Secure Text Sharing Using Medical Image Steganography

Author(s):  
Boopathi. G et al.

The increased popularity of digital media has raised serious concerns over its security related issues. Security attacks in the form of eavesdropping, masquerading and tampering and in many other forms is very common nowadays. Data hiding is one of the emerging techniques that aim to provide for security by hiding secret information into the multimedia contents by altering some nonessential components in the host or cover file. Security of data is very important in data communication. Everyday a lot of information is transferred from one user to another on internet and so the possibility of data theft also increases. Steganography provides a solution for the security of information during data transmission. Steganography is the science which makes the valuable information invisible to prevent it from unauthorized user. A steganography system, in general, is expected to meet three key requirements, namely, imperceptibility of embedding, accurate recovery of embedded information, and large payload (payload is the bits that get delivered to the end user at the destination). So in this project an image steganography technique is proposed to hide the documents in image in the transform domain using CMD approach. The document files are carried by the image without revealing the existence to anybody. When the secret information is hidden in the carrier the result is the stego signal. In this work, the results show good quality stego signal and the stego signal is analyzed for different attacks. The stego signals are transferred to multiple receivers based on network strategies. It is found that the technique is robust and it can withstand the attacks. The quality of the stego image is measured by Peak Signal to Noise Ratio (PSNR) and other measurements.

2017 ◽  
Vol 2 (1) ◽  
pp. 1-11 ◽  
Author(s):  
De Rosal Ignatius Moses Setiadi ◽  
Eko Hari Rachmawanto ◽  
Christy Atika Sari

Rapid development of Internet makes transactions message even easier and faster. The main problem in the transactions message is security, especially if the message is private and secret. To secure these messages is usually done with steganography or cryptography. Steganography is a way to hide messages into other digital content such as images, video or audio so it does not seem nondescript from the outside. While cryptography is a technique to encrypt messages so that messages can not be read directly. In this paper have proposed combination of steganography using discrete cosine transform (DCT) and cryptography using the one-time pad or vernam cipher implemented on a digital image. The measurement method used to determine the quality of stego image is the peak signal to noise ratio (PSNR) and ormalize cross Correlation (NCC) to measure the quality of the extraction of the decrypted message. Of steganography and encryption methods proposed obtained satisfactory results with PSNR and NCC high and resistant to JPEG compression and median filter. Keywords—Image Steganography, Discrete Cosine Transform (DCT), One Time Pad, Vernam, Chiper, Image Cryptography


2020 ◽  
Vol 6 (2) ◽  
pp. 89-100
Author(s):  
Dian Hafidh Zulfikar

One of the container media that is available and popular is the Joint Photographic Experts Group (JPEG) format image. This article aims to determine the effect of Quality Factor on the secret message capacity of JPEG image steganography and stego image quality. The quality of an image can actually be seen subjectively with the human eye, but this is relative between each individual. Because the assessment of the human eye varies from person to person. In addition, the effect of Quality Factor on secret message capacity is not yet known whether it has an impact. Therefore, in this study the Quality Factor is used to objectively see the secret message capacity of the JPEG image steganography and the quality of the stego image. The parameter used to determine the quality of an image is the Peak Signal to Noise Ratio (PSNR). PSNR will compare the quality of the original image (before steganography) with the stego image. The test results show that the Q Factor effect can affect the secret message capacity of the JPEG image steganography and the stego image quality. The bigger the Q Factor, the more the message capacity is generated. The greater the Q factor, the better the quality of the resulting stego image.


This chapter introduces the reader to cryptography, steganography, watermarking, and quality parameters of image steganography techniques. Cryptography is a technique for secret communication. Steganography is a technique for secret and unnoticeable communication. The watermarking techniques hide watermarks inside the digital media. There are four types of steganography techniques: (1) image steganography, (2) audio steganography, (3) video steganography, and (4) text steganography. The quality of image steganographic algorithms can be measured by three parameters like (1) hiding capacity, (2) distortion measure, and (3) security check.


