566 research outputs found
An Efficient Bit Plane X-OR Algorithm for Irreversible Image Steganography
The science of hiding secret information in another message is known as
Steganography; hence the presence of secret information is concealed. It is the
method of hiding cognitive content in same or another media to avoid
recognition by the intruders. This paper introduces new method wherein
irreversible steganography is used to hide an image in the same medium so that
the secret data is masked. The secret image is known as payload and the carrier
is known as cover image. X-OR operation is used amongst mid level bit planes of
carrier image and high level bit planes of data image to generate new low level
bit planes of the stego image. Recovery process includes the X-ORing of low
level bit planes and mid level bit planes of the stego image. Based on the
result of the recovery, subsequent data image is generated. A RGB color image
is used as carrier and the data image is a grayscale image of dimensions less
than or equal to the dimensions of the carrier image. The proposed method
greatly increases the embedding capacity without significantly decreasing the
PSNR value
Secret Image Sharing Using Grayscale Payload Decomposition and Irreversible Image Steganography
To provide an added security level most of the existing reversible as well as
irreversible image steganography schemes emphasize on encrypting the secret
image (payload) before embedding it to the cover image. The complexity of
encryption for a large payload where the embedding algorithm itself is complex
may adversely affect the steganographic system. Schemes that can induce same
level of distortion, as any standard encryption technique with lower
computational complexity, can improve the performance of stego systems. In this
paper we propose a secure secret image sharing scheme, which bears minimal
computational complexity. The proposed scheme, as a replacement for encryption,
diversifies the payload into different matrices which are embedded into carrier
image (cover image) using bit X-OR operation. A payload is a grayscale image
which is divided into frequency matrix, error matrix, and sign matrix. The
frequency matrix is scaled down using a mapping algorithm to produce Down
Scaled Frequency (DSF) matrix. The DSF matrix, error matrix, and sign matrix
are then embedded in different cover images using bit X-OR operation between
the bit planes of the matrices and respective cover images. Analysis of the
proposed scheme shows that it effectively camouflages the payload with minimum
computation time
Genetic Algorithm to Make Persistent Security and Quality of Image in Steganography from RS Analysis
Retention of secrecy is one of the significant features during communication
activity. Steganography is one of the popular methods to achieve secret
communication between sender and receiver by hiding message in any form of
cover media such as an audio, video, text, images etc. Least significant bit
encoding is the simplest encoding method used by many steganography programs to
hide secret message in 24bit, 8bit colour images and grayscale images.
Steganalysis is a method of detecting secret message hidden in a cover media
using steganography. RS steganalysis is one of the most reliable steganalysis
which performs statistical analysis of the pixels to successfully detect the
hidden message in an image. However, existing steganography method protects the
information against RS steganalysis in grey scale images. This paper presents a
steganography method using genetic algorithm to protect against the RS attack
in colour images. Stego image is divided into number of blocks. Subsequently,
with the implementation of natural evolution on the stego image using genetic
algorithm enables to achieve optimized security and image quality.Comment: 8 Pages, 4 Figures, Swarm Evolutionary and Memetric Computing
Conference (SEMCCO), Vishakhapatna
Frame Selected Approach for Hiding Data within MPEG Video Using Bit Plane Complexity Segmentation
Bit Plane Complexity Segmentation (BPCS) digital picture steganography is a
technique to hide data inside an image file. BPCS achieves high embedding rates
with low distortion based on the theory that noise-like regions in an image's
bit-planes can be replaced with noise-like secret data without significant loss
in image quality. . In this framework we will propose a collaborate approach
for select frame for Hiding Data within MPEG Video Using Bit Plane Complexity
Segmentation. This approach will invent high secure data hidden using select
frame form MPEG Video and furthermore we will assign the well-built of the
approach; during this review the author will answer the question why they used
select frame steganography. In additional to the security issues we will use
the digital video as a cover to the data hidden. The reason behind opt the
video cover in this approach is the huge amount of single frames image per sec
which in turn overcome the problem of the data hiding quantity, as the
experiment result shows the success of the hidden data within select frame,
extract data from the frames sequence. These function without affecting the
quality of the video
A New Steganographic Technique Matching the Secret Message and Cover image Binary Value
Steganography involves hiding a secret message or image inside another cover
image. Changes are made in the cover image without affecting visual quality of
the image. In contrast to cryptography, Steganography provides complete secrecy
of the communication. Security of very sensitive data can be enhanced by
combining cryptography and steganography. A new technique that uses the concept
