scholarly journals Efficient Steganography Scheme for Color Images based on Wavelets and Chaotic Maps

2020 ◽  
Vol 2 (4) ◽  
pp. 11-20
Author(s):  
Hikmat N. Abdullah ◽  
Sura F. Yousif ◽  
Alejandro A. Valenzuela

In this paper, a combination of spatial domain as well as transformation domain with the aid of chaotic sequences is used to propose an efficient steganography scheme for color images. The transform domain uses Discrete Wavelet Transform (DWT) for embedding the cover and secret images. Chaotic sequences are used for two purposes: first, to scramble the secret color image before hiding. Second, to randomly select the locations of the cover image for embedding. The two images are then merged together into a single image and the stego image is formed by applying IDWT. The secret image is extracted from the stego image without the need to the original cover image. The simulation results are evaluated in terms of Mean Square Error (MSE), correlation, and Peak Signal to Noise Ratio (PSNR) demonstrate that the proposed scheme has better robustness than the previous schemes in the literature in the presence of common image attacks including filtering and noise attacks. The obtained results for maximum PSNR and correlation were 76.8 dB and 99.99% for the stego image while for the extracted secret image were 55.4 dB and 100%.

2017 ◽  
Vol 28 (5) ◽  
pp. 749-758 ◽  
Author(s):  
Vijay Kumar ◽  
Dinesh Kumar

Abstract Steganography is the foremost influential approach to hide data. Images serve as the most appropriate cover media for steganography. This paper intends to do a performance evaluation of color images and its comparison with the recently proposed approaches, using the modified technique already proposed for grayscale images, by the authors. This approach hides large data in color image using the blocking concept. The blocking process is applied on approximation coefficients of secret image and detail coefficients of red, green and blue components of cover image. The blocks of detail coefficients are replaced with approximation coefficients of secret image using root mean square error method. The key is used to store the position of best matching blocks. It is being predicated that the work will be able to hide large data in a single image. The stego image (ST) has better visual quality based on the peak signal to noise ratio values.


2021 ◽  
Author(s):  
Nandhini Subramanian ◽  
, Jayakanth Kunhoth ◽  
Somaya Al-Maadeed ◽  
Ahmed Bouridane

COVID pandemic has necessitated the need for virtual and online health care systems to avoid contacts. The transfer of sensitive medical information including the chest and lung X-ray happens through untrusted channels making it prone to many possible attacks. This paper aims to secure the medical data of the patients using image steganography when transferring through untrusted channels. A deep learning method with three parts is proposed – preprocessing module, embedding network and the extraction network. Features from the cover image and the secret image are extracted by the preprocessing module. The merged features from the preprocessing module are used to output the stego image by the embedding network. The stego image is given as the input to the extraction network to extract the ingrained secret image. Mean Squared Error (MSE) and Peak Signal-to-Noise Ratio (PSNR) are the evaluation metrics used. Higher PSNR value proves the higher security; robustness of the method and the image results show the higher imperceptibility. The hiding capacity of the proposed method is 100% since the cover image and the secret image are of the same size.


2021 ◽  
Vol 39 (1B) ◽  
pp. 231-242
Author(s):  
Sally A. Mahdi ◽  
Maisa’a A. Khodher

Image steganography is the art of hiding data into an image by using the secret key. This paper presents two techniques that combine the most significant bit (MSB) as well as the least significant bit (LSB) based on a color image (24bit for RGB). The presented study proposes a novel method to combine (LSB and MSB) bits based on check MSB values and replace bits from LSB with a secret message. The result of this proposed method that made not affect quality stego -image based on the resulting histogram that shows a match between the cover image and stego- image and more secure because not hidden in all image. The factors were used Mean Square Error (MSE), Compute Payload, in addition to Peak Signal to Noise Ratio (PSNR). The PSNR’s rate is high and MSE is less. The result of this paper when applying on the different image gives high PSNR of 87.141 and less MSE of 0.00012 when inserting message 80 bits and reduction value PSNR of 72.023 and MSE of 0.0040 when inserting message 1200 bits and measure entropy is the same value for cover image and stego –image then this method is more security for the attacker.


