474 research outputs found

    HIGHLY EFFICIENT IMAGE STEGANOGRAPHY USING HAAR DWT FOR HIDING MISCELLANEOUS DATA

    Get PDF
    Protecting private data exchanged over the Internet, and who can access these data has become a growing privacy and confidentiality concern. Digital image steganography helps to conceal private data within a cover image to obtain a new cover, practically indistinguishable from the original, in such a way that unauthorized individuals cannot detect the presence of the concealed data in the new cover. Capacity size of the cover image and imperceptibility are therefore considered critical requirements to assess performance of steganography algorithms. This paper presents a highly efficient steganography algorithm that is capable of hiding a large size of miscellaneous data (such as text files, binary images, colored images or a combination of these data types) in a single cover image using Haar Wavelet transform. Details of the proposed embedding and extraction algorithms for different data types are presented and discussed. The performance of the proposed steganography method is assessed in terms of the capacity of the cover image, imperceptibility and robustness. The obtained experimental results and observations demonstrated that the developed algorithms are highly efficient in terms of the capacity size of the cover image while maintaining a relatively low mean square error (MSE), high peak signal-to-noise ratio (PSNR) and a reasonable robustness against various attacks

    A review and open issues of multifarious image steganography techniques in spatial domain

    Get PDF
    Nowadays, information hiding is becoming a helpful technique and fetch more attention due fast growth of using internet, it is applied for sending secret information by using different techniques. Steganography is one of major important technique in information hiding. Steganography is science of concealing the secure information within a carrier object to provide the secure communication though the internet, so that no one can recognize and detect it’s except the sender & receiver. In steganography, many various carrier formats can be used such as an image, video, protocol, audio. The digital image is most popular used as a carrier file due its frequency on internet. There are many techniques variable for image steganography, each has own strong and weak points. In this study, we conducted a review of image steganography in spatial domain to explore the term image steganography by reviewing, collecting, synthesizing and analyze the challenges of different studies which related to this area published from 2014 to 2017. The aims of this review is provides an overview of image steganography and comparison between approved studies are discussed according to the pixel selection, payload capacity and embedding algorithm to open important research issues in the future works and obtain a robust method

    A multi-task learning CNN for image steganalysis

    Get PDF
    Convolutional neural network (CNN) based image steganalysis are increasingly popular because of their superiority in accuracy. The most straightforward way to employ CNN for image steganalysis is to learn a CNN-based classifier to distinguish whether secret messages have been embedded into an image. However, it is difficult to learn such a classifier because of the weak stego signals and the limited useful information. To address this issue, in this paper, a multi-task learning CNN is proposed. In addition to the typical use of CNN, learning a CNN-based classifier for the whole image, our multi-task CNN is learned with an auxiliary task of the pixel binary classification, estimating whether each pixel in an image has been modified due to steganography. To the best of our knowledge, we are the first to employ CNN to perform the pixel-level classification of such type. Experimental results have justified the effectiveness and efficiency of the proposed multi-task learning CNN

    Data hiding techniques in steganography using fibonacci sequence and knight tour algorithm

    Get PDF
    The foremost priority in the information and communication technology era, is achieving an efficient and accurate steganography system for hiding information. The developed system of hiding the secret message must capable of not giving any clue to the adversaries about the hidden data. In this regard, enhancing the security and capacity by maintaining the Peak Signal-to-Noise Ratio (PSNR) of the steganography system is the main issue to be addressed. This study proposed an improved for embedding secret message into an image. This newly developed method is demonstrated to increase the security and capacity to resolve the existing problems. A binary text image is used to represent the secret message instead of normal text. Three stages implementations are used to select the pixel before random embedding to select block of (64 × 64) pixels, follows by the Knight Tour algorithm to select sub-block of (8 × 8) pixels, and finally by the random pixels selection. For secret embedding, Fibonacci sequence is implemented to decomposition pixel from 8 bitplane to 12 bitplane. The proposed method is distributed over the entire image to maintain high level of security against any kind of attack. Gray images from the standard dataset (USC-SIPI) including Lena, Peppers, Baboon, and Cameraman are implemented for benchmarking. The results show good PSNR value with high capacity and these findings verified the worthiness of the proposed method. High complexities of pixels distribution and replacement of bits will ensure better security and robust imperceptibility compared to the existing systems in the literature

