scholarly journals A Formula Adaptive Pixel Pair Matching Steganography Algorithm

2018 ◽  
Vol 2018 ◽  
pp. 1-8
Author(s):  
Min Long ◽  
Fenfang Li

Pixel pair matching (PPM) is widely used in digital image steganography. As an important derivation, adaptive pixel pair matching method (APPM) offers low distortion and allows embedded digits in any notational system. However, APPM needs additional space to store, calculate, and query neighborhood set, which needs extra cost. To solve these problems, a formula adaptive pixel pair matching (FAPPM) method is proposed in this paper. The basic idea of FAPPM is to use the formula to get the stego image pixel pair without searching the neighborhood set for the given image pixel pair. This will allow users to embed secret message directly without storing and searching the look-up table. Experimental results and analysis show that the proposed method could embed secret data directly without searching the neighborhood sets by using a formula and it still maintains flexibility in the selection of notional system, high image quality, and strong anti-steganalysis ability.

2020 ◽  
Vol 17 (12) ◽  
pp. 5279-5295
Author(s):  
S. Jahnavi ◽  
C. Nandini

With increase in growth of data and digital threat, demand of securing the data communicated over the internet is an essential play in the digital world. In the vision of digitalizing services with the next generation of security to the sensitive data transmitted over the internet by hiding the existence of the data using next generation cryptography by fusing cryptography techniques is one the major technique adopted. With this the aim in traditional Least Significant Bit (LSB) is one of the widely used technique. Where the secret message or image are placed in the cover image in the least significant bits of RGB Channels resulting in a stego image. But the drawback is, on suspecting the differences in the pixels of original and stegoimage in the secret data embedded can be guessed and extracted by attacker. The Proposed visual crypto-mask steganography method overcomes this drawback and support good payload capacity with multi modal approach of embedding biometrics, resulting in ∞ PSNR. The authenticated person face and fingerprint information is transmitted in a cover image and mask image (magic sheet) using proposed steganography and is combined with Random Visual Crypto Technique. Which results in enhanced and advance visual crypto steganography secured model in communicating sensitive (biometric features) information over the internet. Where the complete information cannot be extracted using only cover image. Mask image (magic sheet) is used along with cover image that reveals the secret data in the receiving end.


This paper presents a critical analysis on new and original proposed algorithm based on hiding any data has been used that overcomes the disadvantages of the existing algorithms and helps to provide less similarity between cover image and stego image and obtain accuracy upto 69.6 percentage and increases its robustness using metrics called mean square error and peak signal to noise ratio. In the wireless environment cryptography suffers from various spyware programs that shows corrupted secret information to innocent users who uses image steganography services from user. In our proposed prototype helps to authenticate the sender to make the unnoticeable image from original image. In our proposal work discovers a secure authentication communication model would able to cover multimedia data like first text to be hide, second image to be hide and third audio secret data to be hide in cover image without much noticed to any user in between network. In order to provide additional security to this model we incorporate AES encryption scheme where secret message is encrypted and hidden in the cover audio. The proposed approach uses DCT coefficient computation and AES encryption scheme. An extensive experimental study is carried based on different test cases and evaluated against state-of-art techniques. The experimental study shows that the proposed approach achieves better performance for audio steganography. Keywords: AES, steganography, cover image, hiding image, network, digital data.


Symmetry ◽  
2020 ◽  
Vol 12 (6) ◽  
pp. 899 ◽  
Author(s):  
Mehmet Zeki Konyar ◽  
Sıtkı Öztürk

Medical data hiding is used to hide patient information inside medical images to protect patient privacy. Patient information in the image should be protected when sending medical images to other specialists or hospitals over the communication network. However, the images are exposed to various unwanted disruptive signals in the communication channel. One of these signals is salt and pepper noise. A pixel exposed to salt and pepper noise becomes completely black or completely white. In pixel-based data hiding methods, it is not possible to extract the secret message in the pixel exposed to this kind of noise. While current data hiding methods are good for many disruptive effects, they are weak against salt and pepper noise. For this reason, the proposed study especially focuses on the accurate extraction of patient information in the salt and pepper noisy medical images. This study was proposed for the most accurate extraction of secret message despite salt and pepper noise, by use of a Reed Solomon error control coding-based data hiding method. The most important feature of Reed Solomon codes is that they can correct errors in non-binary (decimal) numbers directly. Therefore, the Reed Solomon coding-based data hiding method that proposed in this study increases the resistance against salt and pepper noise. Experimental studies show that secret data is accurately extracted from stego images with various densities of salt and pepper noise. Stego medical images created by the proposed method have superior quality values compared to similar literature studies. Additionally, compared to similar methods, the secret message is extracted from the noisy stego image with higher accuracy.


