alexa
Reach Us +441414719275
Efficient Hybrid Image Steganography Based On Pattern Matching | 26625
ISSN: 0974-7230

Journal of Computer Science & Systems Biology
Open Access

Like us on:

OMICS International organises 3000+ Global Conferenceseries Events every year across USA, Europe & Asia with support from 1000 more scientific Societies and Publishes 700+ Open Access Journals which contains over 50000 eminent personalities, reputed scientists as editorial board members.

Open Access Journals gaining more Readers and Citations
700 Journals and 15,000,000 Readers Each Journal is getting 25,000+ Readers

This Readership is 10 times more when compared to other Subscription Journals (Source: Google Analytics)
All submissions of the EM system will be redirected to Online Manuscript Submission System. Authors are requested to submit articles directly to Online Manuscript Submission System of respective journal.

Efficient hybrid image steganography based on pattern matching

International Conference on Big Data Analysis and Data Mining

Abdul Qadir

Posters-Accepted Abstracts: J Comput Sci Syst Biol

DOI: 10.4172/0974-7230.S1.012

Abstract
Steganographic techniques today are widely used for securing secret information. File types like image, audio, video and text are used for hiding secret information using steganographic techniques. A number of steganographic techniques are available in literature in which least significant bit (LSB) techniques are the most common. In this paper a new technique is demonstrated in which most significant bits (MSB) of pixels are taken into account for hiding secret data bit. In this technique secret data bits are arranged in pairs of two and similarly bits representing pixels are also arranged in pairs. For this purpose the 7th and 6th bits, 6th and 5th bits, 5th and 4th bits, 4th and 3rd bits are arranged to make pairs. The corresponding pairs are numbered as 3rd pair (7th and 6th), 2nd pair (6th and 5th), 1st pair (5th and 4th) and 0th pair (4th and 3rd). For each embedding the secret data bits pair is compared with the pairs of pixel bits and embedding is done on the basis of similarity between pairs. If no similarity is found in pairs then secret data pairs is embedded in 0th pair of pixel bits. The proposed technique ensures significant signal to noise ratio and is more secure than the existing techniques as the attackers mostly target the least significant bits of pixel for extracting secret information and focuses less on most significant bits.
Biography
Abdul Qadir has received his Master of Computer Science Degree from Comsats Institute of Information Technology Abbottabad, Pakistan in 2004 and is currently enrolled in MS (CS) at the Department of Information Technology Hazara University, Pakistan. He is also serving as a Visiting Lecturer in IT Department Hazara University Garden Campus Mansehra, Pakistan. His research interests include image processing, network security and computer networks.
Top