Journal ArticleDOI
A robust information hiding algorithm based on lossless encryption and NSCT-HD-SVD
Om Prakash Singh,Amit Singh +1 more
- Vol. 32, Iss: 4, pp 1-13
TLDR
A robust information hiding algorithm based on lossless encryption, non-subsampled contourlet transform (NSCT), Hessen-berg decomposition (HD) and singular value decomposition was proposed in this paper.Abstract:
Aiming at the problem of the security of secret information in various potential applications, we introduce a robust information hiding algorithm based on lossless encryption, non-subsampled contourlet transform (NSCT), Hessen-berg decomposition (HD) and singular value decomposition (SVD). Firstly, the carrier and secret mark information is transformed by NSCT-HD-SVD. Secondly, the singular score of secret media information is concealed in the carrier image. Thirdly, the text document is further concealed in the carrier marked image via pseudo magic cubes to achieve the final carrier marked image. Finally, the lossless encryption scheme is utilized to encrypt the final marked image. The simulation results of the proposed algorithm indicate good invisibility and robustness effect compared to existing schemes with high security and hiding efficiency. It indicates a considerable improvement in robustness of up to 96.36% over other schemes. Overall, the proposed algorithm for various images, achieved peak signal-to-noise ratio (PSNR), normalized correlation (NC), structural similarity index (SSIM), number of changing pixel rate (NPCR) and unified averaged changed intensity (UACI) of up to 67.36 dB, 0.9996, 1.0000, 0.9964 and 0.4005, respectively, indicating its effectiveness for secure media applications.read more
Citations
More filters
Journal ArticleDOI
Double-Matrix Decomposition Image Steganography Scheme Based on Wavelet Transform with Multi-Region Coverage
TL;DR: Experimental results show that the proposed double-matrix decomposition image steganography scheme with multi-region coverage has excellent performance in concealment and quality of extracted secret images, and secret information is extracted from steganographic images attacked by various image processing attacks, which proves that the method has good anti-attack ability under different attacks.
Journal ArticleDOI
Parameter adaptive unit-linking dual-channel PCNN based infrared and visible image fusion
TL;DR: In this paper , a new parameter adaptive unit-linking dual-channel PCNN model was used to implement a novel fusion algorithm in the non-subsampled contourlet transform (NSCT) domain for the integration of infrared and visible images.
Journal ArticleDOI
SecDH: Security of COVID-19 images based on data hiding with PCA
TL;DR: Zhang et al. as discussed by the authors developed SecDH as a medical data hiding scheme, which can guarantee the security and copyright protection of the COVID-19 images by using principal component analysis (PCA) between cover and mark image.
Journal ArticleDOI
Hash-based image watermarking technique for tamper detection and localization
Journal ArticleDOI
WatMIF: Multimodal Medical Image Fusion-Based Watermarking for Telehealth Applications
TL;DR: Wang et al. as mentioned in this paper proposed a secure watermarking algorithm, termed WatMIF, based on multimodal medical image fusion, which consists of three major parts: the encryption of the host media, the fusion of multi-modal medical images, and the embedding and extraction of the fused mark.
References
More filters
Journal ArticleDOI
A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing
TL;DR: A unique watermark is directly embedded into the encrypted images by the cloud server before images are sent to the query user, and when image copy is found, the unlawful query user who distributed the image can be traced by the watermark extraction.
Journal ArticleDOI
An improved DWT-SVD domain watermarking for medical information security
Ashima Anand,Amit Singh +1 more
TL;DR: Experimental results demonstrate that the suggested watermarking technique archives high robustness against attacks in comparison to the other scheme for medical images, and verification its robustness for various attacks while maintaining imperceptibility, security and compression ratio.
Journal ArticleDOI
An image encryption scheme based on a hybrid model of DNA computing, chaotic systems and hash functions
TL;DR: The experimental results and security analyses indicate that the proposed image encryption scheme not only has good encryption effect and able to resist against the known attacks, but also is sufficiently fast for practical applications.
Journal ArticleDOI
An Optimized Image Watermarking Method Based on HD and SVD in DWT Domain
TL;DR: The experimental results show that the proposed image watermarking method has a good trade-off between robustness and invisibility even for the watermarks with multiple sizes.
Journal ArticleDOI
Chaotic based secure watermarking approach for medical images
TL;DR: Experimental evaluation shows that using combination of NSCT, RDWT, SVD and chaotic encryption makes the approach robust, imperceptible, secure and suitable for medical applications.
Related Papers (5)
Development and analysis of IWT-SVD and DWT-SVD steganography using fractal cover
Asha Durafe,Vinod Patidar +1 more