scispace - formally typeset
Search or ask a question
Book ChapterDOI

LSB Technique-Based Dual-Image Steganography Using COS Function

About: The article was published on 2022-01-01. It has received None citations till now.
References
More filters
Journal ArticleDOI
TL;DR: Experimental investigations reveal that the proposed system besides being reversible is capable of providing secure and high embedding capacity while maintaining fair imperceptibility and is best suited for the exchange of Electronic Health Records (EHR) in an IoT based healthcare system for smart city applications.

64 citations

Journal ArticleDOI
TL;DR: A secure and robust watermarking scheme based on DC coefficient modification in pixel domain and a modified logistic map is presented in this paper and it is shown that GLM has better properties like ergodicity, larger lyapunov exponent, uniform invariant density, mixing, higher range of bifurcation parameter etc., compared to basiclogistic map.
Abstract: The proliferation of information and communication technology has made exchange of information easier than ever. Security and copyright protection of multimedia contents in such a scenario has become a major challenge for the research community round the globe. Digital watermarking has been found as an effective tool for protection and security of multimedia content. A secure and robust watermarking scheme based on DC coefficient modification in pixel domain and a modified logistic map is presented in this paper. The cover image is divided into $$8 \times 8$$ sub-blocks and instead of computing DC coefficient using discrete cosine transform (DCT), we compute DC coefficient of each block in spatial domain. Watermark bits are embedded by modifying DC coefficients of various blocks in spatial domain. The quantum of change to be brought in various pixels of a block for embedding watermark bit depends upon DC coefficient of respective blocks, nature of watermark bit (0 or 1) to be embedded and the adjustment factor. The security of embedded watermark has been taken care of by using chaotic encryption based on a generalized logistic map (GLM). We show that GLM has better properties like ergodicity, larger lyapunov exponent, uniform invariant density, mixing, higher range of bifurcation parameter etc., compared to basic logistic map. We exploit these properties of GLM for designing a secure robust, strong efficient cryptosystem to encrypt the watermark information before embedding it. Experimental investigations show that besides being highly secure the proposed technique is robust to both signal processing and geometric attacks. Further, the proposed scheme is computationally efficient as DC coefficient which holds the information is computed in pixel domain instead of using DCT on an image block.

41 citations

Journal ArticleDOI
TL;DR: The objective of the paper is to examine and scrutinize the different algorithms of steganography based on parameters like PSNR, MSE, and Robustness and make recommendations for producing high-quality stego images, high-payload capacity, and robust techniques of Steganography.
Abstract: The amount of data exchanged via the Internet is increasing nowadays. Hence, data security is termed as a serious issue while communication of data is processed over the Internet. Everyone needs th...

40 citations

Proceedings ArticleDOI
05 Jun 2020
TL;DR: Simulation analysis demonstrates that the proposed algorithm has a good amount of payload along with better results of security analysis, and the proposed scheme is compared with the existing-methods.
Abstract: Information sharing through internet has becoming challenge due to high-risk factor of attacks to the information being transferred. In this paper, a novel image-encryption edge based Image steganography technique is proposed. The proposed algorithm uses logistic map for encrypting the information prior to transmission. Laplacian of Gaussian (LoG) edge operator is used to find edge areas of the colored-cover-image. Simulation analysis demonstrates that the proposed algorithm has a good amount of payload along with better results of security analysis. The proposed scheme is compared with the existing-methods.

7 citations

Book ChapterDOI
01 Jan 2021
TL;DR: In this article, a double-layer security framework based on cryptography and steganography has been developed and tested in terms of various objective parameters like peak signal-to-noise ratio (PSNR), normalized cross-correlation (NCC), and structural similarity index (SSIM).
Abstract: Transferring data via an insecure network has become a challenge among researchers in this fast-growing technological world. In this paper, a double-layer security framework based on cryptography and steganography has been developed and tested. Logistic maps have been used for encrypting data before embedding it into cover images. The encrypted data has been hidden into edge areas of the cover images to ensure better imperceptivity at a given payload. The scheme has been evaluated in terms of various objective parameters like peak signal-to-noise ratio (PSNR), normalized cross-correlation (NCC), and structural similarity index (SSIM). Besides, the strength of the cryptographic algorithm based on logistic map using number of changes per rate (NPCR), unified average changed intensity (UACI), and entropy has been computed. Our framework reports the average PSNR value of 44.61 dB for payload of around 1.72 bits per pixel (bpp). In addition, the NPCR value of about 100%, UACI value of 36.72, and entropy value of 7.96 depict that our scheme is capable of providing ample security to the data to be transmitted.

4 citations