566 research outputs found

    An Efficient Bit Plane X-OR Algorithm for Irreversible Image Steganography

    Full text link
    The science of hiding secret information in another message is known as Steganography; hence the presence of secret information is concealed. It is the method of hiding cognitive content in same or another media to avoid recognition by the intruders. This paper introduces new method wherein irreversible steganography is used to hide an image in the same medium so that the secret data is masked. The secret image is known as payload and the carrier is known as cover image. X-OR operation is used amongst mid level bit planes of carrier image and high level bit planes of data image to generate new low level bit planes of the stego image. Recovery process includes the X-ORing of low level bit planes and mid level bit planes of the stego image. Based on the result of the recovery, subsequent data image is generated. A RGB color image is used as carrier and the data image is a grayscale image of dimensions less than or equal to the dimensions of the carrier image. The proposed method greatly increases the embedding capacity without significantly decreasing the PSNR value

    Secret Image Sharing Using Grayscale Payload Decomposition and Irreversible Image Steganography

    Full text link
    To provide an added security level most of the existing reversible as well as irreversible image steganography schemes emphasize on encrypting the secret image (payload) before embedding it to the cover image. The complexity of encryption for a large payload where the embedding algorithm itself is complex may adversely affect the steganographic system. Schemes that can induce same level of distortion, as any standard encryption technique with lower computational complexity, can improve the performance of stego systems. In this paper we propose a secure secret image sharing scheme, which bears minimal computational complexity. The proposed scheme, as a replacement for encryption, diversifies the payload into different matrices which are embedded into carrier image (cover image) using bit X-OR operation. A payload is a grayscale image which is divided into frequency matrix, error matrix, and sign matrix. The frequency matrix is scaled down using a mapping algorithm to produce Down Scaled Frequency (DSF) matrix. The DSF matrix, error matrix, and sign matrix are then embedded in different cover images using bit X-OR operation between the bit planes of the matrices and respective cover images. Analysis of the proposed scheme shows that it effectively camouflages the payload with minimum computation time

    Genetic Algorithm to Make Persistent Security and Quality of Image in Steganography from RS Analysis

    Full text link
    Retention of secrecy is one of the significant features during communication activity. Steganography is one of the popular methods to achieve secret communication between sender and receiver by hiding message in any form of cover media such as an audio, video, text, images etc. Least significant bit encoding is the simplest encoding method used by many steganography programs to hide secret message in 24bit, 8bit colour images and grayscale images. Steganalysis is a method of detecting secret message hidden in a cover media using steganography. RS steganalysis is one of the most reliable steganalysis which performs statistical analysis of the pixels to successfully detect the hidden message in an image. However, existing steganography method protects the information against RS steganalysis in grey scale images. This paper presents a steganography method using genetic algorithm to protect against the RS attack in colour images. Stego image is divided into number of blocks. Subsequently, with the implementation of natural evolution on the stego image using genetic algorithm enables to achieve optimized security and image quality.Comment: 8 Pages, 4 Figures, Swarm Evolutionary and Memetric Computing Conference (SEMCCO), Vishakhapatna

    Frame Selected Approach for Hiding Data within MPEG Video Using Bit Plane Complexity Segmentation

    Full text link
    Bit Plane Complexity Segmentation (BPCS) digital picture steganography is a technique to hide data inside an image file. BPCS achieves high embedding rates with low distortion based on the theory that noise-like regions in an image's bit-planes can be replaced with noise-like secret data without significant loss in image quality. . In this framework we will propose a collaborate approach for select frame for Hiding Data within MPEG Video Using Bit Plane Complexity Segmentation. This approach will invent high secure data hidden using select frame form MPEG Video and furthermore we will assign the well-built of the approach; during this review the author will answer the question why they used select frame steganography. In additional to the security issues we will use the digital video as a cover to the data hidden. The reason behind opt the video cover in this approach is the huge amount of single frames image per sec which in turn overcome the problem of the data hiding quantity, as the experiment result shows the success of the hidden data within select frame, extract data from the frames sequence. These function without affecting the quality of the video

    A New Steganographic Technique Matching the Secret Message and Cover image Binary Value

