scispace - formally typeset
Journal ArticleDOI

A robust information hiding algorithm based on lossless encryption and NSCT-HD-SVD

Om Prakash Singh, +1 more
- Vol. 32, Iss: 4, pp 1-13
TLDR
A robust information hiding algorithm based on lossless encryption, non-subsampled contourlet transform (NSCT), Hessen-berg decomposition (HD) and singular value decomposition was proposed in this paper.
Abstract
Aiming at the problem of the security of secret information in various potential applications, we introduce a robust information hiding algorithm based on lossless encryption, non-subsampled contourlet transform (NSCT), Hessen-berg decomposition (HD) and singular value decomposition (SVD). Firstly, the carrier and secret mark information is transformed by NSCT-HD-SVD. Secondly, the singular score of secret media information is concealed in the carrier image. Thirdly, the text document is further concealed in the carrier marked image via pseudo magic cubes to achieve the final carrier marked image. Finally, the lossless encryption scheme is utilized to encrypt the final marked image. The simulation results of the proposed algorithm indicate good invisibility and robustness effect compared to existing schemes with high security and hiding efficiency. It indicates a considerable improvement in robustness of up to 96.36% over other schemes. Overall, the proposed algorithm for various images, achieved peak signal-to-noise ratio (PSNR), normalized correlation (NC), structural similarity index (SSIM), number of changing pixel rate (NPCR) and unified averaged changed intensity (UACI) of up to 67.36 dB, 0.9996, 1.0000, 0.9964 and 0.4005, respectively, indicating its effectiveness for secure media applications.

read more

Citations
More filters
Journal ArticleDOI

Double-Matrix Decomposition Image Steganography Scheme Based on Wavelet Transform with Multi-Region Coverage

TL;DR: Experimental results show that the proposed double-matrix decomposition image steganography scheme with multi-region coverage has excellent performance in concealment and quality of extracted secret images, and secret information is extracted from steganographic images attacked by various image processing attacks, which proves that the method has good anti-attack ability under different attacks.
Journal ArticleDOI

Parameter adaptive unit-linking dual-channel PCNN based infrared and visible image fusion

TL;DR: In this paper , a new parameter adaptive unit-linking dual-channel PCNN model was used to implement a novel fusion algorithm in the non-subsampled contourlet transform (NSCT) domain for the integration of infrared and visible images.
Journal ArticleDOI

SecDH: Security of COVID-19 images based on data hiding with PCA

TL;DR: Zhang et al. as discussed by the authors developed SecDH as a medical data hiding scheme, which can guarantee the security and copyright protection of the COVID-19 images by using principal component analysis (PCA) between cover and mark image.
Journal ArticleDOI

WatMIF: Multimodal Medical Image Fusion-Based Watermarking for Telehealth Applications

TL;DR: Wang et al. as mentioned in this paper proposed a secure watermarking algorithm, termed WatMIF, based on multimodal medical image fusion, which consists of three major parts: the encryption of the host media, the fusion of multi-modal medical images, and the embedding and extraction of the fused mark.
References
More filters
Journal ArticleDOI

A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing

TL;DR: A unique watermark is directly embedded into the encrypted images by the cloud server before images are sent to the query user, and when image copy is found, the unlawful query user who distributed the image can be traced by the watermark extraction.
Journal ArticleDOI

An improved DWT-SVD domain watermarking for medical information security

TL;DR: Experimental results demonstrate that the suggested watermarking technique archives high robustness against attacks in comparison to the other scheme for medical images, and verification its robustness for various attacks while maintaining imperceptibility, security and compression ratio.
Journal ArticleDOI

An image encryption scheme based on a hybrid model of DNA computing, chaotic systems and hash functions

TL;DR: The experimental results and security analyses indicate that the proposed image encryption scheme not only has good encryption effect and able to resist against the known attacks, but also is sufficiently fast for practical applications.
Journal ArticleDOI

An Optimized Image Watermarking Method Based on HD and SVD in DWT Domain

TL;DR: The experimental results show that the proposed image watermarking method has a good trade-off between robustness and invisibility even for the watermarks with multiple sizes.
Journal ArticleDOI

Chaotic based secure watermarking approach for medical images

TL;DR: Experimental evaluation shows that using combination of NSCT, RDWT, SVD and chaotic encryption makes the approach robust, imperceptible, secure and suitable for medical applications.
Related Papers (5)