Extracting Spread-Spectrum Hidden Data from Picture Representation
Main Article Content
Abstract
In this paper, we introduce a novel high bit rate LSB Picture information concealing system. The fundamental thought of the proposed LSB computation is information installing that causes negligible implanting contortion of the host picture. Utilizing the proposed two-stage result, information concealing bits are inserted into higher LSB layers, resulting in expanded vigor against clamor expansion or picture layering. Listening tests demonstrated that the perceptual nature of information hided picture is higher on account of the proposed technique than in the standard LSB strategy.
Article Details

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
IJCERT Policy:
The published work presented in this paper is licensed under the Creative Commons Attribution 4.0 International (CC BY 4.0) license. This means that the content of this paper can be shared, copied, and redistributed in any medium or format, as long as the original author is properly attributed. Additionally, any derivative works based on this paper must also be licensed under the same terms. This licensing agreement allows for broad dissemination and use of the work while maintaining the author's rights and recognition.
By submitting this paper to IJCERT, the author(s) agree to these licensing terms and confirm that the work is original and does not infringe on any third-party copyright or intellectual property rights.
References
F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, “Information hiding: A survey,” Proc. IEEE (Special Issue on Identification and Protection of Multimedia Information), vol. 87, pp. 1062-1078, July 1999.
I. J. Cox, M. L. Miller, and J. A. Bloom, Digital Watermarking. San Francisco, CA: Morgan-Kaufmann, 2002.
F. Hartung and M. Kutter, “Multimedia watermarking techniques,” Proc. IEEE (Special Issue on Identification and Protection of Multimedia Information), vol. 87, pp. 1079-1107, July 1999.
G. C. Langelaar, I. Setyawan, and R. L. Lagendijk, “Watermarking digital image and video data: A stateof-the-art overview,” IEEE Signal Processing Magazine, vol. 17, pp. 20-46, Sept. 2000.
N. F. Johnson and S. Katzenbeisser, “A survey of steganographic techniques,” in Information Hiding, S. Katzenbeisser and F. Petitcolas Eds. Norwood, MA: Artech House, 2000, pp. 43-78.
S. Wang and H. Wang, “Cyber warfare: Steganography vs. steganalysis,” Communications of the ACM, vol. 47, pp. 76-82, Oct. 2004.
C. Cachin, “An information-theoretic model for steganography,” in Proc. 2nd Intern. Workshop on Information Hiding, Portland, OR, Apr. 1998, pp. 306- 318.
G. J. Simmons, “The prisoner’s problem and the subliminal channel,” in Advances in Cryptology: Proc. CRYPTO’83. New York, NY: Plenum, 1984, pp. 51-67.
J. Fridrich, Steganography in Digital Media, Principles, Algorithms, and Applications. Combridge, UK: Combridge Univeristy Press, 2010.
Y. Wang and P. Moulin, “Perfectly secure steganography: Capacity, error exponents, and code constructions,” IEEE Trans. Inform. Theory, vol. 54, pp. 2706-2722, June 2008.
Federal plan for cyber security and information assurance research and development, Interagency Working Group on Cyber Security and Information Assurance, Apr. 2006.
R. Chandramouli, “A mathematical framework for active steganalysis,” ACM Multimedia Systems Special Issue on Multimedia Watermarking, vol. 9, pp. 303-311, Sept. 2003.
H. S. Malvar and D. A. Florencio, “Improved spread spectrum: A new modulation technique for robust watermarking,” IEEE Trans. Signal Proc., vol. 51, pp. 898-905, Apr. 2003.
I. J. Cox, J. Kilian, F. T. Leighton, and T. Shannon, “Secure spread spectrum watermarking for multimedia,” IEEE Trans. Image Proc., vol. 6, pp. 1673- 1687, Dec. 1997.
J. Hernandez, M. Amado, and F. Perez-Gonzalez, “DCT-domain water- marking techniques for still images: Detector performance analysis and a new structure,” IEEE Trans. Image Proc., vol. 9, pp. 55-68, Jan. 2000.
C. Qiang and T. S. Huang, “An additive approach to transform-domain information hiding and optimum detection structure,” IEEE Trans. Multimedia, vol. 3, pp. 273-284, Sept. 2001.
C. Fei, D. Kundur, and R. H. Kwong, “Analysis and design of wa- termarking algorithms for improved resistance to compression,” IEEE Trans. Image Proc., vol. 13, pp. 126-144, Feb. 2004.
M. Gkizeli, D. A. Pados, and M. J. Medley, “SINR, bit error rate, and Shannon capacity optimized spreadspectrum steganography,” in Proc. IEEE Intern. Conf. Image Proce. (ICIP), Singapore, Oct. 2004, pp. 1561- 1564.
M. Gkizeli, D. A. Pados, S. N. Batalama, and M. J. Medley, “Blind iterative recovery of spread-spectrum steganographic messages,” in Proc. IEEE Intern. Conf. Image Proc. (ICIP), Genova, Italy, Sept. 2005, vol. 2, pp. 11-14.
M. Gkizeli, D. A. Pados, and M. J. Medley, “Optimal signature design for spread-spectrum steganography,” IEEE Trans. Image Proc., vol. 16, pp. 391-405, Feb. 2007.