scispace - formally typeset
Open AccessJournal ArticleDOI

A Framework of Secured Embedding Scheme Using Vector Discrete Wavelet Transformation and Lagrange Interpolation

Reads0
Chats0
TLDR
A new Lagrange interpolation-based encryption method is introduced to achieve high security of the hidden information with higher payload and better visual quality.
Abstract
Information hiding techniques have a significant role in recent application areas. Steganography is the embedding of information within an innocent cover work in a way which cannot be detected by any person without accessing the steganographic key. The proposed work uses a steganographic scheme for useful information with the help of human skin tone regions as cover image. The proposed algorithm has undergone Lagrange interpolation encryption for enhancement of the security of the hidden information. First, the skin tone regions are identified by using YCbCr color space which can be used as a cover image. Image pixels which belong to the skin regions are used to carry more secret bits, and the secret information is hidden in both horizontal and vertical sequences of the skin areas of the cover image. The secret information will hide behind the human skin regions rather than other objects in the same image because the skin pixels have high intensity value. The performance of embedding is done and is quite invisible by the vector discrete wavelet transformation (VDWT) technique. A new Lagrange interpolation-based encryption method is introduced to achieve high security of the hidden information with higher payload and better visual quality.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Secure image steganography using framelet transform and bidiagonal SVD

TL;DR: A novel framelet transform based image steganography scheme that hides a secret image into cover image and stego images possess better visual quality and are robust to several popular image processing operations.
Journal ArticleDOI

Image steganography using contourlet transform and matrix decomposition techniques

TL;DR: Better imperceptibility, large capacity, and poor detection accuracy compared to existing work validate the efficacy of the proposed image steganography algorithm.
Journal ArticleDOI

A hierarchical access control scheme based on Lagrange interpolation for mobile agents

TL;DR: A function defined by Lagrange polynomial to compute decryption key is proposed to use to reduce the communication time that the host sent to the members of a large system.
Journal ArticleDOI

Improving Message Embedding By Using Some Attributes Of Color Image

TL;DR: This paper applies enhancing linear feedback control at origin on a new continuous 4D autonomous hyper chaotic system and notices that a necessary condition for suppression is getting positive feedback coefficient.
References
More filters
Journal ArticleDOI

Review: Digital image steganography: Survey and analysis of current methods

TL;DR: This paper provides a state-of-the-art review and analysis of the different existing methods of steganography along with some common standards and guidelines drawn from the literature and some recommendations and advocates for the object-oriented embedding mechanism.
Journal ArticleDOI

The IAM-database: an English sentence database for offline handwriting recognition

TL;DR: A database that consists of handwritten English sentences based on the Lancaster-Oslo/Bergen corpus, which is expected that the database would be particularly useful for recognition tasks where linguistic knowledge beyond the lexicon level is used.
Journal ArticleDOI

A survey of skin-color modeling and detection methods

TL;DR: A critical up-to-date review of the various skin modeling and classification strategies based on color information in the visual spectrum and presents various approaches that use skin-color constancy and dynamic adaptation techniques to improve the skin detection performance in dynamically changing illumination and environmental conditions.
Proceedings Article

An overview of image steganography.

TL;DR: This paper intends to give an overview of image steganography, its uses and techniques, and attempts to identify the requirements of a good steganographic algorithm and briefly reflects on which Steganographic techniques are more suitable for which applications.
Journal ArticleDOI

Current status and key issues in image steganography

TL;DR: A review of fundamental concepts, evaluation measures and security aspects of steganography system, various spatial and transform domain embedding schemes, and current research trends and directions to improve on existing methods are suggested.