scholarly journals A Novel Compressed Encrypted and Encoded Watermark Embedding Scheme for Digital Images

2018 ◽  
Vol 7 (3.12) ◽  
pp. 1222
Author(s):  
Rohith S ◽  
B K Sujatha

In this research work a novel idea of compressed, encrypted and encoded watermark embedding scheme for digital images is proposed. Initially watermark is compressed using Huffman encoder. Compressed watermark is encrypted using combined binary key sequence {Ki} derived from sequence of logistic map and Lozi map. The compressed and encrypted binary watermark is encoded using (n,1) repetition code. This compressed, encrypted and encoded binary watermark is embedded in alternate locations of cover image pixels using of Least Significant Bit (LSB) and Second Least Significant Bit (SLSB). To study the watermarked image quality, parameters such as Signal to Noise Ratio (SNR) and Mean Square Error (MSE) are used.  Also performance of the proposed system is compared with uncompressed, encrypted, encoded watermark embedding scheme. There is a significant improvement in MSE, SNR of watermarked image, when compressed watermark embedding scheme is compared to uncompressed watermark embedding scheme.  

Author(s):  
Kamal Jadidy Aval ◽  
Masumeh Damrudi

Security of confidential information in the insecure era of information transmission (Internet) is still one of the most important challenges of the day. The combination of cryptography and steganography increases the security of embedded data to avoid from unauthorized access. Furthermore, compression of secret data reduces the size of transmitted message. In addition to compression and encryption, in this paper, two stage steganography is employed to enhance the security. In the proposed approach, the Huffman coding as lossless compression, the Blowfish, DES, 3DES, AES, and RSA as cryptography algorithms and LSB (Least significant Bit) as steganography technique are employed with enhancement of security by two stage steganography. The results are analyzed through quality parameters including MSE (Mean Square Error) and PSNR (Peak Signal to Noise Ratio), and histogram of images.


2021 ◽  
Vol 43 (4) ◽  
pp. 22-36
Author(s):  
A.A. Vladimirsky ◽  
◽  
I.A. Vladimirsky ◽  

Two parametric methods for determining the coordinates of leaks in underground pipelines are presented. The methods are a development of the well-known correlation method for determining the coordinates of leaks in the direction of taking into account complications that introduce a multiplicity of types of waves and damage in conjunction with extraneous interference. Both methods use secondary data processing, namely the processing of correlation functions to determine their quality parameters, which are then maximized. According to the first method, maximization occurs using the spatial displacement of the sensors at the points of access to the pipeline, according to the second method, by choosing the frequency range of signals. For this, the correlation function is provided in the form of a frequency dependence of its quality parameters - power, signal-to-noise ratio, with the display of the corresponding coordinate. Also, the concepts of "coordinate shelf" and its length, which are convenient for analysis, are used. The methods have been practically tested. Both methods are explained with examples.


Author(s):  
KOHEI ARAI

Method for data hiding based on LeGall 5/3 of Cohen-Daubechies-Feauveau: CDF 5/3 wavelet with data compression and random scanning of secret imagery data together with steganography is proposed. Invisibility of secret imagery data is evaluated based on Peak Signal to Noise Ratio: PSNR with SIDBA standard image database. The experimental results show that PSNR of LeGall based wavelet utilized data hiding ranges from 43.82 to 46.9 while that of Daubechies based method ranges from 44.33 to 44.75 when the coded secret imagery data is inserted in the first 3 digits from Least Significant Bit: LSB of the original image. Data compression ratio for the secret imagery data ranges from 1.3 to 19.4 which depends on the complexity of the secret imagery data. Meanwhile, PSNR of data hidden image ranges from 46.83 to 47.41. Consequently, the proposed data hiding method is permissive because PSNR is over 40 dB results in satisfaction on invisibility of the secret imagery data in the data hidden image.


Author(s):  
A. A. Abdelmgeid ◽  
A. A. Bahgat ◽  
Al-Hussien Seddik Saad ◽  
Maha Mohamed Gomaa

Steganography is the art and science of writing hidden messages in such a way that no one suspects the existence of the message, a form of security through obscurity. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the internet. In this paper explains the PIGPEN image steganography technique which modifies the secret message itself not the technique of embedding. This technique represents the secret message characters by two decimal digits only not three decimal digits as ASCII encoding. So, it can save one third of the required space for embedding the message in an image. The PIGPEN technique will be enhanced by using the zigzag scanning to increase the security and achieves higher visual quality as indicated by the high peak signal-to-noise ratio (PSNR) in spite of hiding a large number of secret bits in the image.


2020 ◽  
Vol 10 (1) ◽  
pp. 25
Author(s):  
Ranida Pradita ◽  
Ida Nurhaida

Seiring dengan perkembangan teknologi 5G, penyebaran dengan menggunakan video semakin besar dan mudah. Penyebaran informasi baik yang tersembunyi atau tidak semakin mudah disebarluaskan dengan menggunakan internet. Steganografi adalah cara menyembunyikan informasi dalam image atau video. Steganografi berbentuk digital image, text, audio, video, 3D model, dan lain-lain. Media digital yang popularitasnya paling tinggi dalam penelitian algoritma steganografi dengan menggunakan media digital image. Tulisan ini menggunakan media digital video karna media penelitian sebelumnya menggunakan media digital image. Pada tulisan ini akan diulas dan dianalis tentang video steganografi dengan menggunakan metode Egypt, Least Significant Bit (LSB), dan Least Significant Bit (LSB) Fibonacci Edge Pixel. Analisis video steganografi ini bertujuan untuk mendeteksi video yang mengandung unsur pesan rahasia yang kemungkinan untuk pengintaian. Hasil Peak Signal-to-Noise Ratio (PSNR) yang didapat dari penelitian ini rata-rata 40.46 dB dan menghasilkan rata-rata presentase similarity 30.67 %. Rata-rata Mean Square Error (MSE) pada penelitian ini adalah sebesar 0.50657. Untuk metode yang paling optimal yang digunakan dalam video steganografi adalah dengan menggunakan Metode Egypt.


