Author
V. Thanikaiselvan
Bio: V. Thanikaiselvan is an academic researcher from VIT University. The author has contributed to research in topic(s): Encryption & Steganography. The author has an hindex of 7, co-authored 38 publication(s) receiving 176 citation(s).
Topics: Encryption, Steganography, Information hiding, Pixel, Cryptography
Papers
More filters
18 Mar 2011
TL;DR: This paper proposes a modern steganographic technique with Integer Wavelet transform (IWT) and double key to achieve high hiding capacity, high security and good visual quality.
Abstract: Steganography is used to hide a secret message within a cover image, thereby yielding a stego image such that even the trace of the presence of secret information is wiped out. The purpose of steganography is to maintain secret communication between two users. Steganography has several technical challenges namely high hiding capacity and imperceptibility. In this paper we propose a modern steganographic technique with Integer Wavelet transform (IWT) and double key to achieve high hiding capacity, high security and good visual quality. Here cover image is converted in to wavelet transform co-efficients and the coefficients are selected randomly by using Key-1 for embedding the data. Key-2 is used to calculate the number of bits to be embedded in the randomly selected coefficients. Finally the Optimum Pixel Adjustment Process (OPAP) is applied to the stego image to reduce the data embedding error.
30 citations
01 Oct 2013
TL;DR: A Color image steganography in transform domain is proposed, which shows good imperceptibility, High capacity and Robustness and Random selection of wavelet coefficients is based on the graph theory.
Abstract: Steganography conceals the secret information inside the cover medium. There are two types of steganography techniques available practically. They are spatial domain steganography and Transform domain steganography. The objectives to be considered in the steganography methods are high capacity, imperceptibility and robustness. In this paper, a Color image steganography in transform domain is proposed. Reversible Integer Haar wavelet transform is applied to the R, G and B planes separately and the data is embedded in a random manner. Random selection of wavelet coefficients is based on the graph theory. This proposed system uses three different keys for embedding and extraction of the secret data, where key1(Subband Selection - SB) is used to select the Wavelet subband for embedding, key2(Selection of Co-effecients-SC) is used to select the co-efficients randomly and key3 (Selection of Bit length-SB) is used to select the number of bits to be embedded in the selected co-efficients. This method shows good imperceptibility, High capacity and Robustness.
20 citations
TL;DR: The proposed method gives high imperceptibility through high PSNR value and high embedding capacity in the cover image due to adaptive embedding scheme and high robustness against blind attack through graph theoretic random selection of coefficients.
Abstract: Modern day information age is enriched with the advanced network communication expertise but unfortunately at the same time encounters infinite security issues when dealing with secret and/or private information. The storage and transmission of the secret information become highly essential and have led to a deluge of research in this field. In this paper, an optimistic effort has been taken to combine graceful graph along with integer wavelet transform (IWT) to implement random image steganography for secure communication. The implementation part begins with the conversion of cover image into wavelet coefficients through IWT and is followed by embedding secret image in the randomly selected coefficients through graph theory. Finally stegoimage is obtained by applying inverse IWT. This method provides a maximum of 44 dB peak signal to noise ratio (PSNR) for 266646 bits. Thus, the proposed method gives high imperceptibility through high PSNR value and high embedding capacity in the cover image due to adaptive embedding scheme and high robustness against blind attack through graph theoretic random selection of coefficients.
19 citations
09 Dec 2011
TL;DR: This paper elucidates the use of Haar Integer Wavelet Transform for Constant and Adaptive number of bit embedding method and finds the method with the highest embedding capacity with high PSNR is adjudged best.
Abstract: Image steganography is a rapidly developing field with immense applications to offer high data security. There are two types’ or rather two domains in which image steganography has been achieved, spatial and frequency domain. Spatial domain steganography focuses on embedding of the payload on the LSB bits of the pixels on the image, while frequency domain steganography focuses on the transformation of the image pixels using various transform algorithms and then embedding data in the transformed pixels. The most commonly used transform mechanism is the IWT (Integer Wavelet Transform) because of the obvious reason that it yields integer coefficients which are very easy to work with. This paper elucidates the use of Haar Integer Wavelet Transform for Constant and Adaptive number of bit embedding method. Both types are analyzed and finally the method with the highest embedding capacity with high PSNR is adjudged best.
15 citations
TL;DR: In this proposed work, multiple security is ensured by formulating Knight's Tour algorithm for random traversing and selecting the order of sub-bands to provide high capacity, security and robustness.
Abstract: In recent times, the use of Internet for data exchange has increased to a great extent. Steganography, cryptography and watermarking are the methods to transfer the data with high security. In this paper, a steganography method with constant bit embedding and adaptive bit embedding in Haar Integer Wavelet Transform domain has been proposed. The adaptive bit embedding provides more security than the constant bit embedding. Here, a mathematical model for Knight's Tour is developed, which adapts random traversing inside the wavelet coefficients to increase the security further. In this proposed work, multiple security is ensured by formulating Knight's Tour algorithm for random traversing and selecting the order of sub-bands to provide high capacity, security and robustness. Copyright © 2015 John Wiley & Sons, Ltd.
10 citations
Cited by
More filters
TL;DR: The Corvus corone module two-way image transmission is proposed that provides energy efficiency along CS model, secured transmission through a matrix of security under CS such as inbuilt method, which was named as compressed secured matrix and faultless reconstruction along that of eminent random matrix counting under CS.
Abstract: The manufacturing of intelligent and secure visual data transmission over the wireless sensor network is key requirement nowadays to many applications. The two-way transmission of image under a wireless channel needed image must compatible along channel characteristics such as band width, energy-efficient, time consumption and security because the image adopts big space under the device of storage and need a long time that easily undergoes cipher attacks. Moreover, Quizzical the problem for the additional time under compression results that, the secondary process of the compression followed through the acquisition consumes more time.,Hence, for resolving these issues, compressive sensing (CS) has emerged, which compressed the image at the time of sensing emerges as a speedy manner that reduces the time consumption and saves bandwidth utilization but fails under secured transmission. Several kinds of research paved path to resolve the security problems under CS through providing security such as the secondary process.,Thus, concerning the above issues, this paper proposed the Corvus corone module two-way image transmission that provides energy efficiency along CS model, secured transmission through a matrix of security under CS such as inbuilt method, which was named as compressed secured matrix and faultless reconstruction along that of eminent random matrix counting under CS.,Experimental outputs shows intelligent module gives energy efficient, secured transmission along lower computational timing also decreased bit error rate.
179 citations
TL;DR: Experimental results outwards show that the intelligent module provides energy-efficient, secured transmission with low computational time as well as a reduced bit error rate, which is a key requirement considering the intelligent manufacturing of VSNs.
Abstract: Due to technology advancement, smart visual sensing required in terms of data transfer capacity, energy-efficiency, security, and computational-efficiency. The high-quality image transmission in visual sensor networks (VSNs) consumes more space, energy, transmission delay which may experience the various security threats. Image compression is a key phase of visual sensing systems that needs to be effective. This motivates us to propose a fast and efficient intelligent image transmission module to achieve the energy-efficiency, minimum delay, and bandwidth utilization. Compressive sensing (CS) introduced to speedily compressed the image to reduces the consumption of energy, time minimization, and efficient bandwidth utilization. However, CS cannot achieve security against the different kinds of threats. Several methods introduced since the last decade to address the security challenges in the CS domain, but efficiency is a key requirement considering the intelligent manufacturing of VSNs. Furthermore, the random variables selected for the CS having the problem of recovering the image quality due to the accumulation of noise. Thus concerning the above challenges, this paper introduced a novel one-way image transmission module in multiple input multiple output that provides secure and energy-efficient with the CS model. The secured transmission in the CS domain proposed using the security matrix which is called a compressed secured matrix and perfect reconstruction with the random matrix measurement in the CS. Experimental results outwards that the intelligent module provides energy-efficient, secured transmission with low computational time as well as a reduced bit error rate.
174 citations
TL;DR: This is Applied Cryptography Protocols Algorithms And Source Code In C Applied Cryptographic Protocols algorithms and Source Code in C By Schneier Bruce Author Nov 01 1995 the best ebook that you can get right now online.
Abstract: ebooks and guide Applied Cryptography Protocols Algorithms And Source Code In C Applied Cryptography Protocols Algorithms And Source Code In C By Schneier Bruce Author Nov 01 1995. This is Applied Cryptography Protocols Algorithms And Source Code In C Applied Cryptography Protocols Algorithms And Source Code In C By Schneier Bruce Author Nov 01 1995 the best ebook that you can get right now online.
135 citations
TL;DR: A thorough review of existing types of image steganography and the recent contributions in each category in multiple modalities including general operation, requirements, different aspects, different types and their performance evaluations is provided.
Abstract: Storing and communicating secret and/or private information has become part of our daily life whether it is for our employment or personal well-being. Therefore, secure storage and transmission of the secret information have received the undivided attention of many researchers. The techniques for hiding confidential data in inconspicuous digital media such as video, audio, and image are collectively termed as Steganography. Among various media types used, the popularity and availability of digital images are high and in this research work and hence, our focus is on implementing digital image steganography. The main challenge in designing a steganographic system is to maintain a fair trade-off between robustness, security, imperceptibility and higher bit embedding rate. This research article provides a thorough review of existing types of image steganography and the recent contributions in each category in multiple modalities. The article also provides a complete overview of image steganography including general operation, requirements, different aspects, different types and their performance evaluations. Different performance analysis measures for evaluating steganographic system are also discussed here. Moreover, we also discuss the strategy to select different cover media for different applications and a few state-of-the-art steganalysis systems.
112 citations
01 Jun 2017
TL;DR: Experimental results shows that the proposed steganography method has high capability in hiding information in any images which used as a cover media, and the proposed chaotic map randomness and sensitivity to smallest changes.
Abstract: The art and science of hiding information by embedding messages in various type of digital media is called steganography. This method performs by replacing bits of multimedia files (such as graphics, sounds and texts) with bits of secret message. The information that embeds in the cover media can be plain text, cipher text and even images. Steganography sometimes is used when encryption is not permitted or more commonly, steganography is supplement for encryption. By using steganography, if the encrypted file is deciphered, the encrypted file may still hide information. This paper is proposed a new transform domain steganography method based on integer wavelet transform (IWT) for digital images and also it used a chaotic map. This map is a modified logistic map which it increases the key length and security of proposed method. Experimental results shows that the proposed method has high capability in hiding information in any images which used as a cover media. Visual quality of image after embedding process is desirable due to Peak Signal-to-Noise Ratio (PSNR) measures. Also the NIST, DIEHARD and ENT tests suite show the proposed chaotic map randomness and sensitivity to smallest changes.
55 citations