Advertisement

Extended Fibonacci Series for Selection of Carrier Samples in Data Hiding and Extraction

  • Virendra P. NikamEmail author
  • