scholarly journals Knight Tour for Image Steganography Technique

The growth rate of the Internet is exceeding that of any previous technology. As the Internet has become the major medium for transferring sensitive information, the security of the transferred message has now become the utmost priority. To ensure the security of the transmitted data, Image steganography has emerged out as an eminent tool of information hiding. The frequency of availability of image file is high and provides high capacity. In this paper, a method of secure data hiding in image is proposed that uses knight tour positions and further 8-queen positions in 8*8 pixel blocks.The cover image is divided into 8*8 pixel blocks and pixels are selected from each block corresponding to the positions of Knight in 8*8 chessboard starting from different pixel positions. 8-pixel values are selected from alternate knight position. Selected pixels values converted to 8-bit ASCII code and result in 8* 8 bit matrix. 8-Queen’s solution on 8*8 chessboard is applied on 8*8 bit matrix. The bits selected from 8-Queens positions and compared with 8-bit ASCII code of message characters. The proposed algorithm changes the LSB of only some of the pixels based on the above comparison. Based on parameters like PSNR and MSE the efficiency of the method is checked after implementation. Then the comparison done with some already proposed techniques. This is how, image steganography showed interesting and promising results when compared with other techniques.

2018 ◽  
Vol 2018 ◽  
pp. 1-10 ◽  
Author(s):  
Kamaldeep Joshi ◽  
Swati Gill ◽  
Rajkumar Yadav

As the internet has become the medium for transferring the sensitive information, the security of the transferred message has become the utmost priority. Image steganography has emerged out as the eminent tool of information hiding that ensures the security of the transmitted data. Image files provide high capacity, and their frequency of availability over the internet is also high. In this paper, a method of image coding is proposed that hides the information along a selected pixel and on the next value of the selected pixel, that is, pixel + 1. One bit is hidden at the selected pixel, and the second bit is hidden on the pixel +1 value. On the basis of the 7th bit of the pixels of an image, a mathematical function is applied at the 7th bit of the pixels, which generates a temporary variable (pixel + 1). The 7th bit of the selected pixel and 7th bit of pixel + 1 are used for information hiding and extraction. On the basis of a combination of these two values, two bits of the message can be hidden on each pixel. After implementation, the efficiency of the method is checked on the basis of parameters like PSNR and MSE, and then comparison with some already proposed techniques was done. This proposed image steganography showed interesting, promising results when compared with other existing techniques.


2012 ◽  
Vol 6 (4) ◽  
pp. 55-70 ◽  
Author(s):  
Sunil Kumar Muttoo ◽  
Vinay Kumar ◽  
Abhishek Bansal

The 8-queens problem of placing 8 non-attacking queens on an 8x8 chessboard is used to hide message in an image. The method helps in randomizing the bit selection in a cover image for hiding purpose. Cover image is divided into blocks of 8x1 bytes and then masked with solutions of the 8-queens problem. Bits from the block are collected corresponding to the 8-queen solution to make a 7 bit string. LSB of the block is not considered. It gives a number in the range of 0 to 127. If a bit string, corresponding to the 8-queens solutions, matches with ASCII code of the first character from message, the corresponding solution number of the 8-queens problem is encrypted using RC4, and the cipher is stored in first block of the cover. This encrypted value works as key. The solution number corresponding to next character is XORED with the key and the resultant value is embedded in the LSB of next block. The algorithm has been tested with cover of different image file formats like BMP, PNG and TIFF. The algorithm provides very good capacity, imperceptibility and robustness.


2021 ◽  
Vol 2021 ◽  
pp. 1-14
Author(s):  
Xinliang Bi ◽  
Xiaoyuan Yang ◽  
Chao Wang ◽  
Jia Liu

Steganography is a technique for publicly transmitting secret information through a cover. Most of the existing steganography algorithms are based on modifying the cover image, generating a stego image that is very similar to the cover image but has different pixel values, or establishing a mapping relationship between the stego image and the secret message. Attackers will discover the existence of secret communications from these modifications or differences. In order to solve this problem, we propose a steganography algorithm ISTNet based on image style transfer, which can convert a cover image into another stego image with a completely different style. We have improved the decoder so that the secret image features can be fused with style features in a variety of sizes to improve the accuracy of secret image extraction. The algorithm has the functions of image steganography and image style transfer at the same time, and the images it generates are both stego images and stylized images. Attackers will pay more attention to the style transfer side of the algorithm, but it is difficult to find the steganography side. Experiments show that our algorithm effectively increases the steganography capacity from 0.06 bpp to 8 bpp, and the generated stylized images are not significantly different from the stylized images on the Internet.


Entropy ◽  
2020 ◽  
Vol 22 (2) ◽  
pp. 145
Author(s):  
Jung-Yao Yeh ◽  
Chih-Cheng Chen ◽  
Po-Liang Liu ◽  
Ying-Hsuan Huang

Data hiding is the art of embedding data into a cover image without any perceptual distortion of the cover image. Moreover, data hiding is a very crucial research topic in information security because it can be used for various applications. In this study, we proposed a high-capacity data-hiding scheme for absolute moment block truncation coding (AMBTC) decompressed images. We statistically analyzed the composition of the secret data string and developed a unique encoding and decoding dictionary search for adjusting pixel values. The dictionary was used in the embedding and extraction stages. The dictionary provides high data-hiding capacity because the secret data was compressed using dictionary-based coding. The experimental results of this study reveal that the proposed scheme is better than the existing schemes, with respect to the data-hiding capacity and visual quality.


2021 ◽  
Vol 2137 (1) ◽  
pp. 012055
Author(s):  
Wei Yang ◽  
Caijun Zhang ◽  
Jinqiu Zhang ◽  
Kaiqiang Xian ◽  
Qianjun Wu ◽  
...  

