Reference Hub4
A Covert Communication Model-Based on Image Steganography

A Covert Communication Model-Based on Image Steganography

Mamta Juneja
Copyright: © 2014 |Volume: 8 |Issue: 1 |Pages: 19
ISSN: 1930-1650|EISSN: 1930-1669|EISBN13: 9781466654990|DOI: 10.4018/ijisp.2014010102
Cite Article Cite Article

MLA

Juneja, Mamta. "A Covert Communication Model-Based on Image Steganography." IJISP vol.8, no.1 2014: pp.19-37. http://doi.org/10.4018/ijisp.2014010102

APA

Juneja, M. (2014). A Covert Communication Model-Based on Image Steganography. International Journal of Information Security and Privacy (IJISP), 8(1), 19-37. http://doi.org/10.4018/ijisp.2014010102

Chicago

Juneja, Mamta. "A Covert Communication Model-Based on Image Steganography," International Journal of Information Security and Privacy (IJISP) 8, no.1: 19-37. http://doi.org/10.4018/ijisp.2014010102

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

With the more and more advancement in technology, internet has become the most important medium for all kinds of confidential as well as non-confidential communications. Security is the major issue for such communications and steganography is most widely accepted tool for information security. An effort has been made in the present paper to propose a secured model for communication using image steganography. It presents two components based LSB steganography method, adaptive LSB based steganography method for embedding data in high and low transition parts of an image respectively. Hybrid edge detection filter is proposed to divide an image in low and high transition areas. AES (Advanced Encryption Standard) and Randomization is incorporated to provide two-tier security. Comparison analysis of output results with other existing techniques on basis of capacity, imperceptibility is giving the proposed approach an edge over others. The proposed approach has been thoroughly tested for various steganalysis attacks like visual analysis, histogram analysis, chi-square, and RS analysis and could sustain all these attacks very well.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.