    A Review of Image Steganography Techniques

    Get PDF
    اخفاء الصور هو أحد تقنيات تأمين البيانات كصورة غلاف. من ناحية أخرى ، نظرًا لأن الاتصالات السرية وتطوير محتويات الوسائط المتعددة ، يعكس الاختزال للتقنيات أدوارًا مهمة. تعد جودة صورة الغلاف  "stego "وقدرة صورة الغلاف جانبًا مهمًا في نظامstegnography ، ويعتمد تقييم الأداء ومقارنة التقنيات على هذه المعلمات في نظام إخفاء المعلومات. هناك تقنيات تضمين موجودة تهدف إلى حماية المعلومات ، ومعدل تضمين البت الأعلى يمثل تحديًا مهمًا في تصميم نظام إخفاء المعلومات. تسلط هذه الورقة الضوء على مراجعة الأدبيات لنهج المجال المكاني للتصنيف (الاعتماد على قيمة البكسل) لإخفاء الصور ؛ و شمل ، (1) إخفاء العلومات باستخدام طريقة  LSB ، (2) إخفاء المعلومات باستخدام طريقة PVD ، (3) إخفاء المعلومات باستخدام طريقة GLM ، (4) إخفاء المعلومات باستخدام طريقة PPM الهدف من هذه الورقة هو توفير ملخص شامل للأعمال الموجودة من حيث الهدف ، وتسليط الضوء على نقاط القوة والضعف في التقنيات الحالية.Image steganography is one in  techniques of securing data as a cover image. In the other hand, since secret communications and development of multimedia contents, stenography of the techniques  reflect important roles. In based are reflected stegnography system, the quality of stego image and the capacity of the cover image are important side of the image, evaluate performance and comparison of  techniques are depending on these parameters in steganography system. There are existing embedding techniques that aim to protect information, and a higher bit embedding rate is an important challenge in designing a steganographic system.  This paper highlights a literature review of the classification spatial domain (beads on pixel value) approach  of image steganography; include, (i) LSB steganography, (ii) PVD based steganography, (iii)GLM based steganography, (iv) PPM based steganography. The goal of this paper is to supply a comprehensive summary of  existing works in terms of ideals, and to highlight the strong and weak points of current  techniques

    Design and simulation a video steganography system by using FFT­turbo code methods for copyrights application

    Get PDF
    Protecting information on various communication media is considered an essential requirement in the present information transmission technology. So, there is a continuous search around different modern techniques that may be used to protect the data from the attackers. Steganography is one of those techniques that can be used to maintain the copyright by employing it to cover the publisher logo image inside the video frames. Nowadays, most of the popular known of the Video-Steganography methods become a conventional technique to the attacker, so there is a requirement for a modern and smart strategy to protect the copyright of the digital video file. Where this proposed system goal to create a hybrid system that combines the properties of Cryptography and Steganography work to protect the copyright hidden data from different attack types with maintaining of characteristics of the original video (quality and resolution). In this article, a modern Video-Steganography method is presented by employing the benefits of TC (Turbo code) to encrypt the pixels of logo image and Least two Significant Bit Technique procedure to embed the encryption pixels inside the frames of the video file. The insertion is performed in the frequency domain by applying the Fast Fourier Transform (FFT)on the video frames. The examination of the suggested architecture is done by terms of Structural Similarity Index, MSE (mean squared error), and PSNR (peak signal-to-noise ratio) by comparing between an original and extracted logo as well as between original and Steganographic video (averaged overall digital frames in the video). The simulation results show that this method proved high security, robustness, capacity and produces a substantial performance enhancement over the present known ways with fewer distortions in the quality of the vide
    corecore