scholarly journals Spectral Graph Wavelet Based Image Steganography Using SVD and Arnold Transform

2021 ◽  
Vol 38 (4) ◽  
pp. 1113-1121
Author(s):  
Shikha Chaudhary ◽  
Saroj Hiranwal ◽  
Chandra Prakash Gupta

Steganography is the process of concealing sensitive information within cover medium. This study offers an efficient and safe innovative image steganography approach based on graph signal processing (GSP). To scramble the secret image, Arnold cat map transform is used, then Spectral graph wavelet is used to change the cover and scrambled secret image, followed by singular vector decomposition (SVD) of the modified cover image. To create the stego image, an alpha blending process is used. To produce the stego image, GSP-based synthesis is used. By maintaining the inter-pixel correlation, GSP improves the visual quality of the produced stego image. The effects of image processing attacks on the suggested approach are examined. The investigational results and assessment indicate that the proposed steganography scheme is more efficient and robust in terms of quality measures. The quality of stego image is evaluated in respect of PSNR, NCC, SC and AD performance metrics.

2021 ◽  
Vol 2021 ◽  
pp. 1-14
Author(s):  
Xinliang Bi ◽  
Xiaoyuan Yang ◽  
Chao Wang ◽  
Jia Liu

Steganography is a technique for publicly transmitting secret information through a cover. Most of the existing steganography algorithms are based on modifying the cover image, generating a stego image that is very similar to the cover image but has different pixel values, or establishing a mapping relationship between the stego image and the secret message. Attackers will discover the existence of secret communications from these modifications or differences. In order to solve this problem, we propose a steganography algorithm ISTNet based on image style transfer, which can convert a cover image into another stego image with a completely different style. We have improved the decoder so that the secret image features can be fused with style features in a variety of sizes to improve the accuracy of secret image extraction. The algorithm has the functions of image steganography and image style transfer at the same time, and the images it generates are both stego images and stylized images. Attackers will pay more attention to the style transfer side of the algorithm, but it is difficult to find the steganography side. Experiments show that our algorithm effectively increases the steganography capacity from 0.06 bpp to 8 bpp, and the generated stylized images are not significantly different from the stylized images on the Internet.


2013 ◽  
Vol 7 (3) ◽  
pp. 1-15 ◽  
Author(s):  
Omar Banimelhem ◽  
Lo’ai Tawalbeh ◽  
Moad Mowafi ◽  
Mohammed Al-Batati

This paper proposes a more secure image hiding scheme using Optimal Pixel Adjustment Process (OPAP) and Genetic Algorithm (GA). The security issues of key selection that is used in image hiding are addressed. Thus, a more secure scheme is proposed in order to improve the security as well as the quality of the stego-image. Since GA is a semi-blind algorithm, it may select a key that affects the security. Therefore, the authores improve the security by applying image transformation not only using the GA key, but also using a user key. The user key is used to disarrange the pixel locations of the secret image. Then, the GA, using OPAP, selects the key that maximizes the quality as well as the security of the stego-image. From implementation point of view, the scheme uses a simple and fast transformation method that increases the difference between the secret image and its transformed version. The results showed that the resultant disarranged image cannot be detected, and at the same time the stego-image quality is still high.


Author(s):  
Balkar Singh

In this paper, a novel image steganography approach is proposed to enhance the visual quality of stego image. The cover image is decomposed using Discrete Wavelet Transform (DWT) to produce wavelet subbands and threshold value is calculated for each higher frequency wavelet subbands. Wavelet coefficients having magnitude larger than the threshold of its subband are selected to embed the secret data. Semi Hexadecimal Code (SHC) is proposed to convert pixel value of secret image into smaller equivalent value so that it distorts stego image as less as possible. Experimental results shows that maximum PSNR between cover image and stego image is more than 75 dB .Proposed approach is also compared with the existing approaches and this comparison shows that the proposed approach is better than the existing approaches. 


2021 ◽  
Author(s):  
Nandhini Subramanian ◽  
, Jayakanth Kunhoth ◽  
Somaya Al-Maadeed ◽  
Ahmed Bouridane

COVID pandemic has necessitated the need for virtual and online health care systems to avoid contacts. The transfer of sensitive medical information including the chest and lung X-ray happens through untrusted channels making it prone to many possible attacks. This paper aims to secure the medical data of the patients using image steganography when transferring through untrusted channels. A deep learning method with three parts is proposed – preprocessing module, embedding network and the extraction network. Features from the cover image and the secret image are extracted by the preprocessing module. The merged features from the preprocessing module are used to output the stego image by the embedding network. The stego image is given as the input to the extraction network to extract the ingrained secret image. Mean Squared Error (MSE) and Peak Signal-to-Noise Ratio (PSNR) are the evaluation metrics used. Higher PSNR value proves the higher security; robustness of the method and the image results show the higher imperceptibility. The hiding capacity of the proposed method is 100% since the cover image and the secret image are of the same size.


2017 ◽  
Vol 2 (1) ◽  
pp. 1-11 ◽  
Author(s):  
De Rosal Ignatius Moses Setiadi ◽  
Eko Hari Rachmawanto ◽  
Christy Atika Sari

Rapid development of Internet makes transactions message even easier and faster. The main problem in the transactions message is security, especially if the message is private and secret. To secure these messages is usually done with steganography or cryptography. Steganography is a way to hide messages into other digital content such as images, video or audio so it does not seem nondescript from the outside. While cryptography is a technique to encrypt messages so that messages can not be read directly. In this paper have proposed combination of steganography using discrete cosine transform (DCT) and cryptography using the one-time pad or vernam cipher implemented on a digital image. The measurement method used to determine the quality of stego image is the peak signal to noise ratio (PSNR) and ormalize cross Correlation (NCC) to measure the quality of the extraction of the decrypted message. Of steganography and encryption methods proposed obtained satisfactory results with PSNR and NCC high and resistant to JPEG compression and median filter. Keywords—Image Steganography, Discrete Cosine Transform (DCT), One Time Pad, Vernam, Chiper, Image Cryptography


Author(s):  
Boopathi. G et al.

