International Journal of Innovative Technology and Exploring Engineering, 2019
This paper presents a framework that conceal large volume of secret information using distributed... more This paper presents a framework that conceal large volume of secret information using distributed file system that permit implantation of decomposed secret images across multiple-cover images. The strong security is imposed utilizing Shamir’s threshold scheme and permutation generator framework. Three layers of security is being applied to protect the secret information, in first, secret image is decomposed into equal size of smaller sub-images and generate a framework of permutations from an integer for distributing and reassembling the circulated broken secret sub images among the intended participants. At the time of embedding purpose of permutation generator is to arrange the sub-images in unknown order for outsider. During the discloser stage only inverse of permutation can rearrange the distributed sub-images to reassemble into original image by authorized contributors. In second, Shamir’s threshold scheme is designed for authentication of shared associated stego-cover images ...
This paper presents a novel steganography software tool SteganoPixTrans based on pixel value diff... more This paper presents a novel steganography software tool SteganoPixTrans based on pixel value differencing method (PVD). Proposed tool consists of a tailored package that transformed secret data like video, audio, image, text into Base64 format, a common pipeline (CP). Then another designed package transform Base64 text format into binary segments, additionally these segments are used in embedding process . A PVD based steganography using SteganoPixTrans tool is achieved by concealing secret information by dividing host image into 2 x 2 blocks of pixels and crisscrosses it in zigzag fashion; the PVD is calculated for all Red, Green, and Blue (RGB) components between non-overlapping pixels of selected diagonal path with in targeted block. This paper introduces a unique approach of a common pipeline (CP) to conceal confidential data of most file formats inside another carrier image that supports lossless data compression like PNG (Portable Network Graphics), GIF (Graphics Interchange F...
In this paper, three novel schemes have been presented for organizing the secret bits inside betw... more In this paper, three novel schemes have been presented for organizing the secret bits inside between words spaces of cover-text before embedding process starts. The primary scheme conceals one bit within each between-words space; the second conceals a group of bits in the assembly of between-words spaces to control the span of cover-text and third scheme designate a lesser number of bits to higher frequencies letters improving payload with a controlled measure of stego-cover-content. Innovative algorithm for implanting and extricating have been proposed for making an interpretation of secret content into a remarkably secured encoded frame thereby acquire secret bits at that point choose any of three bits arranging plans finally inserted into focused locations of PDF cover-file. The proposed extraction process provides authentication of received stego-cover file such that only desired file is acknowledged for the extraction process otherwise fake file is discarded by a recipient. Experimental result demonstrates that the proposed technique provides productive algorithms in the term of high payload, enhanced security of hidden information and work well against steganalysis attack.
International Journal of Innovative Technology and Exploring Engineering (IJITEE), 2019
This paper presents a framework that conceal large volume of secret information using distributed... more This paper presents a framework that conceal large volume of secret information using distributed file system that permit implantation of decomposed secret images across multiple-cover images. The strong security is imposed utilizing Shamir's threshold scheme and permutation generator framework. Three layers of security is being applied to protect the secret information, in first, secret image is decomposed into equal size of smaller sub-images and generate a framework of permutations from an integer for distributing and reassembling the circulated broken secret sub images among the intended participants. At the time of embedding purpose of permutation generator is to shuffle the sub-images in unknown order for outsider. During the discloser stage only inverse of permutation can rearrange the distributed sub-images to reassemble into original image by authorized contributors. In second, Shamir's threshold scheme is designed for authentication of shared associated stego-cover images before starting the extraction process. This process provides an extremely secured construction of shared secret information. In third, image is divided in 2x2 blocks of pixels and traverses it in zigzag manner; the pixel value difference is computed for all Red, Green, and Blue (RGB) components between non-overlapping pixels of selected diagonal path with in targeted block. Secret bits are concealed inside RGB color pixels of cover image by utilizing proposed novel pixel-value differencing (PVD) scheme, furthermore varying embedding capacity may be obtained by controlling the selection of number of 2x2 block. Exploratory result displays that the proposed approach provides productive algorithms in term multilayer unbreakable security and higher payload of embedded information.
