scispace - formally typeset
Search or ask a question
Book ChapterDOI

Image Steganography: An Inevitable Need for Data Security

01 Jan 2021-pp 409-417
TL;DR: In this paper, an image steganography methodology is performed using MATLAB/Simulink and a brief analysis of various algorithms is done and a histogram is also plotted.
Abstract: With the advent of growing terrorism in the world and the availability of the internet, data integrity is being endangered. Hence ensuring the security of the messages is paramount. Steganography is used—the process of hiding information in image, video, etc. Steganography is not any novel technique, it had been used too earlier where they use to shave the head and embed the message on to it and then wait for the hair to grow in ancient Greece; it was also used in war times. The methodology carried out here is of least significant bit technique and random pixel technique. A brief analysis of various algorithms is done and a histogram is also plotted. The image steganography methodology is performed using MATLAB/Simulink. It is also vindicated as to where to hide the message in the image so that, it is barely noticed by any observer, keeping in view the quality, size, and resolution of the image.
Citations
More filters
Journal ArticleDOI
TL;DR: In this article , the authors presented a new method to hide the data into an image using RSA cryptosystem, which can be considered as a hybrid of steganography techniques and the public-key cryptography system and it can be used effectively for this purpose.
Abstract: Combine steganography techniques and the public key cryptosystem is new line to protect the transferring information. This paper presents a new method to hide the data into an image using RSA cryptosystem. Proposed algorithm is clarified in detail through the overall scenario and through concrete examples. The experiments on the proposed algorithm demon strated that it is a simple and efficient technique with a high level of security for transferring information. Accordingly, this proposed algorithm can be considered as a hybrid of steganography techniques and the public key cryptosystem and it can be used effectively for this purpose.
References
More filters
Proceedings ArticleDOI
19 Apr 2010
TL;DR: A new steganographic method via PNG images based on the information sharing technique is proposed, where the coefficients of the polynomial functions of the Shamir's (k, n)-threshold secret sharing method are utilized as carriers of a given secret data string to be hidden to generate shares.
Abstract: A new steganographic method via PNG images based on the information sharing technique is proposed. The coefficients of the polynomial functions of the Shamir's (k, n)-threshold secret sharing method are utilized as carriers of a given secret data string to be hidden to generate shares. The shares then are embedded into the alpha-channel plane of a cover PNG image. The resulting stego-image with perceptible white noise is further removed by mapping computed share values into suitable ranges. Appropriate measures for enhancing the security of the proposed method are also described. Experimental results show the effect of the proposed method.

12 citations

Journal ArticleDOI
TL;DR: The proposed scheme can reduce the size of the color image and embed a significant amount of data while keeping gray pixel values intact, and uses a dynamic AMBTC compression for least complex color planes, which helps in achieving good PSNR and high embedding capacity.
Abstract: In this paper, a novel color image steganography scheme using gray invariant in AMBTC compression domain is proposed. Unlike the conventional schemes, the proposed scheme embeds the secret data into a compressed color image while keeping gray pixel values intact. First, the proposed scheme partitions each color component (R, G, B) of a cover image into non-overlapping blocks with the same size and calculates the standard deviation and variance of the sub-block. Next, two least complex blocks having minimum variance out of the three-color blocks are compressed using dynamic AMBTC compression and the secret data is embedded into bit-planes of smooth compressed blocks. To keep the gray pixel values invariant, the pixel values of the most complex color block are adjusted according to the pixel intensity on the reconstructed compressed blocks. Therefore, the proposed scheme can reduce the size of the color image and embed a significant amount of data while keeping gray pixel values intact. The main advantages of the proposed scheme are: (1) reduces the required bandwidth for image transmission due to AMBTC compression, (2) preserves gray values of the original cover image, which helps in many applications such as black and white printing, fingerprint scanning and so on, (3) uses color plane blocks selectively for data hiding which makes the proposed scheme more robust, and (4) uses a dynamic AMBTC compression for least complex color planes, which helps in achieving good PSNR and high embedding capacity.

10 citations

Journal ArticleDOI
TL;DR: This paper consists of a proposed approach that braces the security concern in the realm of image steganography with respect to substantial performance metrics and shows that the foothold of imperceptibility is well maintained.
Abstract: The practice of information exchange through global media like internet extensively entails a security concern. This paper consists of a proposed approach that braces the security concern in the realm of image steganography. The adaptive technique of the Power Modulus Scrambling (PMS) has been preliminarily used so as to disturb the normal pixel orientation of the original carrier. A second layer of encryption is enforced with the implementation of the Block Based Pixel Swapping technique. These steps ensure a two tier secured shield. Next, the embedding procedure is facilitated depending on a comparative key based permutation combination methodology. This approach caters the need of security during communication. The proposed approach is evaluated with respect to substantial performance metrics. The commendable results obtained shows that the foothold of imperceptibility is well maintained.

10 citations

Journal ArticleDOI
TL;DR: A unified architecture which combines real-time object detection based on convolutional neural network, local style transfer using generative adversarial network and steganography together to realize real- time carrier image generation is presented.
Abstract: Image steganography aims to conceal the secret information inside another carrier image. And by embedding the information into the carrier image, the carrier image may suffer certain image distortion. Thus, not only the hiding algorithm should be carefully designed, but also the carrier image should be meticulously selected during the hiding process. This paper follows the idea of creating suitable cover images instead of selecting the ones by presenting a unified architecture which combines real-time object detection based on convolutional neural network, local style transfer using generative adversarial network and steganography together to realize real-time carrier image generation. The object in the carrier image is first detected using a fast object detector and then the detected area is reconstructed through a local generative network. The secret message is embedded into the intermediate generated images during the training process in order to generate an image which is suitable as an image carrier. The experimental results show that the reconstructed stego images are nearly indistinguishable to both human eyes and steganalysis tools. Furthermore, the whole carrier image generation process with GPU implementation can achieve around 5 times faster than the regular CPU implementation which meets the requirement of real-time image processing.

1 citations