Title: Secure transmission of morphed stego keys over internet using IP steganography

Authors: Anant M. Bagade; Sanjay N. Talbar

Addresses: Department of Information Technology, Pune Institute of Computer Technology, Pune-411043, Maharashtra, India ' Department of Electronics and Telecommunication, SGGS Institute of Engineering and Technology, Nanded-431606, Maharashtra, India

Abstract: Image data security over the internet is very important today. Steganography is a method of embedding data into the images. Image morphing is a process of generating intermediate images from one image to another. The concept of image morphing is used for image steganography to achieve the high embedding capacity and image security. Stego keys were generated during morphing process. These stego keys are destination cover image, number of bits used for steganography, a number of intermediate images and sequence number of intermediate images. These stage keys are needed to transfer the image data securely over the internet. Internet protocol header identification field is used for carrying these stego keys securely without changing the actual purpose of identification field. This paper presents the mechanism to transfer the morphed stego keys securely over the internet using IP steganography.

Keywords: morphed stego keys; internet security; internet protocol steganography; image security; secure transmission; IP steganography; image morphing.

DOI: 10.1504/IJICS.2014.065164

International Journal of Information and Computer Security, 2014 Vol.6 No.2, pp.133 - 142

Received: 11 Jun 2013
Accepted: 11 Jan 2014

Published online: 15 Oct 2014 *

Full-text access for editors Access for subscribers Purchase this article Comment on this article