10 research outputs found

    A New Steganography Algorithm Using Hybrid Fuzzy Neural Networks

    Get PDF
    AbstractIn recent years, image steganography has been one of the emerging research areas. As the field of information technology is advancing, the need of information security is increasing day by day. Steganography is a widely used communication method in today's scenario which involves sending secret information in appropriate carriers. Since it have an interesting property of concealing the message as well as the existence of the message, steganography is on its evolutionary path to unearth new platforms. As the field of steganalysis is growing exponentially, the need of developing strong steganographic algorithms is also growing. Since the use of steganography is spreading across various fields, the goal of increasing the embedding capacity, security and image quality is being major concerns. We propose a new image steganographic method which is based on random selection of pixels for secret data embedding and post processing the stego-image using Hybrid Fuzzy Neural Networks. The pixels where secret data is to be embedded is selected randomly using a pseudo random key. In the selected pixels the last 2 or 3 bits are used for hiding. The resultant degradation in the quality of stego-image is handled by an efficient pixel adjustment process with the use of fuzzy neural networks.. The experimental results reveal that this method can achieve an embedding capacity of 3 bits per byte with excellent stego-image quality and high imperceptibility

    Data Hiding in Color Images: A High Capacity Data Hiding Technique for Covert Communication

    Get PDF
    A high capacity data hiding technique using color images as cover medium and referred to as 4R-4G-4B technique has been investigated and presented in this paper. The color image is firstly divided into its constituent bit planes followed by data embedding. To thwart the adversary different embedding algorithms have been used for embedding data in Red, Green and Blue planes. Additional layer of security to the embedded data is added by embedding secret data at the pseudorandom locations determined by Main Address Vector (MAV) and Complementary Address Vector (CAV). The comparison of our method with an existing technique shows that proposed technique is capable of providing better quality stego-images even if the embedded data is slightly more. A 2.7dB increase in PSNR in case of proposed technique substantiates the argument

    A NOVEL METHOD FOR EDGE DETECTION USING BLOCK TRUNCATION CODING AND CONVOLUTION TECHNIQUE FOR MAGNETIC RESONANCE IMAGES(MRI) WITH PERFORMANCE MEASURES

    Get PDF
    In this paper, we propose a novel method to detect edges in digital images. Attention is given to magnetic resonance images (MRI) of the brain in particular.  Edge detection using block truncation coding and convolution technique are presented. The results are compared with the standard edge detection  Canny method . The results of this study are presented and discussed

    A novel robust reversible watermarking scheme for protecting authenticity and integrity of medical images

    Get PDF
    It is of great importance in telemedicine to protect authenticity and integrity of medical images. They are mainly addressed by two technologies, which are region of interest (ROI) lossless watermarking and reversible watermarking. However, the former causes biases on diagnosis by distorting region of none interest (RONI) and introduces security risks by segmenting image spatially for watermark embedding. The latter fails to provide reliable recovery function for the tampered areas when protecting image integrity. To address these issues, a novel robust reversible watermarking scheme is proposed in this paper. In our scheme, a reversible watermarking method is designed based on recursive dither modulation (RDM) to avoid biases on diagnosis. In addition, RDM is combined with Slantlet transform and singular value decomposition to provide a reliable solution for protecting image authenticity. Moreover, ROI and RONI are divided for watermark generation to design an effective recovery function under limited embedding capacity. Finally, watermarks are embedded into whole medical images to avoid the risks caused by segmenting image spatially. Experimental results demonstrate that our proposed lossless scheme not only has remarkable imperceptibility and sufficient robustness, but also provides reliable authentication, tamper detection, localization and recovery functions, which outperforms existing schemes for protecting medical image

    Lossless Data Hiding for Color Images Based on Block Truncation Coding

    No full text
    [[abstract]]In this paper, we present a novel, reversible steganographic method, which can reconstruct an original image effectively after extracting the embedded secret data. The proposed reversible hiding method aims at BTC (block truncation coding)-compressed color images. Conventionally, each block of a color image compressed by BTC requires three bitmaps and three pairs of quantization levels for reconstruction. In order to improve the compression rate, a genetic algorithm (GA) is applied to find an approximate optimal common bitmap to replace the original three. The secret data then are embedded in the common bitmap and the quantization levels of each block use the properties of side matching and the order of these quantization levels to achieve reversibility. The experimental results demonstrate that the proposed method is practical for BTC-compressed color images and can embed more than three bits in each BTC-encoded block on average

    Lossless Data Hiding for Color Images Based on Block Truncation Coding

    No full text
    [[abstract]]In this paper, we present a novel, reversible steganographic method, which can reconstruct an original image effectively after extracting the embedded secret data. The proposed reversible hiding method aims at BTC (block truncation coding)-compressed color images. Conventionally, each block of a color image compressed by BTC requires three bitmaps and three pairs of quantization levels for reconstruction. In order to improve the compression rate, a genetic algorithm (GA) is applied to find an approximate optimal common bitmap to replace the original three. The secret data then are embedded in the common bitmap and the quantization levels of each block use the properties of side matching and the order of these quantization levels to achieve reversibility. The experimental results demonstrate that the proposed method is practical for BTC-compressed color images and can embed more than three bits in each BTC-encoded block on average

    Data Hiding and Its Applications

    Get PDF
    Data hiding techniques have been widely used to provide copyright protection, data integrity, covert communication, non-repudiation, and authentication, among other applications. In the context of the increased dissemination and distribution of multimedia content over the internet, data hiding methods, such as digital watermarking and steganography, are becoming increasingly relevant in providing multimedia security. The goal of this book is to focus on the improvement of data hiding algorithms and their different applications (both traditional and emerging), bringing together researchers and practitioners from different research fields, including data hiding, signal processing, cryptography, and information theory, among others
    corecore