Object Oriented Steganography using Skin Tone Detection and RSA Encryption Scheme
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Research Paper | Computer Science & Engineering | India | Volume 2 Issue 2, February 2013

Object Oriented Steganography using Skin Tone Detection and RSA Encryption Scheme

Aruna Mittal

Steganography is the science that involves communicating secret data in an appropriate multimedia carrier, e.g., image, audio and video files. While cryptography scrambles the secret message to render it unintelligible, on the other hand Steganography hides the very existence of secret data. Thus Steganography does not replace cryptography but rather boosts the security using its obscurity features. Its main objectives are undetectability, robustness, resistance to various image processing methods, compression, and payload capacity. These unique features separate it from other related techniques such as watermarking and cryptography. The proposed work investigates current state-of-the-art methods and provides a new and efficient approach to digital image steganography. It also establishes a robust steganographic system called Steganoflage. Steganoflage advocates an object-oriented approach in which skin-tone detected areas in the image are selected for embedding where possible. The key objectives of the work are: 1) RSA and OAEP Encryption of the secret text message, 2) HSV model based skin-tone detection algorithm using wavelet domain. Each of these components is tested against relevant performance measurements. The results are promising and provide satisfactory PSNR against various image manipulations and noises such as Poisson, Gaussian, Speckle, Salt and Pepper, and transformations such as rotation, scaling etc.

Keywords: Cropping, Gaussian, HSV, OAEP, Poisson, PSNR, RSA, Skin tone detection, Stego Image

Edition: Volume 2 Issue 2, February 2013

Pages: 59 - 66

Share this Article

How to Cite this Article?

Aruna Mittal, "Object Oriented Steganography using Skin Tone Detection and RSA Encryption Scheme", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=IJSRON2013424, Volume 2 Issue 2, February 2013, 59 - 66

59 PDF Views | 63 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Cropping'

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1856 - 1858

A Review On Digital Video Watermarking Using DWT

Shweta Sharma, Sarika Chaudhary

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2228 - 2235

SMART: Saliency Map, Moments and Texture Features for Robust Image Authentication

Derroll David, Divya B, Pournami

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1132 - 1134

An Improvement on the Security of Odd-Even-LSB Based Steganography by Adding Encryption

Ayda Alizadeharasi, Maryam Safaei Rizi

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 994 - 997

Content Based Image Retrieval: Bone Age Assessment

Manjula Gururaj H, Dr. G. S. Nagaraja

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 1625 - 1628

A Hybrid Non Blind Video Watermarking Scheme Based on DWPT and PCA

Shital Khaparde, Shanta Sondor

Share this Article

Similar Articles with Keyword 'Gaussian'

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 10, October 2020

Pages: 286 - 290

Evolving One Touch Parking Reservation System

Chinmay Ashtikar, Abhishek Naik, Alim Manjiyani, Sankalp Awasthi

Share this Article

Research Paper, Computer Science & Engineering, China, Volume 9 Issue 4, April 2020

Pages: 1544 - 1554

Recent Developments on Probabilistic Graphical Model Applied in Data Analysis

Kan'Sam Nadjak, Guisheng Yin

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1907 - 1913

Human Gait Recognition Using Multisvm Classifier

Saranya Sasidharan, Smitha K S, Minu Thomas

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 538 - 541

Simplified Filtering Technique to Edge Reconstruction and Comparison of Original Image in Low to High Density Noise Values

Dr. N. Naveen Kumar, K. Chandra Sekhar, K. Chokkanathan

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 517 - 521

Implementation of Digital Signature Verification Using Relative Slope Algorithm

P. N. Ganorkar, Kalyani Pendke, Hemant Turkar

Share this Article

Similar Articles with Keyword 'HSV'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2577 - 2580

Clothing Pattern Recognition for Blind using SURF and combined GLCM, Wavelet

Manisha Dhongade

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 2161 - 2168

Vision Based Fire Flame Detection System Using Optical flow Features and Artificial Neural Network

