Data Hiding Method Based on Inter-Block ... - Semantic Scholar

Report 1 Downloads 100 Views
International Journal of Information Security and Privacy, 8(2), 55-68, April-June 2014 55

Data Hiding Method Based on Inter-Block Difference in Eight Queens Solutions and LSB Substitution Vinay Kumar, Vivekananda Institute of Professional Studies, Guru Gobind Singh Indraprastha University, Delhi, India Abhishek Bansal, Department of Computer Science, Indira Gandhi National Tribal University, Amarkantak, India Sunil Kumar Muttoo, Department of Computer Science, University of Delhi, Delhi, India

ABSTRACT Data hiding is an emerging field of research for secure data transmission over internet, ensuring ownership identification and copyright protection. A couple of techniques have been proposed based on pixel value differencing (PVD) and eight queens’ solutions. In this paper, a new data hiding method based on inter-block difference in eight queen’s solutions is presented. The result of inter-block difference is XORED with ASCII code of character from the message and the resultant value is embedded in LSB position. The presented approach is more efficient and it provides a more capacity with good imperceptibility. The approach supports different digital image file formats such as bmp, png and tiff. Keywords: 8-Queen’s Problem, Information Hiding, Inter Block Difference, Kerchoffs’ principle, Least Significant Bit (LSB) Embedding, Steganography

DOI: 10.4018/IJISP.2014040104 Copyright © 2014, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.

56 International Journal of Information Security and Privacy, 8(2), 55-68, April-June 2014

1. INTRODUCTION Digital data hiding technique, also called digital steganography, is a new kind of secret communication approach. While cryptography scrambles the message so that it cannot be understood, steganography hides the data so that it cannot be observed. The major goal of steganography is to enhance communication security by inserting a secret message into the digital image, modifying the nonessential pixels of the image (Petitcolas, Anderson & Kuhn, 1999; Feng, Lin, Tsai & Chu, 2006). Generally, a steganographic system consists of three approaches: keys generation, message embedding algorithm and message extraction algorithm. The key generation method takes security parameter as input and generates a bit string called a stego key as output. The message embedding algorithm takes security parameter, stego key, cover image and message as input and produces stego image as output. And, the extraction algorithm takes the stego image and stego keys as input and retrieves the secret message. Some techniques of data hiding have been proposed by (Chung, Shen & Chang, 2001; Wang, Lin & Lin, 2000; Wang, Lin & Lin, 2001; Liao, Wen & Zhang, 2011). Most common method is based on modification of least-significant bit (LSB) by directly replacing the LSBs of the cover-image with the corresponding message bits, wherever required. LSB method typically achieves high capacity however it fails to maintain imperceptibility. Wang et al (2000) proposed an algorithm to

embed secret messages in moderately significant bit of the cover-image and further proposed a data hiding scheme (Wang, Lin & Lin, 2001) by the optimal LSB (OLSB) substitution which considers an optimal k rightmost LSB substitution method. Chang & Cheng (2004) proposed data hiding scheme by simple LSB substitution with an optimal pixel adjustment process (OPAP). Mielikainen (2006) proposed a data hiding method that uses a binary function between two cover pixels. The value of the function is used to hide information. We presented a data hiding algorithm (Muttoo, Kumar & Bansal, 2012) which is based on eight queen solutions. The 8-queens problem of placing 8 non-attacking queens on an 8x8 chessboard is used to hide message in an image. The method helps in randomizing bit selection in a cover image while hiding. Chang Tsai & Lin (2005) developed an adaptive technique applied to the LSB method. In this method, correlation between neighbouring pixels is used to estimate the degree of smoothness. Li et al (2009) proposed lossless data hiding approach using difference in values of adjacent pixels. Wu & Tsai (2003) proposed another method based on pixel value differencing and difference in values is classified into range intervals. The selection of range intervals is based on human vision’s sensitivity to gray values varying from smoothness to contrast. Another method using graph theoretic approach is discussed in (Vinay & Muttoo, 2009a). In this paper, we propose a new data hiding approach which is based on interblock difference, solution number of

Copyright © 2014, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.

12 more pages are available in the full version of this document, which may be purchased using the "Add to Cart" button on the product's webpage: www.igi-global.com/article/data-hiding-method-based-oninter-block-difference-in-eight-queens-solutions-and-lsbsubstitution/130655?camid=4v1

This title is available in InfoSci-Journals, InfoSci-Journal Disciplines Computer Science, Security, and Information Technology. Recommend this product to your librarian: www.igi-global.com/e-resources/libraryrecommendation/?id=2

Related Content Sealed-Bid Auction Protocols Kun Peng (2013). Theory and Practice of Cryptography Solutions for Secure Information Systems (pp. 460-498).

www.igi-global.com/chapter/sealed-bid-auction-protocols/76526?camid=4v1a On the Design of an Authentication System Based on Keystroke Dynamics Using a Predefined Input Text Dieter Bartmann, Idir Bakdi and Michael Achatz (2007). International Journal of Information Security and Privacy (pp. 1-12).

www.igi-global.com/article/design-authentication-system-basedkeystroke/2458?camid=4v1a PAKE on the Web Xunhua Wang and Hua Lin (2009). International Journal of Information Security and Privacy (pp. 29-42).

www.igi-global.com/article/pake-web/40359?camid=4v1a

The implementation of the Data Retention Directive: A Comparative analysis Anna Pateraki (2011). Personal Data Privacy and Protection in a Surveillance Era: Technologies and Practices (pp. 317-328).

www.igi-global.com/chapter/implementation-data-retentiondirective/50422?camid=4v1a

Recommend Documents