9 research outputs found

    IRIS BIOMETRICS STEGANOGRAPHIC METHOD WITH PIXEL VALUE DIFFERENCING AND HOUGH TRANSFORM FOR HIGHER SECURITY SYSTEM

    Get PDF
    In biometric security, steganography has become one of the techniques used in defending biometrics data and system. This is due to fraud to the biometric data and illegal activites occured at the biometrics point of system. The biometric data, which in this study, iris, is preprocessed using Hough Transform in producing the iris feature. The pixel values of iris feature is formed, in order to embed the iris feature with the stego key which gained from the cover image (thumbprint from the same trained sample). Studies showed that various techniques of embedding such as least significant bits and pixel value differencing are among popular researches. However, none has been designed for iris implementation in biometrics system. Therefore, a new technique is presented in this paper which integrates pixel value differencing with Hough method in the iris biometrics system. The proposed method modified the pixels values by modifying the most conservative pixels of the block. The theoritical estimation and results produce a scheme which provide a better embedding. The new simulation method provides an embedding capacity, human visual quality and PSNR value is 39.34 dB which is better than the previous methods

    Image Steganography Based on Complemented Message and Inverted Bit LSB Substitution

    Get PDF
    AbstractSteganography is the art of encoding/embedding secret information in cover media in such a way so as not to provoke an eavesdropper's suspicion. The primary purpose of this paper is to provide three levels of security, first is provided by complementing the secret message, second by hiding complemented secret message in cover image pixels that are selected randomly by using pseudo random number generator, third by using inverted bit LSB method2 as stegnographic technique rather than simple LSB, thus, reduces the chance of the hidden message being detected. MSE (Mean Square Error) and PSNR (Peak Signal to Noise Ratio) are two common quality measurements to measure the difference between the cover-image and the stego-image. Results showed that the proposed method gives better results than simple LSB and inverted LSB with higher PSNR and lower MSE

    Randomized Symmetric Crypto Spatial Fusion Steganographic System

    Get PDF
    The image fusion steganographic system embeds encrypted messages in decomposed multimedia carriers using a pseudorandom generator but it fails to evaluate the contents of the cover image. This results in the secret data being embedded in smooth regions, which leads to visible distortion that affects the imperceptibility and confidentiality. To solve this issue, as well as to improve the quality and robustness of the system, the Randomized Symmetric Crypto Spatial Fusion Steganography System is proposed in this study. It comprises three-subsystem bitwise encryption, spatial fusion, and bitwise embedding. First, bitwise encryption encrypts the message using bitwise operation to improve the confidentiality. Then, spatial fusion decomposes and evaluates the region of embedding on the basis of sharp intensity and capacity. This restricts the visibility of distortion and provides a high embedding capacity. Finally, the bitwise embedding system embeds the encrypted message through differencing the pixels in the region by 1, checking even or odd options and not equal to zero constraints. This reduces the modification rate to avoid distortion. The proposed heuristic algorithm is implemented in the blue channel, to which the human visual system is less sensitive. It was tested using standard IST natural images with steganalysis algorithms and resulted in better quality, imperceptibility, embedding capacity and invulnerability to various attacks compared to other steganographic systems

    The Least Significant Two-bit Substitution Algorithm for Image Steganography

    Get PDF
    Steganography hides various data within different file types, which ensures secure communication. In recent years, the science of steganography has gained importance, due to the increase of large data on the internet and the safe transmission of these data. The main objective is to hide a large amount of data into the cover image in secure and incomprehensible manner. In this article, the two-bit least significant substitution (LSB) method is used to hide data on the colored cover images. In experimental studies, two-bit LSB substitution algorithm was performed in the form of LSB R2G2, LSB R2B2 and LSB G2B2 methods. In the classical LSB substitution method, the data are hidden in sequence, while the data are hidden by the shuffling algorithm at the proposed study. In this way, the security of hidden data is provided

    Edge-based image steganography

    Get PDF
    corecore