scholarly journals Improved Steganography Scheme based on Fractal Set

2019 ◽  
Vol 17 (1) ◽  
pp. 128-136
Author(s):  
Mohammad Alia ◽  
Khaled Suwais

Steganography is the art of hiding secret data inside digital multimedia such as image, audio, text and video. It plays a significant role in current trends for providing secure communication and guarantees accessibility of secret information by authorised parties only. The Least-Significant Bit (LSB) approach is one of the important schemes in steganography. The majority of LSB-based schemes suffer from several problems due to distortion in a limited payload capacity for stego-image. In this paper, we have presented an alternative steganographic scheme that does not rely on cover images as in existing schemes. Instead, the image which includes the secure hidden data is generated as an image of a curve. This curve is resulted from a series of computation that is carried out over the mathematical chaotic fractal sets. The new scheme aims at improving the data concealing capacity, since it achieves limitless concealing capacity and disposes of the likelihood of the attackers to realise any secret information from the resulted stego-image. From the security side, the proposed scheme enhances the level of security as the scheme depends on the exact matching between secret information and the generated fractal (Mandelbrot-Julia) values. Accordingly, a key stream is created based on these matches. The proposed scheme is evaluated and tested successfully from different perspectives

Author(s):  
Gandharba Swain ◽  
Dodda Ravi Kumar ◽  
Anita Pradhan ◽  
Saroj Kumar Lenka

In this paper we present a technique for secure communication between two parties Alice and Bob. We use both cryptography and steganography. We take image as the carrier to use steganography. By using our own substitution cipher called two square reverse we encrypt the secret information. Then the cipher text of the secret information is embedded into the carrier image in LSB (least significant bit) minus one position of some selected bytes. The byte selection is done depending on the bit pattern of the secret information. Thus the embedding locations are dependent on the secret message. So the intruder will face difficulties to locate the bits. After embedding the resultant image will be sent to the receiver, the receiver will apply the reverse operation what the sender has done and get the secret information.


2014 ◽  
Vol 6 (4) ◽  
pp. 14-33
Author(s):  
Qunting Yang ◽  
Tiegang Gao

This paper presents a robust reversible data hiding scheme in wavelet domain. The proposed scheme divides the permuted image into non-overlapping blocks and then gets sub-blocks. The generated sub-blocks are transformed by discrete wavelet transform and the corresponding low frequency regions are gotten, respectively. The gravity centers of low frequency regions in every non-overlapping block are very similar. These gravity center pairs are utilized to embed secret data since the insensitivity of the gravity centers to malicious tampering. Experimental results show that the original image can be recovered without any distortion after the hidden data have been extracted if the stego image has not been altered. Meanwhile hidden data can still be extracted without error when the image is compressed by JPEG and JPEG2000 to a certain extent. Compared with some existing literatures, the security, payload and robustness of the proposed scheme are significantly improved.


2020 ◽  
Vol 17 (12) ◽  
pp. 5279-5295
Author(s):  
S. Jahnavi ◽  
C. Nandini

With increase in growth of data and digital threat, demand of securing the data communicated over the internet is an essential play in the digital world. In the vision of digitalizing services with the next generation of security to the sensitive data transmitted over the internet by hiding the existence of the data using next generation cryptography by fusing cryptography techniques is one the major technique adopted. With this the aim in traditional Least Significant Bit (LSB) is one of the widely used technique. Where the secret message or image are placed in the cover image in the least significant bits of RGB Channels resulting in a stego image. But the drawback is, on suspecting the differences in the pixels of original and stegoimage in the secret data embedded can be guessed and extracted by attacker. The Proposed visual crypto-mask steganography method overcomes this drawback and support good payload capacity with multi modal approach of embedding biometrics, resulting in ∞ PSNR. The authenticated person face and fingerprint information is transmitted in a cover image and mask image (magic sheet) using proposed steganography and is combined with Random Visual Crypto Technique. Which results in enhanced and advance visual crypto steganography secured model in communicating sensitive (biometric features) information over the internet. Where the complete information cannot be extracted using only cover image. Mask image (magic sheet) is used along with cover image that reveals the secret data in the receiving end.


