Research Paper | Computer Science & Engineering | India | Volume 2 Issue 2, February 2013
Object Oriented Steganography using Skin Tone Detection and RSA Encryption Scheme
Abstract: Steganography is the science that involves communicating secret data in an appropriate multimedia carrier, e. g. , image, audio and video files. While cryptography scrambles the secret message to render it unintelligible, on the other hand Steganography hides the very existence of secret data. Thus Steganography does not replace cryptography but rather boosts the security using its obscurity features. Its main objectives are undetectability, robustness, resistance to various image processing methods, compression, and payload capacity. These unique features separate it from other related techniques such as watermarking and cryptography. The proposed work investigates current state-of-the-art methods and provides a new and efficient approach to digital image steganography. It also establishes a robust steganographic system called Steganoflage. Steganoflage advocates an object-oriented approach in which skin-tone detected areas in the image are selected for embedding where possible. The key objectives of the work are: 1) RSA and OAEP Encryption of the secret text message, 2) HSV model based skin-tone detection algorithm using wavelet domain. Each of these components is tested against relevant performance measurements. The results are promising and provide satisfactory PSNR against various image manipulations and noises such as Poisson, Gaussian, Speckle, Salt and Pepper, and transformations such as rotation, scaling etc.
Keywords: Cropping, Gaussian, HSV, OAEP, Poisson, PSNR, RSA, Skin tone detection, Stego Image
Edition: Volume 2 Issue 2, February 2013,
Pages: 59 - 66
How to Cite this Article?
Aruna Mittal, "Object Oriented Steganography using Skin Tone Detection and RSA Encryption Scheme", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=IJSRON2013424, Volume 2 Issue 2, February 2013, 59 - 66
How to Share this Article?
Similar Articles with Keyword 'Cropping'
SMART: Saliency Map, Moments and Texture Features for Robust Image Authentication
Derroll David, Divya B, Pournami
A Review On Digital Video Watermarking Using DWT
Shweta Sharma, Sarika Chaudhary
Similar Articles with Keyword 'Gaussian'
Review on Deep Learning and IoT Techniques on Corono Virus
Recent Developments on Probabilistic Graphical Model Applied in Data Analysis
Kan'Sam Nadjak, Guisheng Yin
Similar Articles with Keyword 'HSV'
Vision Based Fire Flame Detection System Using Optical flow Features and Artificial Neural Network
Anila R. Kurup
Clothing Pattern Recognition for Blind using SURF and combined GLCM, Wavelet
Similar Articles with Keyword 'Poisson'
Image Forgery Localization via CFA Based Feature Extraction and Poisson Matting
Survey of Noise in Image and Efficient Technique for Noise Reduction
Arti Singh, Madhu
Similar Articles with Keyword 'PSNR'
Colour Extended Visual Cryptography based on MKGED
T. Anuradha, Dr. K. Usha Rani
An Efficient Method for Image Denoising Using Orthogonal Wavelet Transform
Akshata S Kori, Manjunatha A S.
Similar Articles with Keyword 'RSA'
A Brief Survey and Examination of Various Searching Techniques
Cherukuri Nischay Sai
A Survey on the Applications of Generative Adversarial Networks
Ashish Roy, Dr. B. G. Prasad
Similar Articles with Keyword 'Stego Image'
Steganographic Method of Data Hiding using JPEG Images
Shabana Vathelil Subair, Fathima A Muhammadali
Authentication of Colored Document Image with Data Repair Capability
Pradnya Kadam, Nishigandha Khandagale, Poonam Yadav