Adaptive image steganography based on transform domain via genetic algorithm

Optik ◽  
2017 ◽  
Vol 145 ◽  
pp. 158-168 ◽  
Author(s):  
Aref Miri ◽  
Karim Faez
Author(s):  
Sudipta Kr Ghosal ◽  
Jyotsna Kumar Mandal

In this chapter, a fragile watermarking scheme based on One-Dimensional Discrete Hartley Transform (1D-DHT) has been proposed to verify the authenticity of color images. One-Dimensional Discrete Hartley Transform (1D-DHT) converts each 1 x 2 sub-matrix of pixel components into transform domain. Watermark (along with a message digest MD) bits are embedded into the transformed components in varying proportion. To minimize the quality distortion, genetic algorithm (GA) based optimization is applied which yields the optimized component corresponding to each embedded component. Applying One-Dimensional Inverse Discrete Hartley Transform (1D-IDHT) on 1 x 2 sub-matrices of embedded components re-generates the pixel components in spatial domain. The reverse approach is followed by the recipient to retrieve back the watermark (along with the message digest MD) which in turn is compared against the re-computed Message Digest (MD') for authentication. Simulation results demonstrate that the proposed technique offers variable payload and less distortion as compared to existing schemes.


2020 ◽  
Vol 24 (3) ◽  
Author(s):  
Ariel Rodriguez Mendez ◽  
Clara Cruz Ramos ◽  
Rogelio Reyes Reyes ◽  
Volodymyr Ponomaryov

Author(s):  
Hemalatha S ◽  
Dinesh Acharya U ◽  
Renuka A ◽  
Priya R Kamath

2018 ◽  
pp. 170-186 ◽  
Author(s):  
Siddharth Singh ◽  
Tanveer J. Siddiqui

Recent advancement of multimedia technology has posed serious challenges to copyright protection, ownership, and integrity of digital data. This has made information security techniques a vital issue. Cryptography, Steganography, and Watermarking are three major techniques for securing information and ensuring copyright ownership. This chapter presents an overview of transform domain techniques for image steganography. The authors discuss the characteristics and applications of image steganography and briefly review Discrete Cosine and Wavelet transform-based image steganography techniques. They also discuss the various metrics that have been used to assess the performance of steganography techniques and shed light on the future of steganography.


Sign in / Sign up

Export Citation Format

Share Document