Authentication of Secret Message using Rabin-Karp in Image Steganography

Author(s):  
B. Karthikeyan ◽  
P. Nishmitha ◽  
B. Poojasree ◽  
S. Asha
Author(s):  
Nisha Manral

Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the Internet. For hiding secret information in images, there exists a large variety of steganographic techniques some are more complex than others and all of them have respective strong and weak points. Different applications have different requirements of the steganography technique used. For example, some applications may require absolute invisibility of the secret information, while others require a larger secret message to be hidden. This paper intends to give an overview of image steganography, its uses and techniques. It also attempts to identify the requirements of a good steganographic algorithm and briefly reflects on which steganographic techniques are more suitable for which applications.


2020 ◽  
Author(s):  
Reshma V K ◽  
Vinod Kumar R S

Abstract Securing the privacy of the medical information through the image steganography process has gained more research interest nowadays to protect the privacy of the patient. In the existing works, least significant bit (LSB) replacement strategy was most popularly used to hide the sensitive contents. Here, every pixel was replaced for achieving higher privacy, but it increased the complexity. This work introduces a novel pixel prediction scheme-based image steganography to overcome the complexity issues prevailing in the existing works. In the proposed pixel prediction scheme, the support vector neural network (SVNN) classifier is utilized for the construction of a prediction map, which identifies the suitable pixels for the embedding process. Then, in the embedding phase, wavelet coefficients are extracted from the medical image based on discrete wavelet transform (DWT) and embedding strength, and the secret message is embedded into the HL wavelet band. Finally, the secret message is extracted from the medical image on applying the DWT. The experimentation of the proposed pixel prediction scheme is done by utilizing the medical images from the BRATS database. The proposed pixel prediction scheme has achieved high performance with the values of 48.558 dB, 0.50009 and 0.9879 for the peak signal to noise ratio (PSNR), Structural Similarity Index (SSIM) and correlation factor, respectively.


2021 ◽  
Vol 2021 ◽  
pp. 1-14
Author(s):  
Xinliang Bi ◽  
Xiaoyuan Yang ◽  
Chao Wang ◽  
Jia Liu

Steganography is a technique for publicly transmitting secret information through a cover. Most of the existing steganography algorithms are based on modifying the cover image, generating a stego image that is very similar to the cover image but has different pixel values, or establishing a mapping relationship between the stego image and the secret message. Attackers will discover the existence of secret communications from these modifications or differences. In order to solve this problem, we propose a steganography algorithm ISTNet based on image style transfer, which can convert a cover image into another stego image with a completely different style. We have improved the decoder so that the secret image features can be fused with style features in a variety of sizes to improve the accuracy of secret image extraction. The algorithm has the functions of image steganography and image style transfer at the same time, and the images it generates are both stego images and stylized images. Attackers will pay more attention to the style transfer side of the algorithm, but it is difficult to find the steganography side. Experiments show that our algorithm effectively increases the steganography capacity from 0.06 bpp to 8 bpp, and the generated stylized images are not significantly different from the stylized images on the Internet.


Mathematics ◽  
2020 ◽  
Vol 8 (9) ◽  
pp. 1394 ◽  
Author(s):  
Jiaohua Qin ◽  
Jing Wang ◽  
Yun Tan ◽  
Huajun Huang ◽  
Xuyu Xiang ◽  
...  

Traditional image steganography needs to modify or be embedded into the cover image for transmitting secret messages. However, the distortion of the cover image can be easily detected by steganalysis tools which lead the leakage of the secret message. So coverless steganography has become a topic of research in recent years, which has the advantage of hiding secret messages without modification. But current coverless steganography still has problems such as low capacity and poor quality .To solve these problems, we use a generative adversarial network (GAN), an effective deep learning framework, to encode secret messages into the cover image and optimize the quality of the steganographic image by adversaring. Experiments show that our model not only achieves a payload of 2.36 bits per pixel, but also successfully escapes the detection of steganalysis tools.


Typically, hackers are ready to hack the confidential documents for their vested interests. The main challenge is to construct a secure relation between the secret message and image quality. To avoid dangerous illegal attacks by the third person, a scheme is proposed to have a combination of cryptography and image steganography techniques. This scheme will enable the security, secret message and image cannot be extracted. The International Data Encryption Algorithm (IDEA) cryptographic algorithms and Discrete Cosine Transform (DCT) based steganography algorithm is chosen for the functionality. Cryptography is used to encrypt and decrypt the document. Steganography to hide document inside an image with increasing payload for the secure transmission of confidential data across the internet. In this paper we present a single application to hide the information by the sender, which is so important document and confidential in the form of files, it will be invisible to unauthorized person. The results of a suggested scheme with respect to PSNR of 90.06 dB with a payload of 52,400 bytes of information in an image.


Author(s):  
Meera Tamboli

Steganography exists from many years in a variety of forms and has been used in a variety of domains. There are various types of steganographic techniques that are used to hide data in various file formats. The proposed model uses three layers of security using three algorithms namely, LSB, DES and AES. The software allows the user to encrypt the secret message which gets protected by undergoing three layers of encryption. The output of the encryption process which is the steno image can be sent across through any medium along with the secret key to decrypt. The end user then uses a unique key to extract and decrypt the secret message from the image. There are many reasons to hide data but the simplest is the need to prevent unauthorized persons from accessing the secret information.


Sign in / Sign up

Export Citation Format

Share Document