scispace - formally typeset
Search or ask a question
Author

G. Prabakaran

Bio: G. Prabakaran is an academic researcher from Annamalai University. The author has contributed to research in topics: Second-generation wavelet transform & Wavelet packet decomposition. The author has an hindex of 4, co-authored 8 publications receiving 124 citations.

Papers
More filters
Proceedings ArticleDOI
21 Mar 2012
TL;DR: The results show that the proposed algorithm for modified steganography is highly secured with certain strength in addition to good perceptual invisibility.
Abstract: Steganography, the secret image is embedded in the cover image and transmitted in such a way that the existence of information is undetectable. The digital images, videos, sound files and other computer files can be used as carrier to embed the information. In this paper, we propose a modified secure and high capacity based steganography scheme of hiding a large-size secret image into a small-size cover image. Arnold transformation is performed to scrambles the secret image. Discrete Wavelet Transform (DWT) is performed in both images and followed by Alpha blending operation. Then the Inverse Discrete Wavelet Transformation (IDWT) is applied to get the stego image. We have investigated the performance of our scheme by comparing various qualities of the stego image and cover image. The results show that the proposed algorithm for modified steganography is highly secured with certain strength in addition to good perceptual invisibility.

70 citations

Proceedings ArticleDOI
15 Apr 2013
TL;DR: A video watermarking with text data (verification message) by using the Quick Response (QR) Code technique can achieved acceptable imperceptibility and certain robustness in video processing.
Abstract: Nowadays, Digital video is one of the popular multimedia data exchanged in the internet. Commercial activity on the internet and media require protection to enhance security. The 2D Barcode with a digital watermark is a widely interesting research in the security field. In this paper propose a video watermarking with text data (verification message) by using the Quick Response (QR) Code technique. The QR Code is prepared to be watermarked via a robust video watermarking scheme based on the (singular value decomposition)SVD and (Discrete Wavelet Transform)DWT. In addition to that logo (or) watermark gives the authorized ownership of video document. SVD is an attractive algebraic transform for watermarking applications. SVD is applied to the cover I-frame. The extracted diagonal value is fused with logo (or) watermark. DWT is applied on SVD cover image and QR code image. The inverse transform on watermarked image and add the frame into video this watermarked (include logo and QR code image) the video file sends to authorized customers. In the reverse process check the logo and QR code for authorized ownership. These experimental results can achieved acceptable imperceptibility and certain robustness in video processing.

22 citations

Proceedings ArticleDOI
15 Apr 2013
TL;DR: This method concentrated for perfecting the visual effect of the stego image and robustness against the various attacks by using different wavelet families and statistical methods achieved acceptable imperceptibility and certain robustness.
Abstract: Steganography is the discipline of exchanging top secret information by embedding it into a multimedia carrier. The ultimate aim, here is to hide the very existence of the embedded information within seemingly innocuous carriers. The proposed method extracts either Discrete Wavelet Transform (DWT) or Integer Wavelet Transform (IWT) coefficients of both cover image and secret image. After that two extracted coefficient values are embedded by fusion processing technique. Then the stego image is obtained by applying various combinations of DWT and IWT on both images. In this method, we concentrated for perfecting the visual effect of the stego image and robustness against the various attacks by using different wavelet families. Finally performance evaluation is done on dual transform steganography using wavelet families and statistical methods. In our method achieved acceptable imperceptibility and certain robustness.

20 citations

Proceedings ArticleDOI
06 Mar 2014
TL;DR: The experimental Results show that dual based approach achieved high capability and high security of the system in B-Channel and conjointly improves the performance of steganography system.
Abstract: Steganography is an art of activity the data within the cover like the simplest way that, it's like straightforward cover, though its hidden information. In this paper, secret image is activity into two completely different domains like as IWT (Integer Wavelet Transform) and DWT (Discrete Wavelet Transform). The cover image and secret image coefficient values square measure embedded by 512*512 exploitation fusion process techniques. We tend to applied numerous combinations of DWT and IWT on each images and obtained a decent quality stego images. The each domain offers safer with secret key and sure robustness of our algorithm. This dual wavelet transform utilized in Color Image Steganography Method (DWTSM) in Blue Channel (B-Channel) provides high capability and security. This proposed algorithm is tested with image quality parameters and compared to other algorithms. The experimental Results show that dual based approach achieved high capability and high security of our system in B-Channel and conjointly improves the performance of steganography system. The proposed algorithm achieved high PSNR quantitative relation 45 to 55 and other parameter values achieved the best solution and this methodology compared to different combination of transform.

