75 research outputs found

    Digital multimedia archiving based on optimization steganography system

    Full text link
    © 2014 IEEE. As soon as digital artifacts have become a part and parcel of everyday life, the need for digital media archives with the capacity of preserving the given metadata has risen impressively. The process of converting the digital metadata to archives, however, is fraught with a number of difficulties, the key one concerning the methodology for embedding high payload capacity information into the digital multimedia and at the same time retains high quality of the image. The given paper will consider steganography as a possible solution to the aforementioned issue. Allowing for detecting the genetic algorithm for boosting the PSNR value with the information of high capacity will help solve the issue regarding the digital multimedia archiving. Many sizes of data are embeded inside the images and the PSNR (Peak signal-to-noise ratio) is also taken for each of the images verified

    Encryption and Decryption of Images with Pixel Data Modification Using Hand Gesture Passcodes

    Get PDF
    To ensure data security and safeguard sensitive information in society, image encryption and decryption as well as pixel data modifications, are essential. To avoid misuse and preserve trust in our digital environment, it is crucial to use these technologies responsibly and ethically. So, to overcome some of the issues, the authors designed a way to modify pixel data that would hold the hidden information. The objective of this work is to change the pixel values in a way that can be used to store information about black and white image pixel data. Prior to encryption and decryption, by using Python we were able to construct a passcode with hand gestures in the air, then encrypt it without any data loss. It concentrates on keeping track of simply two pixel values. Thus, pixel values are slightly changed to ensure the masked image is not misleading. Considering that the RGB values are at their border values of 254, 255 the test cases of masking overcome issues with the corner values susceptibility

    A review and open issues of multifarious image steganography techniques in spatial domain

    Get PDF
    Nowadays, information hiding is becoming a helpful technique and fetch more attention due fast growth of using internet, it is applied for sending secret information by using different techniques. Steganography is one of major important technique in information hiding. Steganography is science of concealing the secure information within a carrier object to provide the secure communication though the internet, so that no one can recognize and detect it’s except the sender & receiver. In steganography, many various carrier formats can be used such as an image, video, protocol, audio. The digital image is most popular used as a carrier file due its frequency on internet. There are many techniques variable for image steganography, each has own strong and weak points. In this study, we conducted a review of image steganography in spatial domain to explore the term image steganography by reviewing, collecting, synthesizing and analyze the challenges of different studies which related to this area published from 2014 to 2017. The aims of this review is provides an overview of image steganography and comparison between approved studies are discussed according to the pixel selection, payload capacity and embedding algorithm to open important research issues in the future works and obtain a robust method

    An enhanced method based on intermediate significant bit technique for watermark images

    Get PDF
    Intermediate Significant Bit digital watermarking technique (ISB) is a new approved technique of embedding a watermark by replacing the original image pixels with new pixels. This is done by ensuring a close connection between the new pixels and the original, and at the same time, the watermark data can be protected against possible damage. One of the most popular methods used in watermarking is the Least Significant Bit (LSB). It uses a spatial domain that includes the insertion of the watermark in the LSB of the image. The problem with this method is it is not resilient to common damage, and there is the possibility of image distortion after embedding a watermark. LSB may be used through replacing one bit, two bits, or three bits; this is done by changing the specific bits without any change in the other bits in the pixel. The objective of this thesis is to formulate new algorithms for digital image watermarking with enhanced image quality and robustness by embedding two bits of watermark data into each pixel of the original image based on ISB technique. However, to understand the opposite relationship between the image quality and robustness, a tradeoff between them has been done to create a balance and to acquire the best position for the two embedding bits. Dual Intermediate Significant Bits (DISB) technique has been proposed to solve the existing LSB problem. Trial results obtained from this technique are better compared with the LSB based on the Peak Signal to Noise Ratio (PSNR) and Normalized Cross Correlation (NCC). The work in this study also contributes new mathematical equations that can study the change on the other six bits in the pixel after embedding two bits

    JPEG steganography with particle swarm optimization accelerated by AVX

    Get PDF
    Digital steganography aims at hiding secret messages in digital data transmitted over insecure channels. The JPEG format is prevalent in digital communication, and images are often used as cover objects in digital steganography. Optimization methods can improve the properties of images with embedded secret but introduce additional computational complexity to their processing. AVX instructions available in modern CPUs are, in this work, used to accelerate data parallel operations that are part of image steganography with advanced optimizations.Web of Science328art. no. e544

    Constructing HVS-Based Optimal Substitution Matrix Using Enhanced Differential Evolution

    Get PDF
    Least significant bit (LSB) substitution is a method of information hiding. The secret message is embedded into the last k bits of a cover-image in order to evade the notice of hackers. The security and stego-image quality are two main limitations of the LSB substitution method. Therefore, some researchers have proposed an LSB substitution matrix to address these two issues. Finding the optimal LSB substitution matrix can be conceptualized as a problem of combinatorial optimization. In this paper, we adopt a different heuristic method based on other researchers’ method, called enhanced differential evolution (EDE), to construct an optimal LSB substitution matrix. Differing from other researchers, we adopt an HVS-based measurement as a fitness function and embed the secret by modifying the pixel to a closest value rather than simply substituting the LSBs. Our scheme extracts the secret by modular operations as simple LSB substitution does. The experimental results show that the proposed embedding algorithm indeed improves imperceptibility of stego-images substantially

    Steganography on Multi-media Elements

    Get PDF
    Stegnography is method to make the communication of secret data hiding through a media. A perfect Steganographic in media enables to embedding data in an media, robust and secure way and then extracting it by authorized people. In this paper we introduces a new approach for Least Significant Bit (LSB) based on image and audio steganography that increases the existing LSB substitution techniques to improve the security level of hidden information by introducing secret key technique. The new security method hides secret information within the LSB using secret key combined with LSB to protect data from unauthorized users. In original LSB methods, secret data is present to a specific position of selected media. Because of this, knowing the extracting methods, anyone can extract the hidden information. In our method, we use secret key which is embedded with LSB and the according to selected media the data will be hidden therefore, it is difficult to extract the hidden information knowing the retrieval methods. DOI: 10.17762/ijritcc2321-8169.15069

    LWT based encrypted payload steganography

    Get PDF
    Steganography is used in covert communication for transportation of secrete information. In this paper we propose LWT based Encrypted Payload Steganography (LEPS). The payload is segmented into two parts say block 1 and block 2. The LWT is applied on block 2 to generate four sub bands. Payload block 1 is retained in the spatial domain itself. The values of approximation band coefficients of block 2 and spatial domain intensity values of block 1 are compressed. The LWT is applied on cover image to generate wavelet sub bands and considered only diagonal sub bands (XD). The XD band is decomposed into three parts. The key values are embedded into first part of XD band. The compressed payload is embedded in second and third blocks of XD adaptively. The payload can be retrieved at the destination by adapting reverse process of embedding. It is observed that the values of PSNR and capacity are better in the case of proposed algorithm compared to existing algorithm
    corecore