Anila R. Kurup

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 85 - 87

Survey Paper of Indian Sign Language Gesture System Weighted Euclidean Distance Based

Er. Vandana Soni, Dr. Tripti Arjariya

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1279 - 1284

A Fast HSV Image Color and Texture Detection and Image Conversion Algorithm

Monika Deswal, Neetu Sharma

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 830 - 834

Dip and Dump Communication Gesture System by Cityblock Method

Er. Vandana Soni, Varsha Namdeo, Dr. Tripti Arjariya

Share this Article

Similar Articles with Keyword 'Poisson'

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013

Pages: 551 - 553

Information Retrieval using Poisson Query Generation Model

S. Vasanthakumar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1208 - 1212

Impact and Analysis of Improved Bilateral Filter on TEM Images

Garima Goyal

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1273 - 1278

Image Forgery Localization via CFA Based Feature Extraction and Poisson Matting

Priyanka Prasad

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 4, April 2014

Pages: 409 - 412

A Novel Approach on Mining Frequent Item Sets on Large Uncertain Databases

R. Manimegalai, D. Dhanabagyam

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016

Pages: 1946 - 1949

Survey of Noise in Image and Efficient Technique for Noise Reduction

Arti Singh, Madhu

Share this Article

Similar Articles with Keyword 'PSNR'

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 1330 - 1335

Efficient Image Encryption EIE - Compression System Using Haar Wavelets Using Matlab

Kavita, Anil Vadhwa

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3075 - 3078

Secret Data Hiding in Compressed Video Bit Streams for Privacy Information Protection

B. Vengadalakshmi, S. Abiramasundari

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 538 - 541

Simplified Filtering Technique to Edge Reconstruction and Comparison of Original Image in Low to High Density Noise Values

Dr. N. Naveen Kumar, K. Chandra Sekhar, K. Chokkanathan

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1538 - 1540

Survey on Optimization of Fractal Image Compression

Er. Awdhesh Kumari, Dr. Shaveta Rani, Dr. Paramjeet Singh

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 2124 - 2127

Medical Image Compression Using ISPIHT & JPEG2000 Hybrid

Yashpreet Sain

Share this Article

Similar Articles with Keyword 'RSA'

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 759 - 761

Empirical Study of Fake Reviews Detection of Online Reviews from E-Commerce Website

Phani K. Cheruku, Atul Kumar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 8, August 2020

Pages: 571 - 574

Second-Generation Digital Mobile Telephone Standard using a Variation of Time Division Multiple Access (TDMA)

Manjushree T L

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2386 - 2390

GMFAD and CDAL-M Models for Identification of Adversary Attacks in Wireless Sensor Network using RSS

Santosh S. Doifode, D. C. Mehetre

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2242 - 2246

Efficient and Secure Auditing of Cloud Data with Key -Updating

Niranjana S, Manjusha M S

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 2011 - 2014

Attack Detection and Mitigation for AGC

Pooja A Kulkarni, Harshal A Karande

Share this Article

Similar Articles with Keyword 'Stego Image'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 2281 - 2284

Hiding Image in Image Using LSB Insertion Method with Improved Security and Quality

Mekha Jose

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1175 - 1178

Steganographic Method of Data Hiding using JPEG Images

Shabana Vathelil Subair, Fathima A Muhammadali

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1773 - 1778

Image Steganography Scheme Using Neural Network in Wavelet Transform Domain

Anamika Sharma, Ajay Kushwaha

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 6, June 2017

Pages: 1082 - 1085

Secure Image Transmission using Cipher Block Chaining Mode & Visual Steganography

Manoj Dhande, Arjun Mudaliyar, Vineeta Pandey, Pranali Dalvi

Share this Article

Research Paper, Computer Science & Engineering, Iraq, Volume 6 Issue 8, August 2017

Pages: 1767 - 1769

New Steganography Technique

Shahbaa Mohammed

Share this Article
Top