of Steganography to obtain the position values from an image is suggested. This
paper proposes a new method where no change is made to the cover image, only
the pixel position LSB (Least Significant Bit) values that match with the
secret message bit values are noted in a separate position file. At the sending
end the position file along with the cover image is sent. At the receiving end
the position file is opened only with a secret key. The bit positions are taken
from the position file and the LSB values from the positions are combined to
get ASCII values and then form characters of the secret messageComment: 6 page
An Evolutionary Computing Enriched RS Attack Resilient Medical Image Steganography Model for Telemedicine Applications
The recent advancement in computing technologies and resulting vision based
applications have gives rise to a novel practice called telemedicine that
requires patient diagnosis images or allied information to recommend or even
perform diagnosis practices being located remotely. However, to ensure accurate
and optimal telemedicine there is the requirement of seamless or flawless
biomedical information about patient. On the contrary, medical data transmitted
over insecure channel often remains prone to get manipulated or corrupted by
attackers. The existing cryptosystems alone are not sufficient to deal with
these issues and hence in this paper a highly robust reversible image
steganography model has been developed for secret information hiding. Unlike
traditional wavelet transform techniques, we incorporated Discrete Ripplet
Transformation (DRT) technique for message embedding in the medical cover
images. In addition, to assure seamless communication over insecure channel, a
dual cryptosystem model containing proposed steganography scheme and RSA
cryptosystem has been developed. One of the key novelties of the proposed
research work is the use of adaptive genetic algorithm (AGA) for optimal pixel
adjustment process (OPAP) that enriches data hiding capacity as well as
imperceptibility features. The performance assessment reveals that the proposed
steganography model outperforms other wavelet transformation based approaches
in terms of high PSNR, embedding capacity, imperceptibility etc.Comment: 14 page / 3 figures / 6 tables, Multidimensional Systems and Signal
Processing 201
Improved information security using robust Steganography system
Steganography is an emerging area which is used for secured data transmission
over any public media.Steganography is a process that involves hiding a message
in an appropriate carrier like image or audio. It is of Greek origin and means
"covered or hidden writing". The carrier can be sent to a receiver without any
one except the authenticated receiver knowing the existence of this
information. In this paper, a specific image based steganography technique for
communicating information more securely between two locations is proposed. The
author incorporated the idea of secret key and password security features for
authentication at both ends in order to achieve high level of security. As a
further improvement of security level, the information has been permuted,
encoded and then finally embedded on an image to form the stego image. In
addition segmented objects extraction and reassembly of the stego image through
normalized cut method has been carried out at the sender side and receiver side
respectively in order to prevent distortion of the Stego image during
transmission
A Secure Color Image Steganography In Transform Domain
Steganography is the art and science of covert communication. The secret
information can be concealed in content such as image, audio, or video. This
paper provides a novel image steganography technique to hide both image and key
in color cover image using Discrete Wavelet Transform (DWT) and Integer Wavelet
Transform (IWT). There is no visual difference between the stego image and the
cover image. The extracted image is also similar to the secret image. This is
proved by the high PSNR (Peak Signal to Noise Ratio), value for both stego and
extracted secret image. The results are compared with the results of similar
techniques and it is found that the proposed technique is simple and gives
better PSNR values than others.Comment: 8 page
Genetic Algorithm in Audio Steganography
With the advancement of communication technology,data is exchanged digitally
over the network. At the other side the technology is also proven as a tool for
unauthorized access to attackers. Thus the security of data to be transmitted
digitally should get prime focus. Data hiding is the common approach to secure
data. In steganography technique, the existence of data is concealed. GA is an
emerging component of AI to provide suboptimal solutions. In this paper the use
of GA in Steganography is explored to find future scope of research.Comment: 6 pages,2 figures Published with International Journal of Engineering
Trends and Technology (IJETT). arXiv admin note: text overlap with
arXiv:1003.4084, arXiv:1205.2800 by other authors without attributio
Steganalysis: Detecting LSB Steganographic Techniques
Steganalysis means analysis of stego images. Like cryptanalysis, steganalysis
is used to detect messages often encrypted using secret key from stego images
produced by steganography techniques. Recently lots of new and improved
steganography techniques are developed and proposed by researchers which
require robust steganalysis techniques to detect the stego images having
minimum false alarm rate. This paper discusses about the different Steganalysis
techniques and help to understand how, where and when this techniques can be
used based on different situations.Comment: 5 pages, 1 figur
- …