scholarly journals A Comprehensive Approach to Image Watermarking, Encryption and Steganography

2015 ◽  
Vol 8 (4) ◽  
pp. 32
Author(s):  
Sabarish Sridhar

Steganography, water marking and encryption are widely used in image processing and communication. A general practice is to use them independently or in combination of two - for e.g. data hiding with encryption or steganography alone. This paper aims to combine the features of watermarking, image encryption as well as image steganography to provide reliable and secure data transmission .The basics of data hiding and encryption are explained. The first step involves inserting the required watermark on the image at the optimum bit plane. The second step is to use an RSA hash to actually encrypt the image. The final step involves obtaining a cover image and hiding the encrypted image within this cover image. A set of metrics will be used for evaluation of the effectiveness of the digital water marking. The list includes Mean Squared Error, Peak Signal to Noise Ratio and Feature Similarity.

In this article are discussed techniques of hiding information messages in cover image using direct spectrum spreading technology. This technology is based on the use of poorly correlated pseudorandom (noise) sequences. Modulating the information data with such signals, the message is presented as a noise-like form, which makes it very difficult to detect. Hiding means adding a modulated message to the cover image. If this image is interpreted as noise on the communication channel, then the task of hiding user’s data is equivalent to transmitting a noise-like modulated message on the noise communication channel. At the same it is supposed that noise-like signals are poorly correlated both with each other and with the cover image (or its fragment). However, the latter assumption may not be fulfilled because a realistic image is not an implementation of a random process; its pixels have a strong correlation. Obviously, the selection of pseudo-random spreading signals must take this feature into account. We are investigating various ways of formation spreading sequences while assessing Bit Error Rate (BER) of information data as well as cover image distortion by mean squared error (MSE) and by Peak signal-to-noise ratio (PSNR). The obtained experimental dependencies clearly confirm the advantage of using Walsh sequences. During the research, the lowest BER values were obtained. Even at low values of the signal power of the spreading sequences (P≈5), the BER value, in most cases, did not exceed 0,01. This is the best result of all the sequences under consideration in this work. The values of PSNR when using orthogonal Walsh sequences are, in most cases, comparable to other considered options. However, for a fixed value of PSNR, using the Walsh transform results in significantly lower BER values. It is noted that a promising direction is the use of adaptively generated discrete sequences. So, for example, if the rule for generating expanding signals takes into account the statistical properties of the container, then you can significantly reduce the value of BER. Also, another useful result could be increasing PSNR at a fixed (given) value of BER. The purpose of our work is to justify the choice of extending sequences to reduce BER and MSE (increase PSNR).


2019 ◽  
Vol 5 (3) ◽  
pp. 255
Author(s):  
Garno Garno ◽  
Riza Ibnu Adam

Maraknya kasus pencurian data menyebabkan sistem keamanan pesan harus ditingkatkan. Salah satu cara untuk mengamankan pesan adalah dengan memasukkan pesan ke dalam gambar digital. Penelitian ini bertujuan untuk meningkatkan kualitas gambar digital dalam sistem keamanan pesan tersembunyi. Teknik yang digunakan untuk keamanan pesan adalah steganografi. Cover image akan dikonversi menjadi bit piksel dalam domain spasial. Cover image digunakan dalam bentuk gambar digital dengan format .jpg. Teknik meningkatkan kualitas dan kapasitas gambar digital dilakukan dengan menambahkan dan meningkatkan bit piksel menggunakan metode interpolasi Cubik B-Spline. Cover image yang telah di interpolasi, kemudian disisipi pesan menggunakan metode least significant bit (LSB) untuk memperoleh stegoimage. Pesan yang diselipkan berbentuk file .doc, .docx, .pdf, .xls, .rar, .iso dan .zip dengan ukuran berbeda-beda kapasitasnya. Teknik uji dibuat dengan bantuan perangkat lunak MATLAB versi 2017a. Penelitian melakukan uji dengan mengukur nilai kualitas penyamaran dari stegoimage menggunakan Peak Signal to Noise Ratio (PSNR) dengan rata-rata perolehan stegoimage terhadap Original image 29.06 dB dan stegoimage terhadap Image interpolation 64.34 dB dan uji mean squared error (MSE) dengan rata-rata perolehan 97.54 dB pada Image interpolation terhadap original image dan 97.55 dB pada stegoimage terhadap original image, 0.13 dB nilai MSE stegoimage terhadap Image interpolation. Hasil uji pada penelitian dengan proses interpolasi pada coverimage dengan Cubic B-Spline mempengaruhi terhadap nilai samar atau Nilai PSNR.