    Full text link
    Steganography involves hiding a secret message or image inside another cover image. Changes are made in the cover image without affecting visual quality of the image. In contrast to cryptography, Steganography provides complete secrecy of the communication. Security of very sensitive data can be enhanced by combining cryptography and steganography. A new technique that uses the concept of Steganography to obtain the position values from an image is suggested. This paper proposes a new method where no change is made to the cover image, only the pixel position LSB (Least Significant Bit) values that match with the secret message bit values are noted in a separate position file. At the sending end the position file along with the cover image is sent. At the receiving end the position file is opened only with a secret key. The bit positions are taken from the position file and the LSB values from the positions are combined to get ASCII values and then form characters of the secret messageComment: 6 page

    An Evolutionary Computing Enriched RS Attack Resilient Medical Image Steganography Model for Telemedicine Applications

    Full text link
    The recent advancement in computing technologies and resulting vision based applications have gives rise to a novel practice called telemedicine that requires patient diagnosis images or allied information to recommend or even perform diagnosis practices being located remotely. However, to ensure accurate and optimal telemedicine there is the requirement of seamless or flawless biomedical information about patient. On the contrary, medical data transmitted over insecure channel often remains prone to get manipulated or corrupted by attackers. The existing cryptosystems alone are not sufficient to deal with these issues and hence in this paper a highly robust reversible image steganography model has been developed for secret information hiding. Unlike traditional wavelet transform techniques, we incorporated Discrete Ripplet Transformation (DRT) technique for message embedding in the medical cover images. In addition, to assure seamless communication over insecure channel, a dual cryptosystem model containing proposed steganography scheme and RSA cryptosystem has been developed. One of the key novelties of the proposed research work is the use of adaptive genetic algorithm (AGA) for optimal pixel adjustment process (OPAP) that enriches data hiding capacity as well as imperceptibility features. The performance assessment reveals that the proposed steganography model outperforms other wavelet transformation based approaches in terms of high PSNR, embedding capacity, imperceptibility etc.Comment: 14 page / 3 figures / 6 tables, Multidimensional Systems and Signal Processing 201

    Improved information security using robust Steganography system

    Full text link
    Steganography is an emerging area which is used for secured data transmission over any public media.Steganography is a process that involves hiding a message in an appropriate carrier like image or audio. It is of Greek origin and means "covered or hidden writing". The carrier can be sent to a receiver without any one except the authenticated receiver knowing the existence of this information. In this paper, a specific image based steganography technique for communicating information more securely between two locations is proposed. The author incorporated the idea of secret key and password security features for authentication at both ends in order to achieve high level of security. As a further improvement of security level, the information has been permuted, encoded and then finally embedded on an image to form the stego image. In addition segmented objects extraction and reassembly of the stego image through normalized cut method has been carried out at the sender side and receiver side respectively in order to prevent distortion of the Stego image during transmission

    A Secure Color Image Steganography In Transform Domain

    Full text link
    Steganography is the art and science of covert communication. The secret information can be concealed in content such as image, audio, or video. This paper provides a novel image steganography technique to hide both image and key in color cover image using Discrete Wavelet Transform (DWT) and Integer Wavelet Transform (IWT). There is no visual difference between the stego image and the cover image. The extracted image is also similar to the secret image. This is proved by the high PSNR (Peak Signal to Noise Ratio), value for both stego and extracted secret image. The results are compared with the results of similar techniques and it is found that the proposed technique is simple and gives better PSNR values than others.Comment: 8 page

    Genetic Algorithm in Audio Steganography

    Full text link
    With the advancement of communication technology,data is exchanged digitally over the network. At the other side the technology is also proven as a tool for unauthorized access to attackers. Thus the security of data to be transmitted digitally should get prime focus. Data hiding is the common approach to secure data. In steganography technique, the existence of data is concealed. GA is an emerging component of AI to provide suboptimal solutions. In this paper the use of GA in Steganography is explored to find future scope of research.Comment: 6 pages,2 figures Published with International Journal of Engineering Trends and Technology (IJETT). arXiv admin note: text overlap with arXiv:1003.4084, arXiv:1205.2800 by other authors without attributio

    Steganalysis: Detecting LSB Steganographic Techniques

    Full text link
    Steganalysis means analysis of stego images. Like cryptanalysis, steganalysis is used to detect messages often encrypted using secret key from stego images produced by steganography techniques. Recently lots of new and improved steganography techniques are developed and proposed by researchers which require robust steganalysis techniques to detect the stego images having minimum false alarm rate. This paper discusses about the different Steganalysis techniques and help to understand how, where and when this techniques can be used based on different situations.Comment: 5 pages, 1 figur
    • …
    corecore