scholarly journals Using Two Meaningful Shadows to Share Secret Messages with Reversibility

Symmetry ◽  
2019 ◽  
Vol 11 (1) ◽  
pp. 79 ◽  
Author(s):  
Lin Li ◽  
Chia-Chen Lin ◽  
Chin-Chen Chang

A subtopic of visual secret sharing (VSS) is information hiding-based VSS (IH-VSS), which embeds secret messages into images using an information hiding technique. In the IH-VSS scheme, stego-images are divided into shadows under the guidance and constraint of some predetermined approaches. In order to achieve the purpose of security and reliability, the hidden information cannot be recovered unless a certain amount or all of the credible shadows work together. In this paper, we propose a (2, 2) IH-VSS scheme with reversibility and friendliness. In the shadow generation phase, two meaningful shadow images are produced and then distributed. In the extraction and restoration phase, the hidden secret information and cover image, respectively, can be reconstructed credibly and correctly. No complex computation of shadow generation is involved, but high security is achieved. Moreover, a satisfying peak-signal-to-noise ratio (PSNR) is obtained with the high embedding capacity of 1.59 bpp in a very simple and effective way.

2016 ◽  
Vol 7 (3) ◽  
pp. 1-9 ◽  
Author(s):  
Sahar A. El-Rahman Ismail ◽  
Dalal Al Makhdhub ◽  
Amal A. Al Qahtani ◽  
Ghadah A. Al Shabanat ◽  
Nouf M. Omair ◽  
...  

We live in an information era where sensitive information extracted from data mining systems is vulnerable to exploitation. Privacy preserving data mining aims to prevent the discovery of sensitive information. Information hiding systems provide excellent privacy and confidentiality, where securing confidential communications in public channels can be achieved using steganography. A cover media are exploited using steganography techniques where they hide the payload's existence within appropriate multimedia carriers. This paper aims to study steganography techniques in spatial and frequency domains, and then analyzes the performance of Discrete Cosine Transform (DCT) based steganography using the low frequency and the middle frequency to compare their performance using Peak Signal to Noise Ratio (PSNR) and Mean Square Error (MSE). The experimental results show that middle frequency has the larger message capacity and best performance.


2010 ◽  
Vol 121-122 ◽  
pp. 1048-1051 ◽  
Author(s):  
Sheng Bing Che ◽  
Hai Yang Wang

Based on human visual gray sensitivity, a fragile large capacity spatial domain information hiding algorithm, and a new calculation formula of image peak signal-to-noise ratio were put forward. An adaptive embedding method was proposed, which had the minimum visual gray sensitivity when massive information were hidden into an original image. Experiments showed that this algorithm had massive amount of embedded information and excellent masking properties, and what’s more, once there is a bit tampered randomly, the watermarking image could not be recovered correctly. So it was suitable for the situation where the received information must be very strict reliably.


2020 ◽  
Vol 10 (2) ◽  
Author(s):  
Yusliza Yusoff ◽  
Tassvini A/P Gunaseharan ◽  
Tassvini A/P Gunaseharan

Image steganography is a process of hiding message behind an image file which focuses on protecting the existence of a message secret. There is a security risk in the current image steganography process. Since stego-image will be transferred on unsecured Internet network, attackers will attack and try to decode the message behind the stego-image because of the vulnerable algorithm. Therefore, it is very important to search for a method to make the process of encoding the stego-image more secure. There are many algorithms developed to make the stego-image become more secured. However, the usage of Knight Tour (KT) and Rivest Cipher Four (RC4) algorithms in image steganography are still insufficient although that the algorithms are claimed to be secured and robust. KT algorithm is an easy mathematical technique that can increase the security of hidden information, meanwhile, RC4 is known as a simple algorithm but systematic in cover image programming. In this paper, the performance of KT and RC4 algorithms are observed to measure the security and robustness of JPG image format. Peak Signal to Noise Ratio (PSNR) and Mean Square Error (MSE) are used to observe the image quality to improve the security factor in the stego-image. From the results, it is found that KT generated better performance compared to RC4. 


2020 ◽  
Vol 39 (6) ◽  
pp. 8389-8398
Author(s):  
Asra Kamili ◽  
Izat Fatima ◽  
Muzamil Hassan ◽  
Shabir A. Parah ◽  
V. Vijaya Kumar ◽  
...  

Embedding information in medical images is considered as one of the significant methods for safeguarding the integrity and authenticity of medical images besides providing security to electronic patient records (EPR). The conventional embedding methods deteriorate the perceptual quality of medical images making them unsuitable for proper diagnosis. To preserve the perceptual quality of medical images reversible embedding is used. The reversible embedding schemes, however, have less embedding capacity. In this work, a reversible scheme based on histogram bin shifting and RGB plane concatenation has been proposed which offers high embedding capacity as well. We have exploited the fact that medical images, unlike general images, consist of a large number of peaks and zero points that can be employed for reversibly embedding the data. Reversibility ensures that original image restoration takes place after the extraction of embedded data, which is of great importance in medical images for proper diagnosis and treatment. We have used various subjective and objective image quality metrics for analyzing the scheme. The proposed scheme has been shown to provide a Peak Signal to Noise Ratio (PSNR) value of above 56 dB for an embedding capacity of 0.58 bits per pixel (bpp). The results obtained show that the performance of scheme presented is far better in comparison to the state-of-the-art.