2020 ◽  
pp. 153-163
Author(s):  
Rahman Abdulrida ◽  
Matheel E. A-Monem ◽  
Abdul Mohssen Jaber

Like the digital watermark, which has been highlighted in previous studies, the quantum watermark aims to protect the copyright of any image and to validate its ownership using visible or invisible logos embedded in the cover image. In this paper, we propose a method to include an image logo in a cover image based on quantum fields, where a certain amount of texture is encapsulated to encode the logo image before it is included in the cover image. The method also involves transforming wavelets such as Haar base transformation and geometric transformation. These combination methods achieve a high degree of security and robustness for watermarking technology. The digital results obtained from the experiment show that the values of Peak Signal Noise Ratio (PSNR) and Mean Squared Error (MSE) that apply to one of the set cover images were 68.74 and 0.093, respectively.


2014 ◽  
Vol 2 (2) ◽  
pp. 47-58
Author(s):  
Ismail Sh. Baqer

A two Level Image Quality enhancement is proposed in this paper. In the first level, Dualistic Sub-Image Histogram Equalization DSIHE method decomposes the original image into two sub-images based on median of original images. The second level deals with spikes shaped noise that may appear in the image after processing. We presents three methods of image enhancement GHE, LHE and proposed DSIHE that improve the visual quality of images. A comparative calculations is being carried out on above mentioned techniques to examine objective and subjective image quality parameters e.g. Peak Signal-to-Noise Ratio PSNR values, entropy H and mean squared error MSE to measure the quality of gray scale enhanced images. For handling gray-level images, convenient Histogram Equalization methods e.g. GHE and LHE tend to change the mean brightness of an image to middle level of the gray-level range limiting their appropriateness for contrast enhancement in consumer electronics such as TV monitors. The DSIHE methods seem to overcome this disadvantage as they tend to preserve both, the brightness and contrast enhancement. Experimental results show that the proposed technique gives better results in terms of Discrete Entropy, Signal to Noise ratio and Mean Squared Error values than the Global and Local histogram-based equalization methods


2018 ◽  
pp. 1940-1954
Author(s):  
Suma K. V. ◽  
Bheemsain Rao

Reduction in the capillary density in the nailfold region is frequently observed in patients suffering from Hypertension (Feng J, 2010). Loss of capillaries results in avascular regions which have been well characterized in many diseases (Mariusz, 2009). Nailfold capillary images need to be pre-processed so that noise can be removed, background can be separated and the useful parameters may be computed using image processing algorithms. Smoothing filters such as Gaussian, Median and Adaptive Median filters are compared using Mean Squared Error and Peak Signal-to-Noise Ratio. Otsu's thresholding is employed for segmentation. Connected Component Labeling algorithm is applied to calculate the number of capillaries per mm. This capillary density is used to identify rarefaction of capillaries and also the severity of rarefaction. Avascular region is detected by determining the distance between the peaks of the capillaries using Euclidian distance. Detection of rarefaction of capillaries and avascular regions can be used as a diagnostic tool for Hypertension and various other diseases.


