A robust RGB channel based image steganography technique using a secret key
The paper proposes a RGB channel based steganographic technique for images imparting better information security. This technique inserts the information into deeper layers of the selected RGB channel and the position is determined depending on the status of channel and value of the secret key. Pixel...
Saved in:
Published in | 16th Int'l Conf. Computer and Information Technology pp. 81 - 87 |
---|---|
Main Authors | , , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
01.03.2014
|
Subjects | |
Online Access | Get full text |
DOI | 10.1109/ICCITechn.2014.6997309 |
Cover
Abstract | The paper proposes a RGB channel based steganographic technique for images imparting better information security. This technique inserts the information into deeper layers of the selected RGB channel and the position is determined depending on the status of channel and value of the secret key. Pixels of the cover image are selected depending on the environment of the channels and hidden information. The ambiguity of pixel, channel and position selection process increases robustness of the steganographic system. The technique is also less vulnerable to unintentional attacks like image manipulation as data hides in the deeper layer of the pixels. The system uses the RGB channels of the stego-image and the secret key to extract the hidden information. The use of secret key gives another way to secure the information from malicious user. The experiment shows that on average 77.00% pixels of the cover image are used for hiding secret information and produces high PSNR value which indicates the capacity and imperceptibility of the technique respectively. |
---|---|
AbstractList | The paper proposes a RGB channel based steganographic technique for images imparting better information security. This technique inserts the information into deeper layers of the selected RGB channel and the position is determined depending on the status of channel and value of the secret key. Pixels of the cover image are selected depending on the environment of the channels and hidden information. The ambiguity of pixel, channel and position selection process increases robustness of the steganographic system. The technique is also less vulnerable to unintentional attacks like image manipulation as data hides in the deeper layer of the pixels. The system uses the RGB channels of the stego-image and the secret key to extract the hidden information. The use of secret key gives another way to secure the information from malicious user. The experiment shows that on average 77.00% pixels of the cover image are used for hiding secret information and produces high PSNR value which indicates the capacity and imperceptibility of the technique respectively. |
Author | Bairagi, Anupam Kumar Mondal, Saikat Debnath, Rameswar |
Author_xml | – sequence: 1 givenname: Anupam Kumar surname: Bairagi fullname: Bairagi, Anupam Kumar email: anupam@cseku.ac.bd organization: Comput. Sci. & Eng, Khulna Univ., Khulna, Bangladesh – sequence: 2 givenname: Saikat surname: Mondal fullname: Mondal, Saikat email: saikatmondal@cse.ku.ac.bd organization: Comput. Sci. & Eng, Khulna Univ., Khulna, Bangladesh – sequence: 3 givenname: Rameswar surname: Debnath fullname: Debnath, Rameswar email: rdebnath@cseku.ac.bd organization: Comput. Sci. & Eng, Khulna Univ., Khulna, Bangladesh |