8 citations

Proceedings ArticleDOI
08 Sep 2014
TL;DR: The proposed algorithm achieved high PSNR ratio and other parameter values achieved the optimal solution and this method compared to other combination of transform.
Abstract: Steganography is the Art and Science of hiding the information and remarkable cover media. So, as not to arouse on Eaviesdropper's suspicion. In this paper, secret image is hide into two different domains like as IWT (Integer Wavelet Transform) and DWT (Discrete Wavelet Transform). The cover image and secret image co-efficient values are embedded by 512*512 using fusion process techniques. We applied various combinations of DWT and IWT on both images and obtained a good quality stego images. The both domain gives more secure with secret key and certain robustness of our algorithm. ThisDual Wavelet Transform Used in Color Image Steganography Method(DWTSM)model provides high capacity and security. This proposed algorithm is tested with image quality parameters and compared to other algorithms. The experimental Results show that dual based approach achieved high capacity and high security of our system and also improves the performance of steganography system. The proposed algorithm achieved high PSNR ratio and other parameter values achieved the optimal solution and this method compared to other combination of transform.

4 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: A review of fundamental concepts, evaluation measures and security aspects of steganography system, various spatial and transform domain embedding schemes, and current research trends and directions to improve on existing methods are suggested.

273 citations

Proceedings ArticleDOI
15 Apr 2015
TL;DR: A high embedding payload of video steganography algorithm has been proposed based on the BCH coding to improve the security of the algorithm and is compared to both the Least Significant Bit (LSB) and [1] algorithms.
Abstract: Video steganography has become a popular topic due to the significant growth of video data over the Internet. The performance of any steganography algorithm depends on two factors: embedding efficiency and embedding payload. In this paper, a high embedding payload of video steganography algorithm has been proposed based on the BCH coding. To improve the security of the algorithm, a secret message is first encoded by BCH(n, k, t) coding. Then, it is embedded into the discrete wavelet transform (DWT) coefficients of video frames. As the DWT middle and high frequency regions are considered to be less sensitive data, the secret message is embedded only into the middle and high frequency DWT coefficients. The proposed algorithm is tested under two types of videos that contain slow and fast motion objects. The results of the proposed algorithm are compared to both the Least Significant Bit (LSB) and [1] algorithms. The results demonstrate better performance for the proposed algorithm than for the others. The hiding ratio of the proposed algorithm is approximately 28%, which is evaluated as a high embedding payload with a minimal tradeoff of visual quality. The robustness of the proposed algorithm was tested under various attacks. The results were consistent.

56 citations

01 Jan 2013
TL;DR: The main objectives of steganography are undetectability, robustness, and capacity of the hidden data and these are the main factors which make it different from other techniques watermarking and cryptography.
Abstract: Steganography can be defined as the study of invisible communication that usually deals with the ways of hiding the existence of the communicated message. If it is achieved successfully, the message does not attract attention from eavesdroppers and attackers. The main objectives of steganography are undetectability, robustness (resistance to various image processing methods and compression) and capacity of the hidden data. These are the main factors which make it different from other techniques watermarking and cryptography. This paper includes the important steganography methods and the main focus is on the review of steganography in digital images.

44 citations

Journal ArticleDOI
TL;DR: This work designs a QWs-based novel image steganography mechanism for cloud systems, which the embedding/extraction process for the secret object is based on quantum concepts and opens the door for quantum technologies to be combined with information hiding techniques to achieve better security.
Abstract: The central role of the cloud data warehouse is to ensure the security of confidential data that can be achieved via techniques of steganography and cryptography. Amidst the growth of quantum computation, modern data security tools may be cracked because of its structure based on mathematical computations. Quantum walk (QW) acts as a vital role in designing quantum algorithms, which is a universal computational model. Therefore, we allocate the advantages of QWs to design a QWs-based novel image steganography mechanism for cloud systems, which the embedding/extraction process for the secret object is based on quantum concepts. The presented technique has three algorithms of image steganography. The core idea for presenting these algorithms is to embed the sensitive object into the host media without a pre-encryption process for the secret data, which its security and embedding procedures are entirely based on quantum walks. As well opens the door for quantum technologies to be combined with information hiding techniques to achieve better security. The presented technique uses gray-scale or color images as a confidential object to be hidden into the carrier image, as well the embedded object can be any data, e.g. text or audio files and not restricted to image files. Security analysis and experimental results confirm that the suggested algorithms have good visual quality and high-security based on QWs as well high embedding capacity.

43 citations

Proceedings ArticleDOI
01 May 2015
TL;DR: A novel video steganography algorithm in the wavelet domain based on the KLT tracking algorithm and BCH codes is proposed, which has demonstrated a high embedding efficiency and a highembedding payload.
Abstract: Recently, video steganography has become a popular option for a secret data communication. The performance of any steganography algorithm is based on the embedding efficiency, embedding payload, and robustness against attackers. In this paper, we propose a novel video steganography algorithm in the wavelet domain based on the KLT tracking algorithm and BCH codes. The proposed algorithm includes four different phases. First, the secret message is preprocessed, and BCH codes (n, k, t) are applied in order to produce an encoded message. Second, face detection and face tracking algorithms are applied on the cover videos in order to identify the facial regions of interest. Third, the process of embedding the encoded message into the high and middle frequency wavelet coefficients of all facial regions is performed. Forth, the process of extracting the secret message from the high and middle frequency wavelet coefficients for each RGB components of all facial regions is accomplished. Experimental results of the proposed video steganography algorithm have demonstrated a high embedding efficiency and a high embedding payload.

41 citations