2016 ◽  
Vol 5 (2) ◽  
pp. 73-86
Author(s):  
Suma K. V. ◽  
Bheemsain Rao

Reduction in the capillary density in the nailfold region is frequently observed in patients suffering from Hypertension (Feng J, 2010). Loss of capillaries results in avascular regions which have been well characterized in many diseases (Mariusz, 2009). Nailfold capillary images need to be pre-processed so that noise can be removed, background can be separated and the useful parameters may be computed using image processing algorithms. Smoothing filters such as Gaussian, Median and Adaptive Median filters are compared using Mean Squared Error and Peak Signal-to-Noise Ratio. Otsu's thresholding is employed for segmentation. Connected Component Labeling algorithm is applied to calculate the number of capillaries per mm. This capillary density is used to identify rarefaction of capillaries and also the severity of rarefaction. Avascular region is detected by determining the distance between the peaks of the capillaries using Euclidian distance. Detection of rarefaction of capillaries and avascular regions can be used as a diagnostic tool for Hypertension and various other diseases.


2020 ◽  
Vol 10 (3) ◽  
pp. 836 ◽  
Author(s):  
Soo-Mok Jung ◽  
Byung-Won On

In this paper, we proposed methods to accurately predict pixel values by effectively using local similarity, curved surface characteristics, and edge characteristics present in an image. Furthermore, to hide more confidential data in a cover image using the prediction image composed of precisely predicted pixel values, we proposed an effective data hiding technique that applied the prediction image to the conventional reversible data hiding technique. Precise prediction of pixel values greatly increases the frequency at the peak point in the histogram of the difference sequence generated using the cover and prediction images. This considerably increases the amount of confidential data that can be hidden in the cover image. The proposed reversible data hiding algorithm (ARDHA) can hide up to 24.5% more confidential data than the existing algorithm. Moreover, it is not possible to determine the presence of hidden confidential data in stego-images, as they possess excellent visual quality. The confidential data can be extracted from the stego-image without loss, and the original cover image can be restored from the stego-image without distortion. Therefore, the proposed algorithm can be effectively used in digital image watermarking, military, and medical applications.


Author(s):  
SONALI R. MAHAKALE ◽  
NILESHSINGH V. THAKUR

This paper deals with the comparative study of research work done in the field of Image Filtering. Different noises can affect the image in different ways. Although various solutions are available for denoising them, a detail study of the research is required in order to design a filter which will fulfill the desire aspects along with handling most of the image filtering issues. An output image should be judged on the basis of Image Quality Metrics for ex-: Peak-Signal-to-Noise ratio (PSNR), Mean Squared Error (MSE) and Mean Absolute Error (MAE) and Execution Time.


Radiotekhnika ◽  
2020 ◽  
pp. 38-49
Author(s):  
A.A. Kuznetsov ◽  
O.A. Smirnov ◽  
A.S. Kiian ◽  
T.Y. Kuznetsova

There are various computing techniques (methods) to transmit secret messages. For example, cryptographic techniques hide the semantic content of transmitted messages, presenting them in the form of noise-like minor data. Steganographic techniques hide the existence of information messages itself. In this case, messages are hidden inside cover files, i.e., redundant data that are transmitted in an open way and do not cause suspicion in anyone. An outside observer can intercept cover files, analyze and examine them. However, it is very difficult or even impossible to detect and recover hidden data. This article discusses the techniques for hiding data in cover images using direct spread spectrum. We propose a new technique that consists in direct addressing of pseudo-random sequences. On the one hand, it significantly reduces cover file distortion. On the other hand, the error rate in recovered messages does not increase. Our experiments have shown, that Spread Spectrum Steganography technique indeed reduce the distortion in cover images compared to other techniques. We give some illustrative examples and show the advantages of the proposed method. Even with a significant increase in encoding density, the quality of cover images does not degrade. We also conduct experiments and evaluate image quality based on Mean Squared Error (MSE) and Peak Signal-to-Noise Ratio (PSNR). The obtained results of experimental studies confirm the adequacy and reliability of the research results. The main disadvantage of the proposed data hiding technique is a high computational complexity. To recover messages, it is necessary to calculate sequentially the correlation coefficients with a large number of pseudo-random sequences.


Sign in / Sign up

Export Citation Format

Share Document