Journal Press India®

Blind Extraction of Hidden Data from Digital Media

Vol 3 , Issue 2 , April - June 2015 | Pages: 32-35 | Research Paper  

https://doi.org/10.51976/ijari.321508

| | |


Author Details ( * ) denotes Corresponding author

1. * Radha A., Department of Computer Science Engineering, J. J. College of Engineering and Technology, Trichy, Tamil Nadu, India (radha.ait22@gmail.com)
2. Kavitha N., Department of Computer Science Engineering, J. J. College of Engineering and Technology, Trichy, Tamil Nadu, India

Spread-Spectrum (SS) Steganography is attracting increasing interest among researchers and practitioners in the fields of authentication and covert communications. Steganography is the technique for hiding secret information in other data such as still, multimedia images, text, and audio. Whereas Steganalysis is the reverse technique in which detection of the secret information is done in the stego image. Digital data embedding in digital media is an information technology field of rapidly growing commercial as well as national security interest. It considers the problem of extracting blindly data embedded over a wide band in a spectrum domain of a digital medium. To develop a novel embedding and extracting algorithm to demonstrate this problem. Least Significant Bit (LSB) algorithm is used to embed the secret message into the image. Special Cryptography algorithm called triple Data Encryption Standard (DES) is used to encrypt and decrypt the secret message for strengthens the security of this process.

Keywords

Authentication; Covert Communication; Data Hiding; Steganalysis; Steganography; Watermarking


  1. F. A. P. Petitcolas, R. J. Anderson, M. G. Kuhn, Information hiding: A survey, IEEE (Special Issue on Identification and Protection of Multimedia Information), 87, 1999, 1062-1078

  2. Y. Wang, P. Moulin, Perfectly secure steganography: Capacity, error exponents, and code constructions, IEEE Trans. Inform. Theory, 54, 2008, 2706-2722

  3. T. Li, N. D. Sidiropoulos, Blind digital signal separation using successive interference cancellation iterative least squares, IEEE Transaction on Signal Processing., 48, 2000, 3146-3152

  4. S. Lyu, H. Farid, Steganalysis using higher-order image statistics, IEEE Trans. Inform. Forensics and Security, 1, 2006, 111-119

  5. M. Gkizeli, D. A. Pados, S. N. Batalama, M. J. Medley, Blind iterative recovery of spread-spectrum steganographic messages, IEEE Intern. Conf. Image Proc. (ICIP), Genova, Italy, 2, 2005, 11-14.

Abstract Views: 1
PDF Views: 99

Advanced Search

News/Events

Indira School of Bus...

Indira School of Mangement Studies PGDM, Pune Organizing Internatio...

Indira Institute of ...

Indira Institute of Management, Pune Organizing International Confe...

D. Y. Patil Internat...

D. Y. Patil International University, Akurdi-Pune Organizing Nation...

ISBM College of Engi...

ISBM College of Engineering, Pune Organizing International Conferen...

Periyar Maniammai In...

Department of Commerce Periyar Maniammai Institute of Science &...

Institute of Managem...

Vivekanand Education Society's Institute of Management Studies ...

Institute of Managem...

Deccan Education Society Institute of Management Development and Re...

S.B. Patil Institute...

Pimpri Chinchwad Education Trust's S.B. Patil Institute of Mana...

D. Y. Patil IMCAM, A...

D. Y. Patil Institute of Master of Computer Applications & Managem...

Vignana Jyothi Insti...

Vignana Jyothi Institute of Management International Conference on ...

By continuing to use this website, you consent to the use of cookies in accordance with our Cookie Policy.