The increased popularity of digital media has raised serious concerns over its security related issues. Security attacks in the form of eavesdropping, masquerading and tampering and in many other forms is very common nowadays. Data hiding is one of the emerging techniques that aim to provide for security by hiding secret information into the multimedia contents by altering some nonessential components in the host or cover file. Security of data is very important in data communication. Everyday a lot of information is transferred from one user to another on internet and so the possibility of data theft also increases. Steganography provides a solution for the security of information during data transmission. Steganography is the science which makes the valuable information invisible to prevent it from unauthorized user. A steganography system, in general, is expected to meet three key requirements, namely, imperceptibility of embedding, accurate recovery of embedded information, and large payload (payload is the bits that get delivered to the end user at the destination). So in this project an image steganography technique is proposed to hide the documents in image in the transform domain using CMD approach. The document files are carried by the image without revealing the existence to anybody. When the secret information is hidden in the carrier the result is the stego signal. In this work, the results show good quality stego signal and the stego signal is analyzed for different attacks. The stego signals are transferred to multiple receivers based on network strategies. It is found that the technique is robust and it can withstand the attacks. The quality of the stego image is measured by Peak Signal to Noise Ratio (PSNR) and other measurements.


2020 ◽  
Author(s):  
Jagan Raj Jayapandiyan ◽  
C. Kavitha Kavitha ◽  
K. Sakthivel Sakthivel

In this proposed research work, an attempt has been made to use multiple image files for steganography encoding along with the capability of secret text recovery in the event of any image corruption during the transit. This algorithm is effective on the security factor of secret image since the embedded checksum will validate for any unauthorized users or intruders attempt to corrupt the picture in any aspect. If any of the stego image underwent any steganalysis or MiM attack, then this proposed algorithm can effectively regenerate the content of one stego image using other intact stego images received in the receiving end.


Author(s):  
Rajashree Gajabe ◽  
Syed Taqi Ali

Day by day, the requirement for secure communication among users is rising in a digital world, to protect the message from the undesirable users. Steganography is a methodology that satisfies the user’s necessity of secure communication by inserting a message into different formats. This paper proposes a secret key-based image steganography to secure the message by concealing the grayscale image inside a cover image. The proposed technique shares the 20 characters long secret key between two clients where the initial eight characters of a secret key are utilized for bit permutation of characters and pixels while the last 12 characters of secret key decide the encryption keys and position of pixels of a grayscale image into the cover. The grayscale image undergoes operation such as encryption and chaotic baker followed by its hiding in a cover to form a stego image. The execution of the proposed strategy is performed on Matlab 2018. It shows that the proposed approach manages to store the maximum message of size 16[Formula: see text]KB into the cover of size [Formula: see text]. The image quality of stego images has been evaluated using PSNR, MSE. For a full payload of 16[Formula: see text]KB, PSNR is around 51[Formula: see text]dB to 53[Formula: see text]dB which is greater than satisfactory PSNR.


2020 ◽  
Vol 6 (2) ◽  
pp. 89-100
Author(s):  
Dian Hafidh Zulfikar

One of the container media that is available and popular is the Joint Photographic Experts Group (JPEG) format image. This article aims to determine the effect of Quality Factor on the secret message capacity of JPEG image steganography and stego image quality. The quality of an image can actually be seen subjectively with the human eye, but this is relative between each individual. Because the assessment of the human eye varies from person to person. In addition, the effect of Quality Factor on secret message capacity is not yet known whether it has an impact. Therefore, in this study the Quality Factor is used to objectively see the secret message capacity of the JPEG image steganography and the quality of the stego image. The parameter used to determine the quality of an image is the Peak Signal to Noise Ratio (PSNR). PSNR will compare the quality of the original image (before steganography) with the stego image. The test results show that the Q Factor effect can affect the secret message capacity of the JPEG image steganography and the stego image quality. The bigger the Q Factor, the more the message capacity is generated. The greater the Q factor, the better the quality of the resulting stego image.


2019 ◽  
Vol 17 (2) ◽  
pp. 154-161 ◽  
Author(s):  
Vijay Sharma ◽  
Devesh Srivastava ◽  
Pratistha Mathur

Steganography is a capability which conceals the top-secret information into cover media (e.g., digital images, sound files etc.,). This Paper presents a secure, higher embedding capacity Discrete Wavelet Transformation (DWT) based technique. Before embedding correlation in between cover and the secret image is increased by multiplying some variable (i.e., 1/k) to the secret image. In embedding process, the Daubechies DWT of both Arnold transformed secret and cover images are taken followed by alpha blending operation. Arnold is a type of scrambling process which increases the confidentiality of secret image and alpha blending is a type of mixing operation of two images, the alpha value indicates the amount of secret image is embedded into the cover image. Daubechies Inverse Discrete Wavelet Transformation (IDWT) of the resulting image is performed to obtain the stego image. Smoothing operation inspired by the Genetic Algorithm (GA) is used to improve the quality of stego-image by minimizing Mean square error and morphological operation is used to extract the image component from the extracted secret image. Simulation results of the proposed steganography technique are also presented. The projected method is calculated on different parameters of image visual quality measurements


Sign in / Sign up

Export Citation Format

Share Document