International Journal of Information Technology, 2019
In this paper, three novel schemes have been
presented for organizing the secret bits inside betw... more In this paper, three novel schemes have been presented for organizing the secret bits inside between words spaces of cover-text before embedding process starts. The primary scheme conceals one bit within each between-words space; the second conceals a group of bits in the assembly of between-words spaces to control the span of cover-text and third scheme designate a lesser number of bits to higher frequencies letters improving payload with a controlled measure of stego-cover-content. Innovative algorithm for implanting and extricating have been proposed for making an interpretation of secret content into a remarkably secured encoded frame thereby acquire secret bits at that point choose any of three bits arranging plans finally inserted into focused locations of PDF cover-file. The proposed extraction process provides authentication of received stego-cover file such that only desired file is acknowledged for the extraction process otherwise fake file is discarded by a recipient. Experimental result demonstrates that the proposed technique provides productive algorithms in the term of high payload, enhanced security of hidden information and work well against steganalysis attack.
In this paper, a novel approach of PDF-based text steganography is presented. A covert communicat... more In this paper, a novel approach of PDF-based text steganography is presented. A covert communication is achieved by embedding secret information at between-characters positions of words within cover PDF text. A stego-encoding technique is being designed to improve the embedding capacity along with sufficiently reduced overheads of stego-cover PDF file. The proposed method constructs multilevel embedding capacities which can be used according to requirements from higher embedding capacity to typical embedding capacity. Encoding and decoding of secret text is being obtained by implementing quadratic probing of hashing technique that builds up a direct encoding table which provides better performance in term of time complexity. Exploratory outcome exhibits that the proposed technique gives productive algorithms in term upgraded security and high payload of concealed data. Experiential verification and examination of the proposed technique with certain prominent text steganographic techniques demonstrate that proposed technique performs better than current methodologies and free of requirements like shading scheme, languages, wordlist, compression and so forth.
International Journal of Innovative Technology and Exploring Engineering, 2019
This paper presents a framework that conceal large volume of secret information using distributed... more This paper presents a framework that conceal large volume of secret information using distributed file system that permit implantation of decomposed secret images across multiple-cover images. The strong security is imposed utilizing Shamir’s threshold scheme and permutation generator framework. Three layers of security is being applied to protect the secret information, in first, secret image is decomposed into equal size of smaller sub-images and generate a framework of permutations from an integer for distributing and reassembling the circulated broken secret sub images among the intended participants. At the time of embedding purpose of permutation generator is to arrange the sub-images in unknown order for outsider. During the discloser stage only inverse of permutation can rearrange the distributed sub-images to reassemble into original image by authorized contributors. In second, Shamir’s threshold scheme is designed for authentication of shared associated stego-cover images ...
This paper presents a novel steganography software tool SteganoPixTrans based on pixel value diff... more This paper presents a novel steganography software tool SteganoPixTrans based on pixel value differencing method (PVD). Proposed tool consists of a tailored package that transformed secret data like video, audio, image, text into Base64 format, a common pipeline (CP). Then another designed package transform Base64 text format into binary segments, additionally these segments are used in embedding process . A PVD based steganography using SteganoPixTrans tool is achieved by concealing secret information by dividing host image into 2 x 2 blocks of pixels and crisscrosses it in zigzag fashion; the PVD is calculated for all Red, Green, and Blue (RGB) components between non-overlapping pixels of selected diagonal path with in targeted block. This paper introduces a unique approach of a common pipeline (CP) to conceal confidential data of most file formats inside another carrier image that supports lossless data compression like PNG (Portable Network Graphics), GIF (Graphics Interchange F...
In this paper, three novel schemes have been presented for organizing the secret bits inside betw... more In this paper, three novel schemes have been presented for organizing the secret bits inside between words spaces of cover-text before embedding process starts. The primary scheme conceals one bit within each between-words space; the second conceals a group of bits in the assembly of between-words spaces to control the span of cover-text and third scheme designate a lesser number of bits to higher frequencies letters improving payload with a controlled measure of stego-cover-content. Innovative algorithm for implanting and extricating have been proposed for making an interpretation of secret content into a remarkably secured encoded frame thereby acquire secret bits at that point choose any of three bits arranging plans finally inserted into focused locations of PDF cover-file. The proposed extraction process provides authentication of received stego-cover file such that only desired file is acknowledged for the extraction process otherwise fake file is discarded by a recipient. Experimental result demonstrates that the proposed technique provides productive algorithms in the term of high payload, enhanced security of hidden information and work well against steganalysis attack.
