Advertisement

Secured hand sacking based two phase data concealing architecture in spectral domain

  • Sujit Das
  • J. K. Mandal
Technical Paper
  • 30 Downloads

Abstract

The requirement of information confidentiality in digital world emanates different approaches to the criticality of secrecy. Steganographic methods hide the secret information into cover media. In this paper the carrier medium is checked for vulnerabilities before the actual information transfer can be made. If the medium is sensed safe to transfer then a suitable cover image is selected and is transformed using four point Daubechies DWT to one low frequency band and three high frequency bands. Three sub images are constructed from the cover image as keeping one high frequency band intact and setting other high frequency band to zero. The secret image is spread over the three images and transferred to the receiver. At receiver end images are added and secret image is extracted from it using DWT.

Notes

Acknowledgements

The authors acknowledge the support provided by the DST PURSE scheme, MHRD, Government of India at University of Kalyani, for this research work.

References

  1. Al-Dmour H, Al-Ani A (2015) A steganography embedding method based on edge identification and XOR coding. Expert Syst Appl 46:293–306CrossRefGoogle Scholar
  2. Bhatu B, Shah H Y (2016) Customized approach to increase capacity and robustness in image steganography. In: I. Conference on inventive computation techniques (ICICT), Coimbatore, pp 1–6.  https://doi.org/10.1109/inventive.2016.7824878
  3. Crandall R (1998) Some notes on steganography. Posted on steganography mailing listGoogle Scholar
  4. Fan L, Gao T, Yang Q, Cao Y (2011) An extended matrix encoding algorithm for steganography of high embedding efficiency. Comput Electr Eng 37:973–981CrossRefGoogle Scholar
  5. Ghebleh M, Kanso A (2014) A robust chaotic algorithm for digital image steganography. Commun Nonlinear Sci Numer Simul 19:1898–1907CrossRefGoogle Scholar
  6. Islam AU et al (2016) An improved image steganography technique based on MSB using bit differencing. In: Sixth I. Conference on innovative computing techniques (INTECH) Dublin, pp 265–269.  https://doi.org/10.1109/intech.2016.7845020
  7. Ker AD (2007) A capacity result for batch steganography. IEEE Signal Process Lett 14:525–528CrossRefGoogle Scholar
  8. Ker AD (2008) Perturbation hiding and the batch steganography problem. In: Proceedings of the 10th information hiding, vol 5284, pp 45–59Google Scholar
  9. Kude M, Borse M (2016) Skintone detection based steganography using wavelet trans form. In: I. Conference on auto control and dynamic optimization techniques (ICACDOT), pp 440–443.  https://doi.org/10.1109/icacdot.2016.7877624
  10. Provos N, Honeyman P (2003) Hide and seek: an introduction to steganography. IEEE Secur Priv 1:32–44CrossRefGoogle Scholar
  11. Singh YK, Sharma S (2016) Image steganography on gray and color image using DCT enhancement and RSA with LSB method. In: I. Conference on inventive computation techniques (ICICT), Coimbatore, pp 1–5.  https://doi.org/10.1109/inventive.2016.7830106
  12. Strang G, Nguyen T (1996) Wavelet and filter banks. Cambridge Press, WesleyzbMATHGoogle Scholar
  13. Tang M et al (2014) A high capacity image steganography using multi-layer embedding. Optik Int J Light Electron Opt 125:3972–3976CrossRefGoogle Scholar
  14. Tripati D, Sharma S (2016) A robust 3-SWT multiple image steganography and contrast enhancement technique. In: I. Conference on inventive computation technologies (ICICT), Coimbatore, pp 1–6.  https://doi.org/10.1109/inventive.2016.7823256
  15. USC University, South California (2008) Signal and Image Processing Institute. http://sipi.usc.edu/database/database.php?volume=misc. Accessed 10 July 2017
  16. Valandar MY et al (2017) A new transform domain steganography based on modified logistic chaotic map for color images. J Inf Secur Appl 34:142–151Google Scholar
  17. Walker JS (2008) A primer on wavelets and their scientific application. ISBN-978-1-58488-745-4Google Scholar
  18. Westfeld A (2001) F5—a steganographic algorithm: high capacity despite better steganalysis. Lect Notes Comput Sci 2137:289–302CrossRefzbMATHGoogle Scholar
  19. Wu CC, Kao SJ, Hwang MS (2011) A high quality image sharing with steganography and adaptive authentication scheme. J Syst Softw 84:2196–2207CrossRefGoogle Scholar
  20. Yuan HD (2014) Secret sharing with multi-cover adaptive steganography. Inf Sci 254:197–212MathSciNetCrossRefzbMATHGoogle Scholar
  21. Zhang Y, Qin C, Zhang W, Liu F, Luo X (2018) On the fault-tolerant performance for a class of robust image steganography. Signal Process (Elsevier) 146:99–111CrossRefGoogle Scholar

Copyright information

© Springer-Verlag GmbH Germany, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringUniversity of KayaniKalyaniIndia

Personalised recommendations