2017 ◽  
Vol 26 (06) ◽  
pp. 1750103 ◽  
Author(s):  
Pankaj Garg ◽  
Singara Singh Kasana ◽  
Geeta Kasana

A Reversible Data Hiding technique by using histogram shifting and modulus operator is proposed in which secret data is embedded into blocks of the cover image. These blocks are modified by using modulus operator to increase the number of peak points in the histogram of the cover image which further increases its embedding capacity. Secret data is embedded in the original cover blocks of the cover image by using peak points of the predicted blocks, which are generated by using modulus operator. Peak Signal to Noise Ratio and PSNR-Human Visual System are used to show the human visual acceptance of the proposed technique. Experimental results show that the embedding capacity is high as compared to the capacity of existing RDH techniques, while distortion in marked images is also less as compared to distortion produced by these existing techniques.


Author(s):  
Reena Thomas Et. al.

A hybrid watermarking scheme based on Triangular Vertex Transform (TVT) and Contourlet coefficients for high robustness is implemented. During watermark embedding, the cover image is first decomposed using Contourlet Transform to obtain high frequency and low frequency coefficients. The lower frequency coefficients are applied with TVT. Then, the W coefficients obtained from TVT are again subdivided. The watermark bit is then embedded on the subdivided coefficients to obtain the watermarked image. Reverse operation is followed in the extraction phase. The performance of this algorithm is evaluated using embedding capacity, Normalized cross correlation (Ncc) and Peak Signal to Noise Ratio (PSNR) using standard test images. These evaluation results disclose the domination of proposed scheme over traditional schemes


2018 ◽  
Author(s):  
Andysah Putera Utama Siahaan

Information hiding is very important because a lot of data theft occurs which can result in significant losses. Data security can be done by hiding information into a media. This media can be in the form of images or sounds. There are several concealment techniques in the picture. In this study, we will discuss the hiding of information in a 24-bit color image which consits of 3 x 8-bit. The method used is Least Significant Bit (LSB). This method is used to insert messages into the 24-bit color image insertion media on every 1 of the most significant bits of each image color. The layers used are Red, Green, and Blue. This method has a small MSE and does not appear to differ if the image is seen directly with the eye. The results of the research show that MSE calculation is not so much different from the original image. Peak Signal to Noise ratio (PSNR) for each image inserted with the maximum message size can produce an average value above 40 dB. This LSB method is excellent to use to provide information in the form of images.


Symmetry ◽  
2021 ◽  
Vol 13 (3) ◽  
pp. 387
Author(s):  
Tsung-Chih Hsiao ◽  
Dong-Xu Liu ◽  
Tzer-Long Chen ◽  
Chih-Cheng Chen

At present, the Sudoku matrix, turtle shell matrix, and octagonal matrix have been put forward according to the magic matrix-based data hiding methods. Moreover, the magic matrices to be designed depend on the size of the embedding capacity. In addition, by determining the classification of points of pixel pairs after applying a magic matrix and by determining the traversal area, the average peak signal-to-noise ratio (PSNR) can be improved. Therefore, this topic intends to propose a data hiding method based on a 16 × 16 Sudoku matrix by using the 16 × 16 Sudoku matrix and extending it to a double-layer magic matrix. Low-cost data embedding methods are also studied, in order to improve the PSNR and maintain good image quality with the same embedding capacity.


2020 ◽  
pp. 71-78
Author(s):  
Souley Boukari ◽  
Jaafaru Bobbo

Data and information has become one of the prime targets of hackers due to the sensitive nature of patients’ information. Some methods such as DES, 3DES, Blue fish and AES were used but found to be inefficient. This research aims to reduce the vulnerability of threats and increase the user satisfaction based on Embedding Capacity (EC), Mean Square Error (MSE) and Peak Signal to Noise Ratio (PSNR) on patient’s information since healthcare systems are getting very common within the society. Nth Degree Polynomial Ring Unit and Least Significant Bits were used to encrypt a text message into audio file. The research, therefore, developed a hybrid security system that can hide compressed information in audio using NTRU and LSB. The concept of cryptography and steganography was introduced to encrypt the original data by using symmetric key cryptography and to hide that data into an audio file. The proposed model was developed using MATLAB R2018(a) software. The results revealed that the proposed model is more secured in comparison to the existing model. The MSE for the proposed system is 2.4320e-06 as against 2.5321e-06 for the existing model with the peak signal to noise ratio of 156.1154 and 161.0154 for the proposed system. The proposed system has embedding capacity of 0.020 bps, while the existing system is having 2.75 bps. From the result analysis, the proposed system has performed significantly better than the existing system in terms of MSE, PSNR and embedded capacity.


Sign in / Sign up

Export Citation Format

Share Document