Research Journal of Information Technology1815-74322151-7959Academic Journals Inc.10.3923/rjit.2013.383.392AmirtharajanR.RajeshV.ArchanaP.RayappanJ.B.B.3201353The last few decades have seen a tremendous growth in computing machines as
well as the digital information with internet expansion. The transmission and
storage of this huge volume of information is a high priority issue and has
lead to the evolvement of information hiding and cryptographic techniques. Cryptography
scrambles the message to be transmitted safely and different key sizes implement
different security levels. Steganography is an information hiding technique
and embeds the information in undetectable files like images or texts such that
their very presence is not detected with the naked eyes. Cryptography and steganography
have their own advantages and disadvantages and though each is resistant to
attacks in their own ways, a combination of both results in a better cryptosystem
and is a chief domain of research these days. Completely different from other
methods, this paper makes use of the basic traits of statistical distribution
given by mean and standard deviation; the basic building block for this paper.
Embedding is done by adopting LSB substitution and PI. Bits to be infixed are
decided by some prerequisites for increasing ramification. Justification for
this algorithm is given by rudimentary of images along with bits per pixel and
capacity of embedding. This paper promises high security and enhanced robustness
as well.]]>Abdulfetah, A.A., X. Sun, H. Yang and N. Mohammad,2010Al-Azawi, A.F. and M.A. Fadhil,2010Al-Frajat, A.K., H.A. Jalab, Z.M. Kasirun, A.A. Zaidan and B.B. Zaidan,2010Amirtharajan, R., R.R. Subrahmanyam, P.J.S. Prabhakar, R. Kavitha and J.B.B. Rayappan,2011Amirtharajan, R. and J.B.B. Rayappan,2012Amirtharajan, R. and J.B.B. Rayappan,2012Amirtharajan, R. and J.B.B. Rayappan,2012Amirtharajan, R. and J.B.B. Rayappan,2012Amirtharajan, R., J. Qin and J.B.B. Rayappan,2012Bender, W., D. Gruhl, N. Morimoto and A. Lu,1996Chan, C.K. and L.M. Cheng,2004Cheddad, A., J. Condell, K. Curran and P. McKevitt,2010El-Safy, R.O., H.H. Zayed and A. EI-Dessouki,2009Gutub, A.A.A.,2010Hmood, A.K., B.B. Zaidan, A.A. Zaidan and H.A. Jalab,2010Hmood, A.K., H.A. Jalab, Z.M. Kasirun, B.B. Zaidan and A.A. Zaidan,2010Janakiraman, S., R. Amirtharajan, K. Thenmozhi and J.B.B. Rayappan,2012Janakiraman, S., R. Amirtharajan, K. Thenmozhi and J.B.B. Rayappan,2012Luo, H., Z. Zhao and Z.M. Lu,2011Mohammad, N., X. Sun and H. Yang,2011Padmaa, M., Y. Venkataramani and R. Amirtharajan,2011n: 1 Platform for users and embedding.]]>Rajagopalan, S., R. Amirtharajan, H.N. Upadhyay and J.B.B. Rayappan,2012Salem, Y., M. Abomhara, O.O. Khalifa, A.A. Zaidan and B.B. Zaidan,2011Schneier, B.,2007Stefan, K. and A. Fabin,2000Thanikaiselvan, V., P. Arulmozhivarman, R. Amirtharajan and J.B.B. Rayappan,2011Thanikaiselvan, V., S. Kumar, N. Neelima and R. Amirtharajan,2011Thenmozhi, K., P. Praveenkumar, R. Amirtharajan, V. Prithiviraj, R. Varadarajan and J.B.B. Rayappan,2012Xiang, L., X. Sun, Y. Liu and H. Yang,2011Zaidan, B.B., A.A. Zaidan, A.K. Al-Frajat and H.A. Jalab,2010Zanganeh, O. and S. Ibrahim,2011Zeki, A.M., A.A. Manaf and S.S. Mahmod,2011Zhao, Z. and H. Luo,2012Zhu, J., R.D. Wang, J. Li and D.Q. Yan,2011