2019 ◽  
Vol 8 (4) ◽  
pp. 3369-3373

In present world data transfer using the internet is growing. It is very easy and fast way to transfer information like confidential documents, economic transactions, business applications and other covert information over internet. With the advent and growth of internet, people are more concerned about security of information. Data Security is important while data is transferred over internet because any illegal user can access important and private data also make it worthless. Research in data security area will help government agencies, military organization and private companies to securely transmit their confidential data over internet. From past few years various steganography techniques have been developed to hide secret message using various multimedia objects having large amount of redundant data to support steganography. In this paper introduction about steganography, related concepts and implementation of commonly used spatial domain techniques like LSB(Least Significant Bit Technique) with modulus, PVD(Pixel Value Difference) with LSB replacement and adaptive data hiding over edges with LSB are considered. It is observed(while visual, statistical analysis and experiments were carried out) with benchmark cover and stego objects that embedding same amount of secret data in each pixel leads to more visible distortions in a stego image because all pixels do not bear same amount of changes and this effect is more observed in smooth area then edges. Improving stego image imperceptibility and adjusting hiding capacity adaptively are major related research challenges about spatial domain techniques.


Author(s):  
Marwa Ahmad ◽  
Nameer N. EL-Emam ◽  
Ali F. AL-Azawi

Steganography algorithms have become a significant technique for preventing illegal users from obtaining secret data. In this paper, a deep hiding/extraction algorithm has been improved (IDHEA) to hide a secret message in colour images. The proposed algorithm has been applied to enhance the payload capacity and reduce the time complexity. Modified LSB (MLSB) is based on disseminating secret data randomly on a cover-image and has been proposed to replace a number of bits per byte (Nbpb), up to 4 bits, to increase payload capacity and make it difficult to access the hiding data. The number of levels of the IDHEA algorithm has been specified randomly; each level uses a colour image, and from one level to the next, the image size is expanded, where this algorithm starts with a small size of a cover-image and increases the size of the image gradually or suddenly at the next level, according to an enlargement ratio. Lossless image compression based on the run-length encoding algorithm and Gzip has been applied to enable the size of the data that is hiding at the next level, and data encryption using the Advanced Encryption Standard algorithm (AES) has been introduced at each level to enhance the security level. Thus, the effectiveness of the proposed IDHEA algorithm has been measured at the last level, and the performance of the proposed hiding algorithm has been checked by many statistical and visual measures in terms of the embedding capacity and imperceptibility. Comparisons between the proposed approach and previous work have been implemented; it appears that the intended approach is better than the previously modified LSB algorithms, and it works against visual and statistical attacks with excellent performance achieved by using the detection error (PE). Furthermore, the results confirmed that the stego-image with high imperceptibility has reached even a payload capacity that is large and replaces twelve bits per pixel (12-bpp). Moreover, testing is confirmed in that the proposed algorithm can embed secret data efficiently with better visual quality.


A technique to hide undisclosed information from third party as well, the method of investigation to conceal secret data into the cover frame like text, audio, image and video without any change in substantial results to the carrier image is nothing but Steganography. The contemporary safe and taut steganography of image represents an exigent form of transformation of the inserted secrecy for the receiver with getting undetected [1-5]. In Image steganography, image is the carrier and any secret message (audio or text or image) can be transmitted. This algorithm of LSB can be executed in embedding territory where the secret audio data is inserted into the LSB of envelope image for creating the stego image. This paper gives the hiding of audio data as secret data in an image file using LSB with secret key and an improved inverted LSB image Steganography with improved mean square error and peak signal to noise ratio.