International Journal of Innovative Technology and Exploring Engineering (IJITEE), 2019
This paper presents a framework that conceal large volume of secret information using distributed... more This paper presents a framework that conceal large volume of secret information using distributed file system that permit implantation of decomposed secret images across multiple-cover images. The strong security is imposed utilizing Shamir's threshold scheme and permutation generator framework. Three layers of security is being applied to protect the secret information, in first, secret image is decomposed into equal size of smaller sub-images and generate a framework of permutations from an integer for distributing and reassembling the circulated broken secret sub images among the intended participants. At the time of embedding purpose of permutation generator is to shuffle the sub-images in unknown order for outsider. During the discloser stage only inverse of permutation can rearrange the distributed sub-images to reassemble into original image by authorized contributors. In second, Shamir's threshold scheme is designed for authentication of shared associated stego-cover images before starting the extraction process. This process provides an extremely secured construction of shared secret information. In third, image is divided in 2x2 blocks of pixels and traverses it in zigzag manner; the pixel value difference is computed for all Red, Green, and Blue (RGB) components between non-overlapping pixels of selected diagonal path with in targeted block. Secret bits are concealed inside RGB color pixels of cover image by utilizing proposed novel pixel-value differencing (PVD) scheme, furthermore varying embedding capacity may be obtained by controlling the selection of number of 2x2 block. Exploratory result displays that the proposed approach provides productive algorithms in term multilayer unbreakable security and higher payload of embedded information.
International Journal of Information Technology, 2019
In this paper, three novel schemes have been
presented for organizing the secret bits inside betw... more In this paper, three novel schemes have been presented for organizing the secret bits inside between words spaces of cover-text before embedding process starts. The primary scheme conceals one bit within each between-words space; the second conceals a group of bits in the assembly of between-words spaces to control the span of cover-text and third scheme designate a lesser number of bits to higher frequencies letters improving payload with a controlled measure of stego-cover-content. Innovative algorithm for implanting and extricating have been proposed for making an interpretation of secret content into a remarkably secured encoded frame thereby acquire secret bits at that point choose any of three bits arranging plans finally inserted into focused locations of PDF cover-file. The proposed extraction process provides authentication of received stego-cover file such that only desired file is acknowledged for the extraction process otherwise fake file is discarded by a recipient. Experimental result demonstrates that the proposed technique provides productive algorithms in the term of high payload, enhanced security of hidden information and work well against steganalysis attack.
In this paper, a novel approach of PDF-based text steganography is presented. A covert communicat... more In this paper, a novel approach of PDF-based text steganography is presented. A covert communication is achieved by embedding secret information at between-characters positions of words within cover PDF text. A stego-encoding technique is being designed to improve the embedding capacity along with sufficiently reduced overheads of stego-cover PDF file. The proposed method constructs multilevel embedding capacities which can be used according to requirements from higher embedding capacity to typical embedding capacity. Encoding and decoding of secret text is being obtained by implementing quadratic probing of hashing technique that builds up a direct encoding table which provides better performance in term of time complexity. Exploratory outcome exhibits that the proposed technique gives productive algorithms in term upgraded security and high payload of concealed data. Experiential verification and examination of the proposed technique with certain prominent text steganographic techniques demonstrate that proposed technique performs better than current methodologies and free of requirements like shading scheme, languages, wordlist, compression and so forth.
Uploads
Papers by Sanjive Tyagi
presented for organizing the secret bits inside between words spaces of cover-text before embedding process
starts. The primary scheme conceals one bit within each
between-words space; the second conceals a group of bits in the assembly of between-words spaces to control the span of cover-text and third scheme designate a lesser number of bits to higher frequencies letters improving payload with a controlled measure of stego-cover-content. Innovative algorithm for implanting and extricating have been proposed for making an interpretation of secret content into a remarkably secured encoded frame thereby acquire secret bits at that point choose any of three bits arranging plans finally inserted into focused locations of PDF cover-file. The proposed extraction process provides authentication of received stego-cover file such that only
desired file is acknowledged for the extraction process
otherwise fake file is discarded by a recipient. Experimental result demonstrates that the proposed technique provides productive algorithms in the term of high payload, enhanced security of hidden information and work well against steganalysis attack.
presented for organizing the secret bits inside between words spaces of cover-text before embedding process
starts. The primary scheme conceals one bit within each
between-words space; the second conceals a group of bits in the assembly of between-words spaces to control the span of cover-text and third scheme designate a lesser number of bits to higher frequencies letters improving payload with a controlled measure of stego-cover-content. Innovative algorithm for implanting and extricating have been proposed for making an interpretation of secret content into a remarkably secured encoded frame thereby acquire secret bits at that point choose any of three bits arranging plans finally inserted into focused locations of PDF cover-file. The proposed extraction process provides authentication of received stego-cover file such that only
desired file is acknowledged for the extraction process
otherwise fake file is discarded by a recipient. Experimental result demonstrates that the proposed technique provides productive algorithms in the term of high payload, enhanced security of hidden information and work well against steganalysis attack.