47 research outputs found

    Applications of Difital Image Stegnographic Techniques in Medical Image Analysis

    Get PDF
    In this digitized world maintaining the security of the secret information is a challenging task. While, sending secret information through the internet draws the attention of hackers.  The highly authenticated information can be hidden by using Steganography. Image processing plays a very important role in such stenographic techniques. The advantage of stenography can be enhanced to medical images and creation of database for a particular patient under one authentication with security. Steganography techniques used in bio-medical field to hide the person medical data like prescription, X-ray, Iris, MRI, CT scan images behind a single cover media. In this paper the embedding Schemes to store complete medical data under one authentication is done by using Spatial and transform domains. The performance of the techniques is compared and the best method to hide medical information by using steganographic techniques with high PSNR, less MSE and high SSIM is identified for different modalities. Implementation of steganography in bio-medical field yields high imperceptibility and embedding capacit

    STEGANOGRAPHIC METHODS

    Get PDF
    In this paper we analyze and test several steganographic techniques on still images. We show that embedding a large amount of data into the picture it can modify its visible properties. We compare the RSA and the elliptic curve (ECC) based digital signatures, and we analyze their advantages and disadvantages in steganography. In steganography it is important that the embedded data size should be minimized. Using ECC minimization of the embedded information is possible, because the minimal block size is smaller than in the case of RSA

    Application of Stochastic Diffusion for Hiding High Fidelity Encrypted Images

    Get PDF
    Cryptography coupled with information hiding has received increased attention in recent years and has become a major research theme because of the importance of protecting encrypted information in any Electronic Data Interchange system in a way that is both discrete and covert. One of the essential limitations in any cryptography system is that the encrypted data provides an indication on its importance which arouses suspicion and makes it vulnerable to attack. Information hiding of Steganography provides a potential solution to this issue by making the data imperceptible, the security of the hidden information being a threat only if its existence is detected through Steganalysis. This paper focuses on a study methods for hiding encrypted information, specifically, methods that encrypt data before embedding in host data where the ‘data’ is in the form of a full colour digital image. Such methods provide a greater level of data security especially when the information is to be submitted over the Internet, for example, since a potential attacker needs to first detect, then extract and then decrypt the embedded data in order to recover the original information. After providing an extensive survey of the current methods available, we present a new method of encrypting and then hiding full colour images in three full colour host images with out loss of fidelity following data extraction and decryption. The application of this technique, which is based on a technique called ‘Stochastic Diffusion’ are wide ranging and include covert image information interchange, digital image authentication, video authentication, copyright protection and digital rights management of image data in general

    Conditional Entrench Spatial Domain Steganography

    Get PDF
    Steganography is a technique of concealing the secret information in a digital carrier media, so that only the authorized recipient can detect the presence of secret information. In this paper, we propose a spatial domain steganography method for embedding secret information on conditional basis using 1-Bit of Most Significant Bit (MSB). The cover image is decomposed into blocks of 8*8 matrix size. The first block of cover image is embedded with 8 bits of upper bound and lower bound values required for retrieving payload at the destination. The mean of median values and difference between consecutive pixels of each 8*8 block of cover image is determined to embed payload in 3 bits of Least Significant Bit (LSB) and 1 bit of MSB based on prefixed conditions. It is observed that the capacity and security is improved compared to the existing methods with reasonable PSNR

    Performance evaluation measurement of image steganography techniques with analysis of LSB based on variation image formats

    Get PDF
    Recently, Steganography is an outstanding research area which used for data protection from unauthorized access. Steganography is defined as the art and science of covert information in plain sight in various media sources such as text, images, audio, video, network channel etc. so, as to not stimulate any suspicion; while steganalysis is the science of attacking the steganographic system to reveal the secret message. This research clarifies the diverse showing the evaluation factors based on image steganographic algorithms. The effectiveness of a steganographic is rated to three main parameters, payload capacity, image quality measure and security measure. This study is focused on image steganographic which is most popular in in steganographic branches. Generally, the Least significant bit is major efficient approach utilized to embed the secret message. In addition, this paper has more detail knowledge based on Least significant bit LSB within various Images formats. All metrics are illustrated in this study with arithmetical equations while some important trends are discussed also at the end of the paper

