scispace - formally typeset
Journal ArticleDOI

An efficient multi-bit steganography algorithm in spatial domain with two-layer security

Reads0
Chats0
TLDR
The proposed method embeds from 2 to 6 bits of the message per pixel in each image component, whereas it can embed a minimum of 6 bits and a maximum of 13 bits of message per sample in audio component at the expense of no perceivable distortion and loss of the cover media quality.
Abstract
Steganography is a very useful technique which aims at preventing loss of privacy during the process of data communication, especially over the internet. It can involve different forms of media like image, video (i.e., image sequence), audio etc. We propose a novel steganographic approach in spatial domain using pixel value differencing (PVD) or sample value differencing (SVD) technique and Galois field (GF (28)) operations in order to provide a two layered security for hiding message bits. Our method not only has a very high embedding capacity, but is also capable of withstanding statistical attacks. The proposed method embeds from 2 to 6 bits of the message per pixel in each image component, whereas it can embed a minimum of 6 bits and a maximum of 13 bits of message per sample in audio component at the expense of no perceivable distortion and loss of the cover media quality.

read more

Citations
More filters
Journal ArticleDOI

Image steganography using deep learning based edge detection

TL;DR: This paper introduces a deep learning-based Steganography method for hiding secret information within the cover image using a convolutional neural network with Deep Supervision based edge detector, which can retain more edge pixels over conventional edge detection algorithms.
Journal ArticleDOI

A PVD based high capacity steganography algorithm with embedding in non-sequential position

TL;DR: This work presents a pixel value difference (PVD) based high capacity methodology that maintains high PSNR with enhanced capacity and can withstand various types of attacks.
Journal ArticleDOI

Random selection based GA optimization in 2D-DCT domain color image steganography

TL;DR: The message is embedded in color image in frequency domain exploiting Genetic Algorithm (GA) which provides the robustness i.e., the algorithm can withstand against any rigorous testing and brutal attack except destruction of the stego image.
Journal ArticleDOI

Digital image steganography: A literature survey

TL;DR: Steganography is the art of concealing information in a cover media in such a way that the presence of the information is unknown as discussed by the authors , which has been driven to the frontrunner of present security systems by the amazing development in computational power, the rise in security consciousness.
Journal ArticleDOI

Image feature based high capacity steganographic algorithm

TL;DR: The message is hidden in the color image in spatial domain, exploring multi-bit Least Significant Bit (mLSB) steganography, and perspective based technique and meticulous statistical analysis are applied to immune the algorithm from sterilization along with other attacks.
References
More filters
Journal ArticleDOI

A logic of authentication

TL;DR: This paper describes the beliefs of trustworthy parties involved in authentication protocols and the evolution of these beliefs as a consequence of communication, and gives the results of the analysis of four published protocols.
Proceedings ArticleDOI

A logic of authentication

TL;DR: This paper describes the beliefs of trustworthy parties involved in authentication protocols and the evolution of these beliefs as a consequence of communication, and gives the results of the analysis of four published protocols.
Book

Combinatorial Commutative Algebra

TL;DR: In this paper, the authors present a set of monomial ideals for three-dimensional staircases and cellular resolutions, including two-dimensional lattice ideals, and a threedimensional staircase with cellular resolutions.
Journal ArticleDOI

A steganographic method for images by pixel-value differencing

TL;DR: A new and efficient steganographic method for embedding secret messages into a gray-valued cover image that provides an easy way to produce a more imperceptible result than those yielded by simple least-significant-bit replacement methods.
Book ChapterDOI

Attacks on Copyright Marking Systems

TL;DR: A number of attacks are presented that enable the information hidden by copyright marks and other information in digital pictures, video, audio and other multimedia objects to be removed or otherwise rendered unusable.