Study of HSV Color Space Deviations and Histograms in Image Steganography
|
International Journal of Computer Trends and Technology (IJCTT) | |
© 2015 by IJCTT Journal | ||
Volume-23 Number-4 |
||
Year of Publication : 2015 | ||
Authors : Pankaj Sambyal | ||
DOI : 10.14445/22312803/IJCTT-V23P131 |
Pankaj Sambyal "Study of HSV Color Space Deviations and Histograms in Image Steganography". International Journal of Computer Trends and Technology (IJCTT) V23(4):151-154, May 2015. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.
Abstract -
Image Steganography is the process of hiding a secret
image inside a cover image file to produce a fused image called
stego image, so that the secret image cannot be recognized or
recovered by unauthorized recipients. But in the process of
Steganography, the cover image undergoes changes in several
image parameters e.g. HSV (Hue-Saturation-Value), color, hue,
brightness, saturation, quality, etc. The changes in HSV value
depends majorly on the color changes. These changes can
considerably distort the cover image to the extent where it may
defy the purpose of the whole process which is to conceal
information without raising suspicions. The present paper tries
to analyze the effect of Steganography process on the cover
image and study the various differences between the cover image
before and after the process. The various histograms of different
image parameters are also discussed. After that, performance is
measured in terms of PSNR and mean deviation to study the
amount of deterioration caused by Steganography process.
References
[1] Tai W. and Chang C., (2009 ). “Data hiding based On VQ Compressed
Images Using Hamming Codes And Declustering”, International
Journal of Innovative Computing, Information and Control, Vol 5, No
7, ISSN 1349-4198.
[2] ZAMANI M . ,(2010) . “Genetic Based Substitution techniques For
Audio Steganography ”, PHD thesis , University Teknologi Malaysia.
[3] Malini Mohan and Anurenjan P.R (2011). “A New Algorithm for Data
Hiding in Images using Contourlet Transform”, 978-1-4244- 9477-
4/11/ IEEE .
[4] Saeed Masaebi et al., (2012 ). “A New Approach for Image Hiding
Based on Contourlet Transform”, International Journal of Electrical
and Computer Engineering (IJECE) Vol.2, No.5, ISSN: 2088-8708 .
[5] Rubab S. and Younus M.,(2012), “Improve Image Steganography
Technique for Colored Images using Huffman Encoding with Symlet
Wavelets”, IJCSI International Journal of Computer Science Issues,
Vol. 9, Issue 2, No 1,ISSN (Online): 1694-0814.
[6] Chang C. et al., (2002) . “A steganographic method based upon JPEG
and quantization table modification”, Intelligent Multimedia
[7] Computing and Networking Atlantic City, NJ, USA , Vol_ 141.
[8] YANG W. and CHEN L. ,(2008)." A Novel Steganography Method
Via Various Animation Effects In Powerpoint Files ", Proceedings of
the Seventh International Conference on Machine Learning and
Cybernetics, Kunming, 12-15 .
[9] Sudeep P.V. et al., (2009). “ A Novel DatahidingMethod in Spatial
Domain”, 10th National Conference on Technological Trends
(NCTT09) . [11]Sarmah D. and Bajpai N. , (2010) .“Proposed System
for Data Hiding Using Cryptography and Steganography
“ ,International Journal of Computer Applications (0975 – 8887)
Volume 8– No.9.
[10] Suma Christal Mary S.,(2010), “Improved ProtectionIn Video
Steganography Used Compressed Video Bitstreams” , IJCSE)
[11] Khalil Ibraheem Al - Saif and Ahmed S. Abdullah, “Color Image
Enhancement Based on Contourlet”
[12] “Transform Coefficients” Australian Journal of Basic and Applied
Sciences, 7(8): 207 213, 2013.
[13] Neil F. Johnson and Sushil Jajodia, “Steganalysis: The Investigation of
Hidden Information”, IEEE Information Technology Conference,
Syracuse, New York, USA, September 1st - 3rd, 1998.
[14] Sushil Kumar and S.K.Muttoo (2011), “Steganography based on
Contourlet Transform”, (IJCSIS) International Journal of Computer
Science and Information Security, Vol. 9, No. 6.
[15] Ankita Gangwar, Vishal shrivastava."Improved RGB -LSB
Steganography Using Secret Key"International Journal of Computer
Trends and Technology (IJCTT),V4(2):85-89 Issue 2013 .ISSN 2231-
2803.www.ijcttjournal.org. Published by Seventh Sense Research
Group.
[16] Sunila Godara , Megha Ranolia , Vanita Rawal"Comparative Study of
Image Steganography Techniques"International Journal of Computer
Trends and Technology (IJCTT),V4(6):1792-1796 June Issue
2013 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh
Sense Research Group.
Keywords
Steganography, histogram, steganalysis, HSV, HSB,
color saturation