2021 ◽  
Vol 2021 ◽  
pp. 1-14
Author(s):  
Xinliang Bi ◽  
Xiaoyuan Yang ◽  
Chao Wang ◽  
Jia Liu

Steganography is a technique for publicly transmitting secret information through a cover. Most of the existing steganography algorithms are based on modifying the cover image, generating a stego image that is very similar to the cover image but has different pixel values, or establishing a mapping relationship between the stego image and the secret message. Attackers will discover the existence of secret communications from these modifications or differences. In order to solve this problem, we propose a steganography algorithm ISTNet based on image style transfer, which can convert a cover image into another stego image with a completely different style. We have improved the decoder so that the secret image features can be fused with style features in a variety of sizes to improve the accuracy of secret image extraction. The algorithm has the functions of image steganography and image style transfer at the same time, and the images it generates are both stego images and stylized images. Attackers will pay more attention to the style transfer side of the algorithm, but it is difficult to find the steganography side. Experiments show that our algorithm effectively increases the steganography capacity from 0.06 bpp to 8 bpp, and the generated stylized images are not significantly different from the stylized images on the Internet.


Author(s):  
SOFIA SAIDAH ◽  
NUR IBRAHIM ◽  
MOCHAMMAD HALDI WIDIANTO

ABSTRAKPada studi ini, dilakukan penggabungan metode - metode untuk memperkuat dan meningkatkan sisi keamanan proses pertukaran informasi atau pesan digital. Metode yang digunakan diantaranya adalah metode kriptografi dan metode steganografi. Implementasi pada sistem yang dibangun dilakukan dengan menyandikan pesan pada penerapan metode steganografi citra dalam menyembunyikan pesan tersandi yang dihasilkan ke dalam sebuah citra warna (RGB) dalam domain Discrete Cosine Transform dengan teknik penyisipan Spread Spectrum. Hasil penelitian menunjukan bahwa kualitas dari stego image sangat mirip dengan cover citra yang digunakan, berdasarkan perolehan nilai performansi objektif PSNR diatas 30 db dan subjektif MOS di atas nilai 4.Kata kunci: Steganografi, Discrete Cosine Transform, Spread Spectrum, PSNR, SNR ABSTRACTIn this study, a combination of methods was used to strengthen and enhance the security side of the process of exchanging information or digital messages. The methods used include cryptographic methods and steganography methods. The implementation of the system built is done by encoding the message on the application of the image steganography method in hiding the encrypted message generated into a color image (RGB) in the Discrete Cosine Transform domain with the Spread Spectrum insertion technique. The results of the study show that the quality of the stego image is very similar to the cover image used, based on the acquisition of an objective performance value of PSNR above 30 db and subjective MOS above a value of 4.Keywords: Steganografi, Discrete Cosine Transform, Spread Spectrum, PSNR, SNR


2020 ◽  
Vol 10 (2) ◽  
Author(s):  
Yusliza Yusoff ◽  
Tassvini A/P Gunaseharan ◽  
Tassvini A/P Gunaseharan

Image steganography is a process of hiding message behind an image file which focuses on protecting the existence of a message secret. There is a security risk in the current image steganography process. Since stego-image will be transferred on unsecured Internet network, attackers will attack and try to decode the message behind the stego-image because of the vulnerable algorithm. Therefore, it is very important to search for a method to make the process of encoding the stego-image more secure. There are many algorithms developed to make the stego-image become more secured. However, the usage of Knight Tour (KT) and Rivest Cipher Four (RC4) algorithms in image steganography are still insufficient although that the algorithms are claimed to be secured and robust. KT algorithm is an easy mathematical technique that can increase the security of hidden information, meanwhile, RC4 is known as a simple algorithm but systematic in cover image programming. In this paper, the performance of KT and RC4 algorithms are observed to measure the security and robustness of JPG image format. Peak Signal to Noise Ratio (PSNR) and Mean Square Error (MSE) are used to observe the image quality to improve the security factor in the stego-image. From the results, it is found that KT generated better performance compared to RC4. 


