Journal of Information Security

Volume 3, Issue 3 (July 2012)

ISSN Print: 2153-1234   ISSN Online: 2153-1242

Google-based Impact Factor: 3.79  Citations  

A New Steganography Method Based on the Complex Pixels

HTML  XML Download Download as PDF (Size: 1360KB)  PP. 202-208  
DOI: 10.4236/jis.2012.33025    4,532 Downloads   8,143 Views  Citations

ABSTRACT

Today steganography has attracted the attention of many researchers. In this paper, we propose a new steganography method for secure Data communication on half tone pictures. Using the halftone pictures improve the security and capacity. In this method, the complexity of every pixel in picture is computed, then a neibourhood is defined to compute the complexity of every pixel, and then the complexity of every pixel is computed in the neibourhood. Placing data in the monotonous areas of halftone can explain the presence of hidden data. A method has been represented that surveys the position of every pixel neibouring others and prevents including in monotonous areas. If that was a complicated one, steganography bit after stonehalf will be hidden after scrolling the whole, the process of spreading error will be done. Performing the suggested method improves the quality of placing picture and increases its security.

Share and Cite:

A. Hashemi Pour and A. Payandeh, "A New Steganography Method Based on the Complex Pixels," Journal of Information Security, Vol. 3 No. 3, 2012, pp. 202-208. doi: 10.4236/jis.2012.33025.

Cited by

[1] An adaptive multi bit-plane image steganography using block data-hiding
Multimedia Tools and Applications, 2015
[2] Effective Parameters of Image Steganography Techniques
International Journal of Computer Applications Technology and Research, 2014
[3] Distributed Addressing Protocol for Node Auto configuration in Ad Hoc Networks using Bloom Filters
International Journal of Computer Applications Technology and Research, 2014
[4] A Secure Block Permutation Image Steganography Algorithm
2013
[5] A Novel Steganography with Preserving Statistical Properties
IJCSI International Journal of Computer Science Issues, 2013
[6] A Secure Block Permutation Image Teganography Algorithm
International Journal on Cryptography and Information Security (IJCIS), 2013

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.