2014 ◽  
Vol 11 (2) ◽  
pp. 660-672
Author(s):  
Baghdad Science Journal

Image fusion is one of the most important techniques in digital image processing, includes the development of software to make the integration of multiple sets of data for the same location; It is one of the new fields adopted in solve the problems of the digital image, and produce high-quality images contains on more information for the purposes of interpretation, classification, segmentation and compression, etc. In this research, there is a solution of problems faced by different digital images such as multi focus images through a simulation process using the camera to the work of the fuse of various digital images based on previously adopted fusion techniques such as arithmetic techniques (BT, CNT and MLT), statistical techniques (LMM, RVS and WT) and spatial techniques (HPFA, HFA and HFM). As these techniques have been developed and build programs using the language MATLAB (b 2010). In this work homogeneity criteria have been suggested for evaluation fused digital image's quality, especially fine details. This criterion is correlation criteria to guess homogeneity in different regions within the image by taking a number of blocks of different regions in the image and different sizes and work shifted blocks per pixel. As dependence was on traditional statistical criteria such as (mean, standard deviation, and signal to noise ratio, mutual information and spatial frequency) and compared with the suggested criteria to the work. The results showed that the evaluation process was effective and well because it took into measure the quality of the homogenous regions.


2019 ◽  
Vol 5 (3) ◽  
pp. 255
Author(s):  
Garno Garno ◽  
Riza Ibnu Adam

Maraknya kasus pencurian data menyebabkan sistem keamanan pesan harus ditingkatkan. Salah satu cara untuk mengamankan pesan adalah dengan memasukkan pesan ke dalam gambar digital. Penelitian ini bertujuan untuk meningkatkan kualitas gambar digital dalam sistem keamanan pesan tersembunyi. Teknik yang digunakan untuk keamanan pesan adalah steganografi. Cover image akan dikonversi menjadi bit piksel dalam domain spasial. Cover image digunakan dalam bentuk gambar digital dengan format .jpg. Teknik meningkatkan kualitas dan kapasitas gambar digital dilakukan dengan menambahkan dan meningkatkan bit piksel menggunakan metode interpolasi Cubik B-Spline. Cover image yang telah di interpolasi, kemudian disisipi pesan menggunakan metode least significant bit (LSB) untuk memperoleh stegoimage. Pesan yang diselipkan berbentuk file .doc, .docx, .pdf, .xls, .rar, .iso dan .zip dengan ukuran berbeda-beda kapasitasnya. Teknik uji dibuat dengan bantuan perangkat lunak MATLAB versi 2017a. Penelitian melakukan uji dengan mengukur nilai kualitas penyamaran dari stegoimage menggunakan Peak Signal to Noise Ratio (PSNR) dengan rata-rata perolehan stegoimage terhadap Original image 29.06 dB dan stegoimage terhadap Image interpolation 64.34 dB dan uji mean squared error (MSE) dengan rata-rata perolehan 97.54 dB pada Image interpolation terhadap original image dan 97.55 dB pada stegoimage terhadap original image, 0.13 dB nilai MSE stegoimage terhadap Image interpolation. Hasil uji pada penelitian dengan proses interpolasi pada coverimage dengan Cubic B-Spline mempengaruhi terhadap nilai samar atau Nilai PSNR.


2021 ◽  
Vol 13 (1) ◽  
pp. 67-77
Author(s):  
Guntoro Barovih ◽  
Fadhila Tangguh Admojo ◽  
Yoda Hersaputra

A message is a form of conveying information. Various ways are used to secure the information conveyed in the form of messages either in encrypted form or in the form of applying a password in the message. Messages can also be encrypted and embedded in other media such as images (steganography). This research aimed to insert a message into the form of an image by combining the Modified Least Significant Bit (MLSB) method in encrypting messages and reshape modification technique to determine at which position the message encryption will be embedded in the image. Tests were carried out to obtain the quality of the encryption process using the parameters of Fidelity, mean square error, peak signal to noise ratio, testing on file type, robustness, and comparison of message contents. The results of the tests showed that the files that can be used are files with the image file type in the lossless compression category, the rotation can be done at 90, 180, 270 without destroying the message in it, and changing the pixel in the image file will destroy the message inside


Acta Numerica ◽  
2012 ◽  
Vol 21 ◽  
pp. 475-576 ◽  
Author(s):  
M. Lebrun ◽  
M. Colom ◽  
A. Buades ◽  
J. M. Morel

Digital images are matrices of equally spaced pixels, each containing a photon count. This photon count is a stochastic process due to the quantum nature of light. It follows that all images are noisy. Ever since digital images have existed, numerical methods have been proposed to improve the signal-to-noise ratio. Such ‘denoising’ methods require a noise model and an image model. It is relatively easy to obtain a noise model. As will be explained in the present paper, it is even possible to estimate it from a single noisy image.


Sign in / Sign up

Export Citation Format

Share Document