    Strengthening steganoghraphy by using crow search algorithm of fingerprint image

    Get PDF
    In image steganography, secret communication is implemented to hide secret information into the cover image (used as the carrier to embed secret information) and generate a stego-image (generated image carrying hidden secret information).Nature provides many ideas for computer scientists. One of these ideas is the orderly way in which the organisms work in nature when they are in groups. If the group itself is treated as an individual (the swarm), the swarm is more intelligent than any individual in the group. Crow Search Algorithm (CSA) is a meta-heuristic optimizer where individuals emulate the intelligent behavior in a group of crows. It is based on simulating the intelligent behavior of crow flocks and attempts to imitate the social intelligence of a crow flock in their food gathering process. This paper presents a novel meta-heuristic approach based on the Crow Search Algorithm (CSA), where at the beginning the color cover image is converted into three channels (RGB) and then those channels are converted into three spaces, which are Y, Cb, Cr. After applying Discrete wavelet transform (DWT) on each space separately, the CSA algorithm is used on each space (YCbCr) to find the best location that will be used to hide secret information, the CSA is used to increase the security force by finding the best locations that have high frequency and are invulnerable to attacks, the DWT is used to increase robustness against noise. The proposed system is implemented on three fingerprint cover images for experiments, for the quality of stego image the histogram, Mean Squared Error (MSE), Peak Signal-to-Noise Ratio (PSNR), Number of Pixel Change Rate Test (NPCR), Structural Similarity Index Metric (SSIM) and Correlation Coefficients (CC) are computed. The result demonstrated the strength of the CSA to hide data, also discovered that using CSA may lead to finding favorable results compared to the other algorithm

    Strengthening steganoghraphy by using crow search algorithm of fingerprint image

    Get PDF
    In image steganography, secret communication is implemented to hide secret information into the cover image (used as the carrier to embed secret information) and generate a stego-image (generated image carrying hidden secret information).Nature provides many ideas for computer scientists. One of these ideas is the orderly way in which the organisms work in nature when they are in groups. If the group itself is treated as an individual (the swarm), the swarm is more intelligent than any individual in the group. Crow Search Algorithm (CSA) is a meta-heuristic optimizer where individuals emulate the intelligent behavior in a group of crows. It is based on simulating the intelligent behavior of crow flocks and attempts to imitate the social intelligence of a crow flock in their food gathering process. This paper presents a novel meta-heuristic approach based on the Crow Search Algorithm (CSA), where at the beginning the color cover image is converted into three channels (RGB) and then those channels are converted into three spaces, which are Y, Cb, Cr. After applying Discrete wavelet transform (DWT) on each space separately, the CSA algorithm is used on each space (YCbCr) to find the best location that will be used to hide secret information, the CSA is used to increase the security force by finding the best locations that have high frequency and are invulnerable to attacks, the DWT is used to increase robustness against noise. The proposed system is implemented on three fingerprint cover images for experiments, for the quality of stego image the histogram, Mean Squared Error (MSE), Peak Signal-to-Noise Ratio (PSNR), Number of Pixel Change Rate Test (NPCR), Structural Similarity Index Metric (SSIM) and Correlation Coefficients (CC) are computed. The result demonstrated the strength of the CSA to hide data, also discovered that using CSA may lead to finding favorable results compared to the other algorithm

    Recent Advances in Steganography

    Get PDF
    Steganography is the art and science of communicating which hides the existence of the communication. Steganographic technologies are an important part of the future of Internet security and privacy on open systems such as the Internet. This book's focus is on a relatively new field of study in Steganography and it takes a look at this technology by introducing the readers various concepts of Steganography and Steganalysis. The book has a brief history of steganography and it surveys steganalysis methods considering their modeling techniques. Some new steganography techniques for hiding secret data in images are presented. Furthermore, steganography in speeches is reviewed, and a new approach for hiding data in speeches is introduced
    corecore