23.10.2014 Views

An Agent based Image Steganography using Information Theoretic ...

An Agent based Image Steganography using Information Theoretic ...

An Agent based Image Steganography using Information Theoretic ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

MASAUM Journal of Computing, Volume 1 Issue 2, September 2009 263<br />

- The goal of steganography is to avoid attacker from<br />

discovering the secret images embedded in the<br />

cover image. To improve security level we must<br />

obtain acceptable STEGO image quality. Overall,<br />

the proposed system matches the requirements to<br />

obtain acceptable STEGO image.<br />

REFERENCES<br />

[1] Chin- Chen C., Ju-Yuan H., and Chi-Shiang C., "finding optimal<br />

least significant –bit substitution in image hiding by dynamic<br />

programming strategy" department of computer science and<br />

information engineering Taiwan pattern Recognition,36, pp. 1583 -<br />

1595, 2003.<br />

[2] Chin –Chang Tung –Shung –Shon C and Lou- Zo C , "A<br />

steganography method <strong>based</strong> upon JPEG and quantization table",<br />

information engineering and computer science department , national<br />

Chung Cheng university , 141 pp 123-138, 2002.<br />

[3] Tao Z. and Xijian P., "A new approach to reliable detection of LSB<br />

steganography in natural images", Signal Processing, (83), pp. 2085-<br />

2093, 2003.<br />

[4] Najla'a H.M, "New robust information hading technique",<br />

<strong>Information</strong> institute university of technology, Baghdad, Iraq M.Sc.<br />

thesis, 2005.<br />

[5] Sabu . M. Th. and K. Chandra S. ,"<strong>Steganography</strong> <strong>based</strong> WWW<br />

distribution image retrieval with mobile agents ", department of<br />

computer engineering national institute of technology, Karnataka,<br />

department of computer science and engineering L.B.S collage of<br />

engineering , Kasaragod, 2004.<br />

[6] Tabais S.G.G, " <strong>Agent</strong>-Based recommendation systems",<br />

Department of computer and system science, university of Stockolm,<br />

royal institute of technology, M.Sc. Thesis,1999.<br />

[7] Qi D. and Robert K. A., "Fostering multimedia learning of science:<br />

Exploring the role of an animated agent's image". Computer and<br />

education, 2005.<br />

[8] Katzenbeisser and F. A. P. Petitcolas, " <strong>Information</strong> hiding<br />

techniques for steganography and digital watermarking", ARTECH<br />

HOUSE, 2000.<br />

[9] David Salmon, "Data compression", SPRINGER-VERLAG New<br />

York, 1998.<br />

[10] Scott E. Umborgh, "Computer vision and image processing a<br />

practical approach <strong>using</strong> CVIP tools", PRENTIC HALL, 1998.<br />

[11] Stan Franklin and Art. G., "It is <strong>An</strong> AGENT OR JUST A Program?<br />

A taxonomy for <strong>Agent</strong> institute for intelligent system university of<br />

Memphis Springer –Verlage 1996.<br />

[12] Willam Stalling, "Cryptography and network security principle<br />

and practice", PRINTIC-HALL, 1999.<br />

[13] Sorina D , Xiaolin W, and Zhe W, "Detection of GSB<br />

<strong>Steganography</strong> via sample pair analysis" , Electronic and computer<br />

engineering department , Mc Mcmaster university Hamilton Ontario ,<br />

Canada L8s 4 Ki 2003.<br />

[14] <strong>An</strong>derw D. Ker, "Quantitative evaluation of pairs and RS<br />

steganalysis", computing laboratory, Oxford University England 2004.<br />

[15] K.Goplan, "Cepstral Domain modification of audio signals for<br />

data embedding preliminary result" department of engineering purdue<br />

university Calument Hammond in 46323, 2004.<br />

[16] Chi-Kwong C. and L. M. Cheng, "Hiding data in images by simple<br />

least significant bit", department of computer Engineering and<br />

information technology , university of Hong Kong ,pattern recognition ,<br />

37, pp 469-474, 2004.<br />

[17] Jessica F. and Miroslav G., "On Estimation of secret message<br />

Length in LSB-<strong>Steganography</strong> in Spatial Domain ", Department of<br />

electrical and computer engineering , SUNY,BINGHAMTON, NY<br />

13902-6000.<br />

[18] Federico B., Marie –pierre .G. and Franco. Z. "Methodology and<br />

software engineering for agent system" KLUWER ACADEMIC<br />

PUBLISHERS, 2004.<br />

[19] Padghame & Michael Winkoff, "developing intelligent agent<br />

system" JHON WEILY & SONS 2000.<br />

[20] Nine L and K .P.S., "Vector quantization <strong>based</strong> scheme for data<br />

embedding for image ." network and communication laboratory ,<br />

department of computer and electronic engineering , Steven institute of<br />

technology , HOBOKEN,NJ030,2004.<br />

TABLE 1. THE OBJECTIVE MEASURES FOR S1.BMP &<br />

C1.BMP CHOSEN BY STEGANORGRAPHY AGENT<br />

ACCORDING TO IMAGE FEATURE.<br />

Block size Quantize value R PSNR(db) Correlation<br />

2 0.1 30.5913 0.998366<br />

4 0.1 25.1837 0.994315<br />

8 0.1 22.2076 0.988698<br />

TABLE 2. C1.BMP FEATURES<br />

Mean 111.5858<br />

Entropy 7.763618<br />

Energy 5.252129e-<br />

003<br />

Variance 4918.591<br />

Contrast 70.13267<br />

Secret image ( S1.bmp) Cover image (C1.bmp )<br />

STEGO <strong>Image</strong><br />

Fig. (3) The Secret image (s1), the cover image C1,<br />

and the resulted stego image used in example.<br />

263

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!