Advances in Computer Science and Information Technology. Networks and Communications. Second International Conference, CCSIT 2012, Bangalore, India, January 2-4, 2012. Proceedings, Part I

Research Article

A New Approach to Stegnography

Download
268 downloads
  • @INPROCEEDINGS{10.1007/978-3-642-27299-8_25,
        author={Soumik Mukherjee and Moumita Deb and Pratik Agarwal and Abhinava Roy},
        title={A New Approach to Stegnography},
        proceedings={Advances in Computer Science and Information Technology. Networks and Communications. Second International Conference, CCSIT 2012, Bangalore, India, January 2-4, 2012. Proceedings, Part I},
        proceedings_a={CCSIT PART I},
        year={2012},
        month={11},
        keywords={Steganalysis Carrier File Stego-Medium Redundant bits Payload Steganographic Algorithm},
        doi={10.1007/978-3-642-27299-8_25}
    }
    
  • Soumik Mukherjee
    Moumita Deb
    Pratik Agarwal
    Abhinava Roy
    Year: 2012
    A New Approach to Stegnography
    CCSIT PART I
    Springer
    DOI: 10.1007/978-3-642-27299-8_25
Soumik Mukherjee1, Moumita Deb1, Pratik Agarwal1, Abhinava Roy1
  • 1: RCC Institute of Information Technology

Abstract

Steganography hides the fact that a message is being sent. It provides security. In this world full of intruders, security of information is the most vital concern. In this paper, we present a Steganography algorithm. Our approach is based on hiding message in an image file by selecting pixels using some mathematical formulation and replacing the last few bits of the pixel. The bit selection is also not obvious; the selection is decided again by some calculation. In our algorithm we try to ensure that there is minimum amount of distortion from the original image. We also use a symmetric key to ensure security of the message. To the best of our knowledge this approach can be used to hide data in an image file with great security and with a very small chance of detection.