Image steganography is a technique that is used to hide information. The information can be of various types like image, video, or audio. Steganography is done so that no one apart from the correct receiver can retrieve the information. This paper consists of all advantages and highlights of the wavelet transform but with the additional features like randomness and some default values that are already built-in it. Various algorithms can be used in steganography and they provide good hiding capacity and low detectability. Here we have hidden the image into the cover image using Integer Wavelet Transform (IWT) and also using Discrete Wavelet Transform (DWT) and compared which technique gives better results. It is very difficult to predict the presence of a hidden image inside the stego image since it looks exactly like the cover image. There is no loss in quality from the secret image to the extracted image since the PSNR (Peak Signal to noise ratio) is high for both of them. This process was done using both DWT and IWT and the results prove that that the IWT technique is not only simpler but also more efficient than the DWT technique since it gives higher PSNR values. Through the proposed algorithm, an increase in the strength and imperceptibility is noticed and it can also maintain various transformations such as scaling, translation, and rotation with algorithms that already exist. The final results, after comparing both the transforms prove that the algorithm which is being proposed in IWT is indeed effective


Symmetry ◽  
2020 ◽  
Vol 13 (1) ◽  
pp. 65
Author(s):  
Lu Wang ◽  
Bin Yan ◽  
Hong-Mei Yang ◽  
Jeng-Shyang Pan

Visual cryptography (VC) has found numerous applications in privacy protection, online transaction security, and voting security, etc. To counteract potential cheating attacks, Lin et al. proposed flip visual cryptography in 2010, where a second secret image can be revealed by stacking one share with a flipped version of another share. The second secret image can be designed as an additional verification mechanism. However, Lin’s scheme produces meaningless shares and is only applicable to binary secret images. It is interesting to explore whether it is possible to extend the flip VC to having cover images (i.e., extended VC) and these cover images are color images. This problem is challenging since too many restricting conditions need to be met. In this paper, we designed a flip VC for gray-scale and color cover images based on constraint error diffusion. We show that it is possible to meet all the constraints simultaneously. Compared with existing schemes, our scheme enjoys the following features: Color cover images, no computation needed for decoding, and no interference from cover image on the recovered secret image.


Author(s):  
Aree Ali Mohammed

Transform-domain digital audio watermarking has a performance advantage over time-domain watermarking by virtue of the fact that frequency  transforms offer better exploitation of the human auditory system (HAS). In this research paper an adaptive audio watermarking is proposed based on the low and high wavelet frequencies band (LF, HF). The embedded watermark can be of any types of signal (text, audio and image). The insertion of the watermark data is performing in a frequency domain after applying discrete wavelet transformation on the cover audio segments. The normalize correlation and the signal to noise ratio metrics are used to test the performance of the proposed method in terms of the robustness and imperceptibility. Test results show that an improvement of the robustness against some type of attacks when the watermark is adaptively embedded in a different wavelet bands.


2021 ◽  
Vol 2021 ◽  
pp. 1-14
Author(s):  
Xinliang Bi ◽  
Xiaoyuan Yang ◽  
Chao Wang ◽  
Jia Liu

Steganography is a technique for publicly transmitting secret information through a cover. Most of the existing steganography algorithms are based on modifying the cover image, generating a stego image that is very similar to the cover image but has different pixel values, or establishing a mapping relationship between the stego image and the secret message. Attackers will discover the existence of secret communications from these modifications or differences. In order to solve this problem, we propose a steganography algorithm ISTNet based on image style transfer, which can convert a cover image into another stego image with a completely different style. We have improved the decoder so that the secret image features can be fused with style features in a variety of sizes to improve the accuracy of secret image extraction. The algorithm has the functions of image steganography and image style transfer at the same time, and the images it generates are both stego images and stylized images. Attackers will pay more attention to the style transfer side of the algorithm, but it is difficult to find the steganography side. Experiments show that our algorithm effectively increases the steganography capacity from 0.06 bpp to 8 bpp, and the generated stylized images are not significantly different from the stylized images on the Internet.


