Title: A new methodology for data coding and embedding for high-capacity transmitting

Authors: Rajesh Kumar Tiwari, G. Sahoo

Addresses: Department of Computer Science and Engineering, GLNA Institute of Technology, Mathura, Uttar Pradesh, India. ' Department of Information Technology, BIT Mesra, Ranchi, Jharkhand, India

Abstract: The rapid development of internet opened up unlimited opportunities in the field of computing. However, it brought about a plethora of new issues and concerns, chief among them is the security of information that to be exchanged. Developing information hiding techniques have been seriously taken by many researchers, steganography, the science of embedding secret information into carrier image file is one of the main concern. In the current digital era, the steganographic methods may participate in the field of ultra wideband wireless communication, but the major hurdles is the pre-existing carrier with low embedding capacity. If we create the carrier file based on the transmitting message that will help us in two aspects, first it saves the bandwidth and second it maintains the utmost security as well. Unlike the other steganographic efforts, where data embedding in carrier file works in the principle of pre-existing carrier file, we propose here a method that works on the principle of creating its own carrier file based on the transmitting message. The major advantage of this approach is that there is never a mother carrier file created or exits in order to give a chance to other concerned to suspect the hiding of any secret file and at the same time, we utilise the minimum bandwidth with maximum security protection.

Keywords: steganography; stego images; cover medium; stego key; carrier files; SIC; stego image creator; SDV; secret data viewer; data coding; embedded data; high-capacity transmission; information hiding; information security; electronic security.

DOI: 10.1504/IJESDF.2010.032329

International Journal of Electronic Security and Digital Forensics, 2010 Vol.3 No.1, pp.27 - 40

Available online: 31 Mar 2010 *

Full-text access for editors Access for subscribers Purchase this article Comment on this article