MATHEMATICAL APPROACH TO STEGANOGRAPHY FOR EMBEDDING
International Journal of Computer Techniques – Volume 12 Issue 2, 2025
Dr. P. Meenakshi Sundari
Associate Professor,
Department of Computer Science,
Fatima College, Madurai, Tamil Nadu, India.
Email: meenatreering@gmail.com
Abstract
The digital world presents opportunities for the art of data concealment. Steganography exemplifies this, enabling the embedding of confidential data, such as images or text, within innocuous digital images. Leveraging non-secret files to transmit secret messages offers a distinct security advantage over cryptography by aiming to avoid the scrutiny of hackers. While the existence of the hidden data remains known only to the intended sender and receiver, this paper proposes a new steganographic approach for concealing an RGB image within another. The method involves choosing three coordinates within the cover image. The red, green, and blue values of each pixel in the secret image are split into three segments and embedded within the middle value of the respective color channels at these three coordinates. A circular formula is used to calculate the subsequent embedding coordinates. To further bolster security, adding noise to the cover image before the embedding process is suggested.
Keywords
Steganographic, color image
Conclusion
Cryptography’s strength lies in concealing message content, but its weakness is its conspicuous existence, which can alert hackers. Steganography, however, provides enhanced security by hiding the very fact that secret data is being transmitted, thus remaining unknown to unauthorized individuals. Despite the array of existing techniques in both fields, the dynamic nature of digital security demands continuous research and innovative solutions. This paper introduces a novel approach for concealing an RGB image within another RGB image, specifically designed to evade the notice of hackers.
References
- M. M Amin, M. Salleh, S. Ibrahim, M.R.K atmin, and M.Z.I. Shamsuddin, “Information Hiding using Steganography,” 4th National Conference on Telecommunication Technology Proceedings, Shah Alam, Malaysia, 2003 IEEE.
- Moerland, T., “Steganography and Steganalysis,” Leiden Institute of Advanced Computing Science, www.liacs.nl/home/tmoerl/privtech.pdf.
- Feng, J.B., Lin, I.C., Tsai, C.S., Chu, Y.P., 2006. Reversible watermarking: current status and key issues. International Journal of Network Security 2 (May), 161–170.
- Wang, H., & Wang, S., “Cyber warfare: Steganography vs. Steganalysis,” Communications of the ACM, 47:10, October 2004.
- Westfeld, A., and G. Wolf, “Steganography in a Video conferencing system,” in proceedings of the second international workshop on information hiding, vol. 1525 of lecture notes in computer science, Springer, 1998, pp. 32-47.
- Chan, C.K., Cheng, L.M., 2004. “Hiding data in images by simple LSB substitution.” Pattern Recognition 37 (March), 469–474.
- T. Sharp, “An implementation of key-based digital signal steganography,” in Proc. Information Hiding Workshop, vol. 2137, Springer LNCS, 2001, pp. 13–26.
- R. Chandramouli and Nasir Memon, “Analysis of LSB Based Image Steganography Techniques,” IEEE, 2001.
- Neil F. Johnson, S.C. Katzenbeisser, “A survey of steganography techniques.”
- Chung-Ming Wang, Nan-I Wu, “A high quality steganographic method with pixel-value differencing and modulus function,” accepted 24 January 2007.
- Mohammad Tanvir Parvez and Adnan Gutub, “RGB Intensity Based Variable-Bits Image Steganography,” APSCC 2008 – Proceedings of 3rd IEEE Asia-Pacific Services Computing Conference, Yilan, Taiwan, December 2008.
- Deepesh Rawat, Vijaya Bhandari, “A Steganography Technique for Hiding Image in an Image using LSB Method for 24 Bit Color Image,” International Journal of Computer Applications (0975–8887), Volume 64– No.20, February 2013.
How to Cite
P. Meenakshi Sundari, “Mathematical Approach to Steganography for Embedding RGB Images,” International Journal of Computer Techniques, Volume 12, Issue 2, 2025. ISSN 2394-2231
Share this content:
Post Comment