BookMark | eNotj8tOwzAUBY0ECyj9AiR0fyDBjp04XpYISkQlpLb7yo_rJKI4JU4W-XuK2tVIZzE680BuQx-QkGdGU8aoeqmrqt6jbUOaUSbSQinJqbohSyVLJqRSXJyXe_K5gqE3Uxxhu34F2-oQ8AhGR3TQ_egGIY7Y6NA3gz61M4z_zu53QphiFxrQENEOOMI3zo_kzutjxOWVC7J7f9tXH8nma11Xq03SKTomnvlMOLTGWFmU1DjLaCYENQap94JRxmQurfOqcLl2PEPuCyNzZXxpnOIL8nSxdoh4OA3nl8N8uAbyP-RVTLY |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/ICCITechn.2014.6997309 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
EISBN | 9781479934973 1479934976 |
EndPage | 87 |
ExternalDocumentID | 6997309 |
Genre | orig-research |
GroupedDBID | 6IE 6IL CBEJK RIE RIL |
ID | FETCH-LOGICAL-i90t-f1f24decbbc7680bdc102440bbe0ff41011757cdf96d5ad32e3f6b759bf8bd93 |
IEDL.DBID | RIE |
IngestDate | Thu Jun 29 18:37:37 EDT 2023 |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i90t-f1f24decbbc7680bdc102440bbe0ff41011757cdf96d5ad32e3f6b759bf8bd93 |
PageCount | 7 |
ParticipantIDs | ieee_primary_6997309 |
PublicationCentury | 2000 |
PublicationDate | 2014-March |
PublicationDateYYYYMMDD | 2014-03-01 |
PublicationDate_xml | – month: 03 year: 2014 text: 2014-March |
PublicationDecade | 2010 |
PublicationTitle | 16th Int'l Conf. Computer and Information Technology |
PublicationTitleAbbrev | ICCITechn |
PublicationYear | 2014 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
Score | 1.5912685 |
Snippet | The paper proposes a RGB channel based steganographic technique for images imparting better information security. This technique inserts the information into... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 81 |
SubjectTerms | Arrays Computers Cryptography Green products Image color analysis Image steganography Imperceptibility PSNR RGB image Robustness Secret key Stego-image |
Title | A robust RGB channel based image steganography technique using a secret key |
URI | https://ieeexplore.ieee.org/document/6997309 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV07T8MwED61nZgAtYi3PDCSNImdBI9QUVpQEeIhdav8rCpogtpk4ddzTkIRiIEtsizFujvnzpfv-wxwJmhKrVN-NBEVHqNp7HGqIy_UmkmB9Yaxrt8xuU9GL-x2Gk9bcL7hwhhjKvCZ8d1j9S9f56p0rbJ-wjkGJG9DG8Os5mo1pN8w4P3xYDCu-tEOsMX8ZvKPW1OqpDHchsnX62qsyKtfFtJXH7-UGP-7nh3ofdPzyMMm8exCy2RduLskq1yW64I83lwRx-fNzBtxSUqTxRK_GgT9ORdZI1FNNuKtxEHf50SQtasgC4K7ugdPw-vnwchrbkrwFjwoPBvaiGmjpFR4egikVlg2MBZIaQJrWVjpcaZKW57oWGgaGWoTmcZc2gupOd2DTpZnZh9IGuKcBP2muWBcYZjZIEVjC6rwGM3FAXSdGWbvtRTGrLHA4d_DR7DlXFFDto6hU6xKc4I5vJCnlfM-Aakyn6w |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV09T8MwFHwqZYAJUIv4xgMjSZPYSfAIFaWhTYWgSN0qf1YVkKI2Wfj12EkoAjGwRZalWH527vnl7gxwwXCMtXV-VAFmDsFx6FAsA8eXknBm8g2lbb0jHUX9Z3I_CScNuFxrYZRSJflMufax_JcvF6KwpbJORKlZkHQDNg3uk7BSa9WyX9-jnaTbTcqKtKVsEbfu_uPelBI2ejuQfr2wYou8uEXOXfHxy4vxvyPahfa3QA89rKFnDxoqa8HgGi0XvFjl6PHuBllFb6ZekYUpieZv5ruBTERnLKtNqtHavhVZ8vsMMbSyOWSOzL5uw1PvdtztO_VdCc6cermjfR0QqQTnwpwfPC6FSRwI8ThXntbELx05YyE1jWTIJA4U1hGPQ8r1FZcU70MzW2TqAFDsmz6RiZykjFBhFpr2YrOrGRbmIE3ZIbTsNEzfKzOMaT0DR383n8NWf5wOp8NkNDiGbRuWisB1As18WahTg-g5PysD-QkzcaL5 |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=16th+Int%27l+Conf.+Computer+and+Information+Technology&rft.atitle=A+robust+RGB+channel+based+image+steganography+technique+using+a+secret+key&rft.au=Bairagi%2C+Anupam+Kumar&rft.au=Mondal%2C+Saikat&rft.au=Debnath%2C+Rameswar&rft.date=2014-03-01&rft.pub=IEEE&rft.spage=81&rft.epage=87&rft_id=info:doi/10.1109%2FICCITechn.2014.6997309&rft.externalDocID=6997309 |