a statistics hiding scheme based on scrambling encryption with reference ppm technique.

A.Ramya,S.Selvi,R.Vasanthi,B.Hema

Published in International Journal of Advanced Research in Electronics, Communication & Instrumentation Engineering and Development

ISSN: 2347 -7210          Impact Factor:1.9         Volume:2         Issue:2         Year: 26 June,2014         Pages:29-34

International Journal of Advanced Research in Electronics, Communication & Instrumentation Engineering and Development

Abstract

Steganography and Cryptography are two popular way of sending information in a secret way. The secret information to be transmitted is first encrypted into unreadable information using cryptography technique which is performed using chaotic algorithm.Next the encrypted information is covered with an image is known as stego-image.Finally the stego-image can be transmitted without revealing the secret information by the process called steganography which is performed by using APPM.Thus by using this two method we can achieve a secure communication.

Kewords

Scrambling encryption, adaptive arithmetic coding, mapping, assembler, encrypting data, embedding, extraction and decryption.

Reference

[1] N. K.Pareek, Vinod Patidar ,K.K.Sud, (2006),"Image encryption using chaotic logistic map" ,IEEE Transactions on image and vision computing, vol. 24, no. 9, pp. 926-934. [2] RakeshS,AjitkumarA,Kallar,Shadakshari B.C AnnappaB, (20 12) "Image encryption using block based uniform scrambling and chaotic logistic mapping "International Journal on Cryptography and Information Security (IJCIS),VoI.2, No.1.pp-49-57. [3] C.K.Chan and L. M. Cheng, (2004), "Hiding data in images by simple LSB substitution," Pattern Recognit., vol. 37, no. 3, pp. 469-474, 2004. [4] Xinpeng Zhang and Shuozhong Wang , (2006)"Efficient steganographic embedding by exploiting modification direction" IEEE Commun. Lett., vol. 10, no. 11,pp. 781-783, Nov. [5] Andrew Ker, (2005) "steganalysis of LSB matching in grayscale images" IEEE signal processing letters , vol. 12, no. 6, pp. 441-444, Jun. [6] R.M.Chao, H.C.Wu, C.C.Lee and Y.P.Chu (2009)" A novel image data hiding scheme with diamond encoding" EURASIPJ.Inf.Security,DOI.0.1155/2009/658047, Article I D 658047. [7] Wien Hong and Tung-Shou ehen , (2012), "A noval data embedding method using adaptive pixel pair matching "IEEE transactions on IEEE transactions on information forensics and security, vol. 7, NmblingO.l,February.