Authors: Anant M. Bagade; Sanjay N. Talbar
Addresses: Department of Information Technology, Pune Institute of Computer Technology, Pune-411043, Maharashtra, India ' Department of Electronics and Telecommunication, SGGS Institute of Engineering and Technology, Nanded-431606, Maharashtra, India
Abstract: Image data security over the internet is very important today. Steganography is a method of embedding data into the images. Image morphing is a process of generating intermediate images from one image to another. The concept of image morphing is used for image steganography to achieve the high embedding capacity and image security. Stego keys were generated during morphing process. These stego keys are destination cover image, number of bits used for steganography, a number of intermediate images and sequence number of intermediate images. These stage keys are needed to transfer the image data securely over the internet. Internet protocol header identification field is used for carrying these stego keys securely without changing the actual purpose of identification field. This paper presents the mechanism to transfer the morphed stego keys securely over the internet using IP steganography.
Keywords: morphed stego keys; internet security; internet protocol steganography; image security; secure transmission; IP steganography; image morphing.
International Journal of Information and Computer Security, 2014 Vol.6 No.2, pp.133 - 142
Received: 11 Jun 2013
Accepted: 11 Jan 2014
Published online: 15 Oct 2014 *