Covert Communication Using a Dissimilar Cover

Authors

  • Jayaramu HS Department of TCE, Sri Siddhartha Institute of Technology, Tumkur, Karnataka, India.
  • ShivaKumar KB Department of TCE, Sri Siddhartha Institute of Technology, Tumkur, Karnataka, India.
  • G A Srinidhi Department of TCE, Sri Siddhartha Institute of Technology, Tumkur, Karnataka, India.
  • Goutam AK S D College of Engineering, Muzaffarnagar, Uttar Pradesh, India

Keywords:

Video Steganography, Data hiding, text steganography, video steganography

Abstract

Communication is all about information exchange. Recently with the advancement in technology and the rapid exponential growth in the means of communication there are various domains emerged in the field of communication. Data hiding is a recently developed technique in the field of information security and has received significant attention from both academia and industry. Steganography is the practice of encoding secret information in a manner such that the very existence of the information is concealed. Steganography means hiding data inside cover objects such as images that will escape detection and can be retrieved with no distortion at the receiver. The messages such as images, videos, audio files, text and other computer files can be hidden inside images or other digital objects. The purpose of Steganography is not to keep others from knowing the hidden information – it is to keep others away from thinking that the information even exists. This paper presents one of the latest advancements accomplished in the field of data security. In this project a secret text message, technically known as the payload is embedded into a video which is called the cover video. For a general view it seems as a simple video file that is transmitted finally but actually it has got the secret text message hidden in it.

References

Katzenbeisser, S. And Petitcolas F.A.P., “Information Hiding Techniques For Steganography and Digital Watermarking,” Artech House, Inc., Boston, London (2000).

M. F. Tolba, M. A. Ghonemy, I. A. Taha, A. S. Khalifa, "Using Integer Wavelet Transforms InColored Image-Stegnography", International Journal on Intelligent Cooperative Information Systems, Volume 4, pp. 75-85. (2004).

Hemalatha S., U. Dinesh Acharya., Renuka A. And Priya R Kamath, “A Secure And High Capacity Image Steganography Technique,” International Journal,Volume-4, Febrauary (2013).

Shejul.A.Kulkarni, U.L., “A Secure Skin Tone Based Steganography (SSTS) Using Wavelet Transform,” International Journal Of Computer Theory And Engineering, Vol.3, No.1, pp. 16-22 (2011).

Masud, Karim S.M., Rahman, M.S., Hossain, M.I., “A New Approach For LSB Based Image Steganography Using Secret Key,” International Conference On Computer And Information Technology, IEEE Conference Publications, pp 286 – 291 (2011)

Xie Qing., XieJianquan., XiaoYunhua., “A High Capacity Information Hiding Algorithm In Color Image.”, 2nd International Conference On E-Business And Information System Security, IEEE Conference Publications, pp 1-4 (2010).

Sachdeva S and Kumar A, “Color Image Steganography Based on Modified Quantization Table,” Second International Conference On Advanced Computing & Communication Technologies, IEEE Conference Publications, pp 309 – 313 (2012).

Chen, R.J., Peng, Y.C., Lin, J.J., Lai, J.L., Horng, S.J. Novel Multi-Bit Bitwise Adaptive Embedding Algorithms With Minimum Error For Data Hiding. Fourth International Conference On Network And System Security (NSS 2010), IEEE Conference Publications, pp. 306 – 311,(2010).

Roy, S., Parekh, R., “A Secure Keyless Image Steganography approach For Lossless RGB Images,” International Conference On Communication, Computing & Security, ACM Publications, pp 573-576 (2011).

Mandal, J K, Sengupta M , “Steganographic Technique Based On Minimum Deviation Of Fidelity (STMDF),” Second International Conference On Emerging Applications Of Information Technology, IEEE Conference Publications, pp 298 – 301, (2011).

Mandal, J.K., Sengupta, M. “Authentication/Secret Message Transformation Through Wavelet Transform Based Subband Image Coding(WTSIC).”, International Symposium On Electronic System Design, IEEE Conference Publications, pp 225 – 229, (2010)

Sarreshtedari S and Ghaemmaghami S, “High Capacity Image Steganography In Wavelet Domain,” IEEE Consumer Communications and Networking Conference (CCNC), IEEE Conference Publications, pp 1-5, (2010).

Rubab S and Younus M, “Improved Image Steganography Technique for Colored Images Using Wavelet Transform,” International Journal of Computer Applications, Volume 39, No.14, pp 29-32(2012).

Kapre Bhagyashri S, Joshi M Y, “All Frequency Band DWT-SVD Robust Watermarking Technique for Color Images in YUV Color Space,” IEEE International Conference On Computer Science And Automation Engineering (CSAE), IEEE Conference Publications, pp. 295-299, (2012).

Ghoshal N and Mandal J K, “A Steganographic Scheme for Colour Image Authentication (SSCIA),” International Conference On Recent Trends In Information Technology, IEEE Conference Publications, pp.826 -831, (2011).

S Hemalatha, U DineshAcharya, A Renuka and Priya R Kamath “A Secure Image Steganography Technique To Hide Multiple Secret Images,” Fourth International Conference On Networks & Communications, LNEE, Springer, pp 613-620 (2012).

Downloads

Published

2024-02-26

How to Cite

Jayaramu, H. S., ShivaKumar, K. B., G A, S., & Goutam, A. K. (2024). Covert Communication Using a Dissimilar Cover. COMPUSOFT: An International Journal of Advanced Computer Technology, 2(11), 374–377. Retrieved from https://ijact.in/index.php/j/article/view/65

Issue

Section

Original Research Article

Similar Articles

1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.