Author(s):  
SOFIA SAIDAH ◽  
NUR IBRAHIM ◽  
MOCHAMMAD HALDI WIDIANTO

ABSTRAKPada studi ini, dilakukan penggabungan metode - metode untuk memperkuat dan meningkatkan sisi keamanan proses pertukaran informasi atau pesan digital. Metode yang digunakan diantaranya adalah metode kriptografi dan metode steganografi. Implementasi pada sistem yang dibangun dilakukan dengan menyandikan pesan pada penerapan metode steganografi citra dalam menyembunyikan pesan tersandi yang dihasilkan ke dalam sebuah citra warna (RGB) dalam domain Discrete Cosine Transform dengan teknik penyisipan Spread Spectrum. Hasil penelitian menunjukan bahwa kualitas dari stego image sangat mirip dengan cover citra yang digunakan, berdasarkan perolehan nilai performansi objektif PSNR diatas 30 db dan subjektif MOS di atas nilai 4.Kata kunci: Steganografi, Discrete Cosine Transform, Spread Spectrum, PSNR, SNR ABSTRACTIn this study, a combination of methods was used to strengthen and enhance the security side of the process of exchanging information or digital messages. The methods used include cryptographic methods and steganography methods. The implementation of the system built is done by encoding the message on the application of the image steganography method in hiding the encrypted message generated into a color image (RGB) in the Discrete Cosine Transform domain with the Spread Spectrum insertion technique. The results of the study show that the quality of the stego image is very similar to the cover image used, based on the acquisition of an objective performance value of PSNR above 30 db and subjective MOS above a value of 4.Keywords: Steganografi, Discrete Cosine Transform, Spread Spectrum, PSNR, SNR


2020 ◽  
Vol 5 (2) ◽  
pp. 100
Author(s):  
Dedi Darwis ◽  
A. Ferico Octaviansyah Pasaribu

<em>Keamanan data saat ini merupakan hal yang sangat penting diera digital karena komunikasi harus bersifat rahasia dan aman. Salah satu cara untuk berkomunikasi secara digital adalah steganografi yaitu pengembangan dari kriptografi, teknik ini memiliki cara menyembunyikan data dan informasi pada media lainnya misalkan seperti citra digital karena media ini sering digunakan dalam pertukaran informasi dan data. Algoritma steganografi yang digunakan pada penelitian ini adalah Discrete Wavelet Transform (DWT) dan Singular Value Decomposition (SVD) kedua metode ini merupakan bagian dari steganografi yang sama-sama memanfaatkan domain transform pada pengolahan citra digital dan memiliki kecepatan yang tinggi dalam penyisipan pesan rahasia ke suatu gambar. Masalah yang selama ini terjadi pada steganografi adalah kualitas stego image yang dihasilkan pada steganografi mengalami perubahan pada kualitas citra, sehingga perbedaan antara cover image dan stego image akan sangat terlihat. Penerapan metode DWT dan SVD pada penelitian ini diimplementasikan dengan bahasa pemrograman Python 2. Berdasarkan hasil pengujian yang dilakukan metode DWT dapat menghasilkan kualitas citra pada stego image yang lebih baik jika dibandingkan metode SVD yaitu menghasilkan nilai MSE nilai rata-rata 0,0046 db. Hasil perhitungan nilai PSNR juga membuktikan bahwa metode DWT menghasilkan kualitas citra  lebih baik dari dari metode SVD yaitu menghasilkan nilai rata-rata 63,47 db.</em>


Sign in / Sign up

Export Citation Format

Share Document