Abstract There is confidential data in integrated online services applications. The data needs to be hidden before transmission on the Internet, and the data authenticity should be assured. Information hiding technology is an effective way of protecting the confidential data and may be used for assuring data authenticity. A Two-domain data hiding scheme (TDHS) is introduced in the paper to protect contract document authenticity in grid system. TDHS aims to embed confidential data into signature image in both spatial and frequency domain. LSB-like algorithm is used to generate a signature image Hs by embedding feature data of contract document into the original signature image H in the spatial domain. Then DCT algorithm is adopted to embed the watermark in signature image Hs in the frequency domain, and generate signature image Hs ready . The signature image Hs ready is inserted into the contract document. When received the document with signature, the recipient can verify its authenticity. The feasibility of TDHS is verified through experiments.


Sensors ◽  
2020 ◽  
Vol 20 (24) ◽  
pp. 7253
Author(s):  
Xintao Duan ◽  
Mengxiao Gou ◽  
Nao Liu ◽  
Wenxin Wang ◽  
Chuan Qin

The traditional cover modification steganography method only has low steganography ability. We propose a steganography method based on the convolutional neural network architecture (Xception) of deep separable convolutional layers in order to solve this problem. The Xception architecture is used for image steganography for the first time, which not only increases the width of the network, but also improves the adaptability of network expansion, and adds different receiving fields to carry out multi-scale information in it. By introducing jump connections, we solved the problems of gradient dissipation and gradient descent in the Xception architecture. After cascading the secret image and the mask image, high-quality images can be reconstructed through the network, which greatly improves the speed of steganography. When hiding, only the secret image and the cover image are cascaded, and then the secret image can be embedded in the cover image through the hidden network in order to obtain the secret image. After extraction, the secret image can be reconstructed by bypassing the secret image through the extraction network. The results show that the results that are obtained by our model have high peak signal-to-noise ratio (PSNR) and structural similarity (SSIM), and the average high load capacity is 23.96 bpp (bit per pixel), thus realizing large-capacity image steganography surgery.


2015 ◽  
Vol 2015 ◽  
pp. 1-10 ◽  
Author(s):  
Minghai Yao ◽  
Miao Qi ◽  
Yugen Yi ◽  
Yanjiao Shi ◽  
Jun Kong

A novel biometric authentication information hiding method based on the sparse representation is proposed for enhancing the security of biometric information transmitted in the network. In order to make good use of abundant information of the cover image, the sparse representation method is adopted to exploit the correlation between the cover and biometric images. Thus, the biometric image is divided into two parts. The first part is the reconstructed image, and the other part is the residual image. The biometric authentication image cannot be restored by any one part. The residual image and sparse representation coefficients are embedded into the cover image. Then, for the sake of causing much less attention of attackers, the visual attention mechanism is employed to select embedding location and embedding sequence of secret information. Finally, the reversible watermarking algorithm based on histogram is utilized for embedding the secret information. For verifying the validity of the algorithm, the PolyU multispectral palmprint and the CASIA iris databases are used as biometric information. The experimental results show that the proposed method exhibits good security, invisibility, and high capacity.


In the current world, the sensitive data are being transferred from source to destination in a much secured way in a common internet is inexorable. There are various technological aspects involved among the data world to protect the sensitive information or data hiding. Watermarking and Steganography are such important techniques which plays a prominent role in such data hiding. Earlier various techniques are been widely used like finger printing, Cryptography for encryption and decryption etc. But in the recent days the Digital Watermarking and Steganography are two range of techniques in such information hiding in a covered or secret way embedding to any host data which can be extracted with proper algorithms after the receiver receives the information. The combination of all these techniques can also bring a change in the internet industry. The information can be concealed and send across in a platform to the receiver with all these hidden techniques whereas the receiver of the data also need to know on the extraction techniques so that the information is been securely sent and received in a two-way communication. This paper deals about the comparing the common factors or attributes among the Watermarking and Steganography techniques.


Author(s):  
Sabyasachi Pramanik ◽  
R P Singh ◽  
Ramkrishna Ghosh

<p>Steganography is data hiding technique in internet. Here we send CAPTCHA codes within a cover image using Image steganography. CAPTCHA are the crazy codes. They are used in human response test. The word is actually an acronym for: "<strong>C</strong>ompletely <strong>A</strong>utomated <strong>P</strong>ublic <strong>T</strong>uring test to tell <strong>C</strong>omputers and <strong>H</strong>umans <strong>A</strong>part". It is a type of challenge–response test used in computing to determine whether or not the user is a human. Websites implement CAPTCHA codes into their registration processes due to spam. This is the utility of CAPTCHA codes. Here we generate CAPTCHA codes and later send them in an encrypted version. So, actually CAPTCHA codes are embedded into cover image with an encrypted form resulting stego image and thus attackers cannot fetch the actual CAPTCHA resulting in a secured transmission of confidential data using image steganography.</p>


2020 ◽  
Vol 9 (1) ◽  
pp. 2042-2045

Nowadays, the information security has been the key factor in communications, computer systems, electronic commerce and data sharing. One of the well-known methods for procuring the security of shared information using carrier files is steganography. The carrier file can be discrete such as image, text, audio and video etc. Digital images are the most commonly used format among those due to the high capacity and availability frequency. The hidden data is stored in an indistinct carrier in image steganography, i.e the digital image is used as a cover image to mask the secret message known as stego image. Cryptography can be then adapted for increasing the security of the stego image. A zig-zag MSB-LSB slicing based steganographic algorithm is proposed in this paper for concealing a secret image in a cover image. Power report and device utilization summary of the algorithm is calculated and the output is demonstrated on the VGA screen using BASYS3 Field Programmable Gate Array (FPGA).


Sign in / Sign up

Export Citation Format

Share Document