Sensors ◽  
2020 ◽  
Vol 20 (13) ◽  
pp. 3802 ◽  
Author(s):  
Ching-Chun Chang ◽  
Ji-Hwei Horng ◽  
Chia-Shou Shih ◽  
Chin-Chen Chang

Secret image sharing is a technique for sharing a secret message in such a fashion that stego image shadows are generated and distributed to individual participants. Without the complete set of shadows shared among all participants, the secret could not be deciphered. This technique may serve as a crucial means for protecting private data in massive Internet of things applications. This can be realized by distributing the stego image shadows to different devices on the Internet so that only the ones who are authorized to access these devices can extract the secret message. In this paper, we proposed a secret image sharing scheme based on a novel maze matrix. A pair of image shadows were produced by hiding secret data into two distinct cover images under the guidance of the maze matrix. A two-layered cheat detection mechanism was devised based on the special characteristics of the proposed maze matrix. In addition to the conventional joint cheating detection, the proposed scheme was able to identify the tampered shadow presented by a cheater without the information from other shadows. Furthermore, in order to improve time efficiency, we derived a pair of Lagrange polynomials to compute the exact pixel values of the shadow images instead of resorting to time-consuming and computationally expensive conventional searching strategies. Experimental results demonstrated the effectiveness and efficiency of the proposed secret sharing scheme and cheat detection mechanism.


Author(s):  
YEUAN-KUEN LEE ◽  
LING-HWEI CHEN

The typical model of steganography has led the prisoners' problem, in which two persons attempt to communicate covertly without alerting the warden. The general way to achieve this task is to embed the message in an innocuous-looking medium. In this paper, an object-based geometric embedding technique is proposed for solving the prisoners' problem. The main idea is to embed secret data through distorting a given object and the distorted object still looks natural. In the embedding process, the secret message is first converted into coefficients of an affine transformation. Then, the coordinates of each pixel of a selected object in the cover-image are recomputed by this affine transformation. Since these coefficients are restricted in a specific range, the transformed object looks natural. In the extracting process, a coarse-to-fine iterative search is proposed to accelerate the object location and the message extraction. Experimental results show that all transformed objects can be located precisely and the whole hidden message can be extracted correctly even if the stego-image is stored in various compression formats and rates. Furthermore, the embedded message is robust enough when the stego-image format is converted from GIF to JPEG, and vice versa.


2017 ◽  
Vol 4 (4) ◽  
pp. 161066 ◽  
Author(s):  
Shiv Prasad ◽  
Arup Kumar Pal

This paper presents a steganographic scheme based on the RGB colour cover image. The secret message bits are embedded into each colour pixel sequentially by the pixel-value differencing (PVD) technique. PVD basically works on two consecutive non-overlapping components; as a result, the straightforward conventional PVD technique is not applicable to embed the secret message bits into a colour pixel, since a colour pixel consists of three colour components, i.e. red, green and blue. Hence, in the proposed scheme, initially the three colour components are represented into two overlapping blocks like the combination of red and green colour components, while another one is the combination of green and blue colour components, respectively. Later, the PVD technique is employed on each block independently to embed the secret data. The two overlapping blocks are readjusted to attain the modified three colour components. The notion of overlapping blocks has improved the embedding capacity of the cover image. The scheme has been tested on a set of colour images and satisfactory results have been achieved in terms of embedding capacity and upholding the acceptable visual quality of the stego-image.


2014 ◽  
Vol 626 ◽  
pp. 58-64 ◽  
Author(s):  
G.R. Rajesh ◽  
A. Shajin Nargunam

This paper presents an algorithm for hiding information’s in raw video steams using art of steganography using discrete wavelet transform. While mostly applied to still images in the past, it has become very popular for video streams recently. When steganographic methods are applied to digital video streams, the selection of target pixels, which are used to store the secret data, is especially crucial for an effective and successful-embedding process; if pixels are not selected carefully, undesired spatial and temporal perception problems occur in the stegno-video. Typically, an irrecoverable steganography algorithm is the algorithm that makes it hard for malicious third parties to discover how it works and how to recover the secret data out of the carrier file. In this paper, a new embedding algorithm is proposed to hide the secret data in moving videos. The 2D-DCT of the video is taken and the secret message is embedded. The performance measures are evaluated for the quality of the video after the data hiding and show good results.


Sign in / Sign up

Export Citation Format

Share Document