (AI) concepts are more useful to track all type of critical tasks to get easy way operation way. In this research work machine intelligence algorithms are used to track book recommendation task and fetch information easily. The performance measures like sensitivity 97.12%, accuracy 98.42% and recall 91.49% had been attained. These experimental results are outperformance the methodology and compete with current technology.

2 citations

References
More filters
Journal ArticleDOI
TL;DR: The result shows that the use of encryption in Steganalysis does not affect the time complexity if Diffie Hellman algorithm is used in stead of RSA algorithm.
Abstract: Steganalysis is the art of detecting the message's existence and blockading the covert communication. Various steganography techniques have been proposed in literature. The Least Significant Bit (LSB) steganography is one such technique in which least significant bit of the image is replaced with data bit. As this method is vulnerable to steganalysis so as to make it more secure we encrypt the raw data before embedding it in the image. Though the encryption process increases the time complexity, but at the same time provides higher security also. This paper uses two popular techniques Rivest, Shamir, Adleman (RSA) algorithm and Diffie Hellman algorithm to encrypt the data. The result shows that the use of encryption in Steganalysis does not affect the time complexity if Diffie Hellman algorithm is used in stead of RSA algorithm.

134 citations

Journal Article
TL;DR: A technique based on the LSB(least significant bit) and a new encryption algorithm that is less chance of an attacker being able to use steganalysis to recover data is discussed.
Abstract: To increase the security of messages sent over the internet steganography is used. This paper discussed a technique based on the LSB(least significant bit) and a new encryption algorithm. By matching data to an image, there is less chance of an attacker being able to use steganalysis to recover data. Before hiding the data in an image the application first encrypts it.

28 citations

Journal Article
TL;DR: Experimental results show that the proposed technique of hiding secret data in image based on LSB insertion and RSA encryption technique has a high security level and produced better stego-image quality.
Abstract: Many researchers are working on information hiding techniques using different ideas and areas to hide their secrete data. This paper introduces a robust technique of hiding secret data in image based on LSB insertion and RSA encryption technique. The key of the proposed technique is to encrypt the secret data. Then the encrypted data will be converted into a bit stream and divided it into number of segments. However, the cover image will also be divided into the same number of segments. Each segment of data will be compared with each segment of image to find the best match segment, in order to create a new random sequence of segments to be inserted then in a cover image. Experimental results show that the proposed technique has a high security level and produced better stego-image quality. Keywords—steganography; LSB Matching; RSA Encryption; data segments

10 citations

Journal ArticleDOI
TL;DR: The proposed method has high hiding capacity, better stego-image quality, requires little calculation and is easy to implement.
Abstract: Steganography is the science of secret message delivery using cover media. The cover carriers can be image, video, sound or text data. A digital image is a flexible medium used to carry a secret message because the slight modification of a cover image is hard to distinguish by human eyes. The proposed method is inspired from Chang method of Secret Reference Matrix. The data is hidden in 8 bit gray scale image using 256 X 256 matrix which is constructed by using 4 x 4 table with unrepeated digits from 0~15. The proposed method has high hiding capacity, better stego-image quality, requires little calculation and is easy to implement.

4 citations