Indian Journal of Science and Technology
DOI: 10.17485/ijst/2016/v9i28/97349
Year: 2016, Volume: 9, Issue: 28, Pages: 1-5
Original Article
Xiaoning Guo*, Yi-Fei Tan, Wooi-Nee Tan and Shariar Mohsin Shohan
Faculty of Engineering, [email protected]
*Author for correspondence
Xiaoning Guo
Faculty of Engineering,
Email:[email protected]
This paper proposes a steganographic method that would improve transfer security and allow user customizable options, with no size restrictions for the secret image being transferred. It compares the secret image with multiple directionally scanned Least Significant Bits of the cover image for similarity in varied length of segments. The result of the comparison will form the basis of generating the key. A varied comparison segment of 2, 4, 6, 8 and 10 bits in binary was used in this paper to assess the performance of the method. The proposed method led to produce very good consistency in results with different secret images used, it was found that the size of the data set required for key generation depends very much on the length of the segment selected for comparison. There is no limit for the secret image size for this method, as the scanning of collection of Least Significant Bits may continue for as long as necessary. In this method, the cover image does not require to be modified and may be stored publicly and only to be used with the key to retrieve the secret image after transfer. This method was found to be a considerably secure and flexible method for data transfer.
Keywords: Information Security, Least Significant Bits, Secret Image, Steganography, Stego Key
Subscribe now for latest articles and news.