Author(s):  
Lina Yang ◽  
Haiyu Deng ◽  
Ren Ping Liu ◽  
Patrick Wang ◽  
Xiaocui Dang ◽  
...  

Smart home is an emerging form of the Internet of Things (IoT), enabling people to enjoy a convenient and intelligent life. The data generated by smart home devices are transmitted through the public channel, which is not secure enough, so the secret data in smart home are easily intercepted by malicious adversaries. In order to solve this problem, this paper proposes a smart home privacy protection method combining DES encryption and the improved Least Significant Bit (LSB) information hiding algorithm, changing the practice of directly exposing smart home secret information to the Internet, first, using Data Encryption Standard (DES) encryption to encrypt the smart home information and second, the improved LSB information hiding algorithm is used to hide the ciphertext, so that the adversary cannot detect the smart home secret information. The goal of the scheme is to provide a double protection for the secure transmission of the smart home secret information. If an attacker wants to carry out an attack, it has to break through at least two defense lines, which seems impossible to do. Experiment results show that the improved LSB algorithm is more robust than the existing algorithms, and it is very safe. Therefore, the scheme proposed in this paper is very practical for protecting the smart home secret information.


2015 ◽  
Vol 44 (3) ◽  
pp. 315-328 ◽  
Author(s):  
Khalid Darabkh ◽  
Iyad F. Jafar ◽  
Raed T. Al-Zubi ◽  
Mohammed Hawa

With the development of internet technologies and communication services, message transmissions over the internet still have to face all kinds of security problems. Hence, how to protect secret messages during transmission becomes a challenging issue for most of current researchers. It is worth mentioning that many applications in computer science and other related fields rely on steganography and watermarking techniques to ensure information safety during communication. Unlike cryptography that focuses on scrambling the secret message so that it cannot be understood, the main objective of steganography and watermarking is to communicate securely in such a way that the hidden data are not visible to the observer. In other words, it seeks for the imperceptibility of stego-images quality to an unintended party through embedding efficiently the secret message in a digital media such as image, video, or audio. In this paper, we propose a new steganographic method to embed the secret data inside a cover image based on least-significant-bit (LSB) replacement method. The embedding process predominantly concentrates on distributing the secret message inside one share of a color image to appear like a 3D geometric shape that is constructed according to well-analyzed geometric equations. The dimensions of the geometric shape are determined pursuant to the size of secret message. Data distribution process makes our method to be of a great interest as of being so difficult for the hackers or intruders to reconstruct the shape from stego-images, thereby the security is improved. Furthermore, we compare the performance of our approach with two other relevant approaches in terms of peak signal-to-noise ratio (PSNR) and payload. The contribution of our approach was immensely impressive.DOI: http://dx.doi.org/10.5755/j01.itc.44.3.8949


2019 ◽  
Vol 8 (4) ◽  
pp. 3369-3373

In present world data transfer using the internet is growing. It is very easy and fast way to transfer information like confidential documents, economic transactions, business applications and other covert information over internet. With the advent and growth of internet, people are more concerned about security of information. Data Security is important while data is transferred over internet because any illegal user can access important and private data also make it worthless. Research in data security area will help government agencies, military organization and private companies to securely transmit their confidential data over internet. From past few years various steganography techniques have been developed to hide secret message using various multimedia objects having large amount of redundant data to support steganography. In this paper introduction about steganography, related concepts and implementation of commonly used spatial domain techniques like LSB(Least Significant Bit Technique) with modulus, PVD(Pixel Value Difference) with LSB replacement and adaptive data hiding over edges with LSB are considered. It is observed(while visual, statistical analysis and experiments were carried out) with benchmark cover and stego objects that embedding same amount of secret data in each pixel leads to more visible distortions in a stego image because all pixels do not bear same amount of changes and this effect is more observed in smooth area then edges. Improving stego image imperceptibility and adjusting hiding capacity adaptively are major related research challenges about spatial domain techniques.