Author(s):  
Oluwaseun M. Alade ◽  
Elizabeth A. Amusan ◽  
Oluyinka T. Adedeji ◽  
Oluwaseun O. Alo

Steganography deals with the ways of hiding communicated data in such a way that it remains confidential. Finding best position inside cover image to embed text message, maintaining a reasonable trade-off between security, robustness, higher bit embedding rate and imperceptibility are some of the challenges of steganography system. Hence, this paper presents firefly algorithm for finding best positions inside cover image in order to embed text message into cover image using Pixel Value Differencing (PVD) technique. Four different cover image was used. Experimental result showed the cover image with selected location using firefly algorithm as well as the stego image using PVD technique. The stego image was evaluated using Peak Signal to Noise Ratio (PSNR) and Mean square Error (MSE).  Firefly Algorithm with PVD technique produced a promising result for image steganography.


Author(s):  
Diptasree Debnath ◽  
Emlon Ghosh ◽  
Barnali Gupta Banik

Steganography is a widely-used technique for digital data hiding. Image steganography is the most popular among all other kinds of steganography. In this article, a novel key-based blind method for RGB image steganography where multiple images can be hidden simultaneously is described. The proposed method is based on Discrete Cosine Transformation (DCT) and Discrete Wavelet Transformation (DWT) which provides enhanced security as well as improve the quality of the stego. Here, the cover image has been taken as RGB although the method can be implemented on grayscale images as well. The fundamental concept of visual cryptography has been utilized here in order to increase the capacity to a great extent. To make the method more robust and imperceptible, pseudo-random number sequence and a correlation coefficient have been used for embedding and the extraction of the secrets, respectively. The robustness of the method is tested against steganalysis attacks such as crop, rotate, resize, noise addition, and histogram equalization. The method has been applied on multiple sets of images and the quality of the resultant images have been analyzed through various matrices namely ‘Peak Signal to Noise Ratio,' ‘Structural Similarity index,' ‘Structural Content,' and ‘Maximum Difference.' The results obtained are very promising and have been compared with existing methods to prove its efficiency.


Author(s):  
Chantana Chantrapornchai ◽  
Jitdumrong Preechasuk

Steganography is one of the techniques used to communicate secret data through the cover media such as images, videos, audio, texts etc. In this work, we consider the algorithms of steganography based on DCT and wavelet transform. The aspects of media quality after hiding the information in the digital media are considered. Particularly, we compare the performance of the prototype algorithms, representing the DCT and wavelet-based image steganography algorithms respectively, using the PSNR, capacity, robustness and accuracy aspects. For video steganography, with various wavelet transforms, we compare the quality of the derived information, when frames are dropped and the effects of payload is studied. The application of using such steganography algorithm which can embed multiple messages, each of which requires a separate key is proposed. The application can estimate the capacity used and capacity remains for the given cover image and texts.


2018 ◽  
Vol 8 (11) ◽  
pp. 2199 ◽  
Author(s):  
Abdul Zakaria ◽  
Mehdi Hussain ◽  
Ainuddin Wahab ◽  
Mohd Idris ◽  
Norli Abdullah ◽  
...  

Steganography is the art and practice of communication using hidden messages. The least significant bits (LSB) based method is the well-known type of steganography in the spatial domain. Usually, achieving the larger embedding capacity in LSB-based methods requires a large number of LSB bits modification which indirectly reduces the visual quality of stego-image and increases the risk of steganalysis detection attacks. In this study, we propose a novel steganography method with data mapping strategy which can reduce the number of bits modification per pixel. In the proposed method, four secret data bits are mapped with the four most significant bits of a cover pixel. Furthermore, the only two LSBs of a pixel are modified to indicate the mapping strategy. Experimental results show that the proposed method is able to achieve 3.48% larger embedding capacity while enhancing the visual quality (i.e., peak signal to noise ratio (PSNR) 3.73 dB) and reducing the modification of 0.76 bits per pixel. Moreover, the proposed method provides security against basic Regular and Singular groups (RS) steganalysis and histogram steganalysis detection attacks.


Sign in / Sign up

Export Citation Format

Share Document