4 research outputs found

    Increasing Embedding Efficiency & Security of Extended Matrix Encoding Algorithm by Providing Compression & Encryption

    Get PDF
    Extended Matrix Encoding Algorithm is totally different from most of the LSB replacement or matching steganographic schemes. With reducing the amount of necessary changes the extended matrix algorithm is used to increase embedding efficiency. By using this algorithm, the hidden message is inserted into carrier media and can be transferred via safer channel. In this algorithm the quantitative DCT coefficients of JPEG image which makes the data safe from visual attack. The embedding efficiency and embedding rate get increased to large extent by changing the hash function in matrix encryption and changing the coding mode. In this paper I am trying to show that we can increase embedding efficiency by compressing the secrete data also increase the security by encryption and provision of double password. DOI: 10.17762/ijritcc2321-8169.15075

    HIGH CAPACITY AND OPTIMIZED IMAGE STEGANOGRAPHY TECHNIQUE BASED ON ANT COLONY OPTIMIZATION ALGORITHM

    Get PDF
    The tremendous development of digital technology, it is mandatory to address the security while transmitting information over network in a way that observer couldn’t depict it. Measures to be taken to provide the security by establishing hidden communication using steganography principle which is help to camouflage the secret information in some carrier file such as text, image, audio and video. In this era of hidden data communication, image becoming an effective tool on account of their frequency, capability and accuracy. Image steganography uses an image as a carrier medium to hide the secret data. The main motive of this article is that the uses the combination of frequency domain and optimization method inorder to increasing in robustness. In this article, Integer Wavelet transform is performed into the host image and coefficients have been transformed. ACO optimization algorithm is used to find the optimal coefficients where to hide the data. Furthermore, sample images and information having been demonstrated which proved the increased robustness as well as high level of data embedding capacity

    Robust Digital Image Steganography Within Coefficient Difference On Integer Haar Wavelet Transform

    Get PDF
    The development of digital information has lead to increasing demands on information security technology in order to protect the confidentiality of information. Digital steganography is one of technologies that is capable of protecting the information from unauthorized interception. It is due to its capability to hide the embedded of the information without attracting the eavesdropper’s attention. Among digital media, digital image is the most widely used medium for steganography. Discrete Cosine Transform (DCT) is a well known technique in digital image steganography. The use of DCT on small blocks may pose blocking effects and unintended artifacts on the overall image. These disadvantages of DCT can be eliminated by using Discrete Wavelet Transform (DWT) which is more compatible with the Human Visual System (HVS). However the floating point of DWT can causes some loss of information. On the other hand, Integer Wavelet Transform (IWT) represented in finite precision can avoid the problem of floating point precision in DWT. In this paper, the messages are embedded on the 1-level Integer Haar Wavelet Transform (IHWT) using coefficient difference scheme that is adopted from Pixel Value Differencing (PVD). The messages are embedded on the difference values of two adjacent wavelet coefficients. The result shows that the proposed method can easily outperform the existing method that employ IHWT and Pixel Mapping Method (PMM) in term of imperceptibility as well as the maximum capacity

    An Adaptive Steganography Scheme Based on Visual Quality and Embedding Capacity Improvement

    Get PDF
    In this paper, a steganography technique using LSB substitution and PVD method is presented as an adaptive scheme in the spatial domain. Our method partitions the grayscale image into several non-overlapping blocks with three consecutive pixels. The embedding algorithm can both replace the secret data with the LSBs of the middle pixel and embed it in the difference values between the middle pixel and its two neighboring pixels of the cover-block. The number of secret bits is determined adaptively based on the range divisions for embedding in the difference value. We define a new range division on gray level which takes into account a larger embedding capacity for bits. After the embedding, the proposed method detects the pixels which are sensitive to hyper distortion. Then, the embedding process will be repeated to produce insignificant visual distortion in those pixels. Our experimental results demonstrate that this iterative steganography scheme prevents significant visual distortion into stego-image. The generated PSNR values are higher than the corresponding values of the most commonly used methods, discussed in this study. Furthermore, the experimental results show that the hiding capacity increased enormously when the proposed range division is used. Finally, we illustrate that the method can pass RS and steganalysis detector attacks.DOI:http://dx.doi.org/10.11591/ijece.v4i4.630
    corecore