2013 ◽  
Vol 9 (1) ◽  
pp. 976-984 ◽  
Author(s):  
Vijaya Lakshmi Paruchuri ◽  
Dr.R. Sridevi ◽  
K.S. SadaSiva Rao

Steganography is the science of invisible communication. Apart from the sender and intended recipient no one suspects the existence of the message. Using Steganography, information can be hidden in various mediums known as carriers. The carriers can be images, audio files, video files and text files. Image Steganography is a technique of using an image file as a carrier. Cryptography protects the information by applying the encryption and decryption techniques, so that the secret message can be understood only by the right person.This paper proposes a method, which combines the techniques of Steganography and cryptography, to hide the secret data in an image. In the first phase, the sender will embed the secret data in an image by using the Least Significant Bit (LSB) technique. The embedded image will be encrypted by using an encryption algorithm. At final, the encrypted image will be decrypted and the hidden data will be retrieved by supplying the valid secret key by the receiver. The process includes the phases of Data embedding, Image Encryption and recovery of both original image and secret data from the encrypted image.


2013 ◽  
Vol 3 (1) ◽  
Author(s):  
Lakkshmanan Ajanthaa ◽  
Puja Dharia ◽  
Fairy Gandhi

IN modern years Steganography is playing a significant role in secure communication. It is a technique of embedding secret information into cover media (image, video, audio and text) such that only the sender and the authoritative receiver can detect the occurrence of hidden information. The two essential properties of Steganography are good visual imperceptibility of the payload which is crucial for security of hidden communication and payload is essential for conveying huge quantity of secret information. Steganography has to satisfy two requirements, one is capability and the other is transparency. Capability means embedding large payload into media. Transparency means an ability to prevent distinction between stego and cover image by statistical analysis. Earlier they have used least significant bit (LSB), the simplest form of Steganography. In LSB method, data is inserted in the least significant bit which leads to a negligible change on the cover image that is not visible to the naked eye. Since this method can be easily cracked, it is more exposed to attacks. In the proposed system we propose Spatial Domain Steganography using 1-Bit Most Significant Bit (MSB) with confused manner.


The Digital Market Is Rapidly Growing Day By Day. So, Data Hiding Is Going To Increase Its Importance. Information Can Be Hidden In Different Embedding Mediums, Known As Carriers By Using Steganography Techniques. The Carriers Are Different Multimedia Medium Such As Images, Audio Files, Video Files, And Text Files .There Are Several Techniques Present To Achieve Data Hiding Like Least Significant Bit Insertion Method And Transform Domain Technique. The Data Hidden Capacity Inside The Cover Image Totally Depends On The Properties Of The Image Like Number Of Noisy Pixels. Data Compression Provides To Hide Large Amount Of Secret Data To Increase The Capacity And The Image Steganography Based On Any Neural Network Provides That The Size And Quality Of The Stego-Image Remains Unaltered After Data Embedding. In This Paper We Propose A New Method Combined With Data Compression Along With Data Embedding Technique And After Embedding To Maintain The Quality The Communication Channel Use The Neural Network. The Compression Technique Increase The Data Hiding Capacity And The Use Of Neural Network Maintain The Flow Of Data Processing Signal


2022 ◽  
Vol 11 (2) ◽  
pp. 0-0

Nowadays, Reversible Data Hiding (RDH) is used extensively in information sensitive communication domains to protect the integrity of hidden data and the cover medium. However, most of the recently proposed RDH methods lack robustness. Robust RDH methods are required to protect the hidden data from security attacks at the time of communication between the sender and receiver. In this paper, we propose a Robust RDH scheme using IPVO based pairwise embedding. The proposed scheme is designed to prevent unintentional modifications caused to the secret data by JPEG compression. The cover image is decomposed into two planes namely HSB plane and LSB plane. As JPEG compression most likely modifies the LSBs of the cover image during compression, it is best not to hide the secret data into LSB planes. So, the proposed method utilizes a pairwise embedding to embed secret data into HSB plane of the cover image. High fidelity improved pixel value ordering (IPVO) based pairwise embedding ensures that the embedding performance of the proposed method is improved.


Sign in / Sign up

Export Citation Format

Share Document