34
views
0
recommends
+1 Recommend
0 collections
    4
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      A Hash based Approach for Secure Keyless Steganography in Lossless RGB Images

      Preprint
      , , , ,

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          This paper proposes an improved steganography approach for hiding text messages in lossless RGB images. The objective of this work is to increase the security level and to improve the storage capacity with compression techniques. The security level is increased by randomly distributing the text message over the entire image instead of clustering within specific image portions. Storage capacity is increased by utilizing all the color channels for storing information and providing the source text message compression. The degradation of the images can be minimized by changing only one least significant bit per color channel for hiding the message, incurring a very little change in the original image. Using steganography alone with simple LSB has a potential problem that the secret message is easily detectable from the histogram analysis method. To improve the security as well as the image embedding capacity indirectly, a compression based scheme is introduced. Various tests have been done to check the storage capacity and message distribution. These testes show the superiority of the proposed approach with respect to other existing approaches.

          Related collections

          Author and article information

          Journal
          2012-11-23
          2013-04-16
          Article
          1211.5614
          69b9b524-e230-478e-8094-2014acbb8f60

          http://arxiv.org/licenses/nonexclusive-distrib/1.0/

          History
          Custom metadata
          The 22nd International Conference on Computer Graphics and Vision, 2012, pp.80-83
          The paper is withdrawn due to license issue
          cs.CR cs.CV cs.MM

          Computer vision & Pattern recognition,Security & Cryptology,Graphics & Multimedia design

          Comments

          Comment on this article