Author(s):  
Krishnaveni N ◽  
Sudhakar P

Steganography is the art/technique of hiding message data inside a carrier file in such a way that unauthorized or unsolicited personnel is not capable of detecting the presence of data inside the carrier file. The Proposed Method provides improved security and improved high embedding capacity image steganography through the usage of Integer Wavelet Transform (IWT) and Chaotic Logistic map. Least Significant Bit technique is used to replace the bits in the coefficient of detail band. The proposed method offers lossless and unnoticeable change in the image steganography. In this paper we focus on both cryptography and steganography for better confidentiality, security and robustness. We find that the proposed algorithm has a better CMPSNR (Chaotic Logistic mapping) value averaging close to 74 after embedding the secret data, while the existing algorithms have values of around 65.


Author(s):  
Kavia .

Cryptography and Steganography could be used to provide data security, each of them has a problem. Cryptography problem is that, the cipher text looks meaningless, so the attacker will interrupt the transmission or make more careful checks on the data from the sender to the receiver. Steganography problem is that once the presence of hidden information is revealed or even suspected, the message is become known . According to my proposed work in which both steganography and cryptography are combine and give good security for data. Firstly, the encrypted images has been hidden using image steganography method. Secondly, the Hash function algorithm has been modified and used to encrypt the stego image by using 128 digit hexa-key. Therefore, two levels of security have been provided using the proposed technique. In addition, the proposed technique provides high embedding capacity and better quality stego images.


2021 ◽  
Vol 11 (15) ◽  
pp. 6741
Author(s):  
Chia-Chen Lin ◽  
Thai-Son Nguyen ◽  
Chin-Chen Chang ◽  
Wen-Chi Chang

Reversible data hiding has attracted significant attention from researchers because it can extract an embedded secret message correctly and recover a cover image without distortion. In this paper, a novel, efficient reversible data hiding scheme is proposed for absolute moment block truncation code (AMBTC) compressed images. The proposed scheme is based on the high correlation of neighboring values in two mean tables of AMBTC-compressed images to further losslessly encode these values and create free space for containing a secret message. Experimental results demonstrated that the proposed scheme obtained a high embedding capacity and guaranteed the same PSNRs as the traditional AMBTC algorithm. In addition, the proposed scheme achieved a higher embedding capacity and higher efficiency rate than those of some previous schemes while maintaining an acceptable bit rate.


2018 ◽  
Vol 2018 ◽  
pp. 1-11 ◽  
Author(s):  
Dinh-Chien Nguyen ◽  
Thai-Son Nguyen ◽  
Chin-Chen Chang ◽  
Huan-Sheng Hsueh ◽  
Fang-Rong Hsu

Data hiding is a technique that allows secret data to be delivered securely by embedding the data into cover digital media. In this paper, we propose a new data hiding algorithm for H.264/advanced video coding (AVC) of video sequences with high embedding capacity. In the proposed scheme, to embed secret data into the quantized discrete cosine transform (QDCT) coefficients of I frames without any intraframe distortion drift, some embeddable coefficient pairs are selected in each block, and they are divided into two different groups, i.e., the embedding group and the averting group. The embedding group is used to carry the secret data, and the averting group is used to prevent distortion drift in the adjacent blocks. The experimental results show that the proposed scheme can avoid intraframe distortion drift and guarantee low distortion of video sequences. In addition, the proposed scheme provides enhanced embedding capacity compared to previous schemes. Moreover, the embedded secret data can be extracted completely without the requirement of the original secret data.


Sign in / Sign up

Export Citation Format

Share Document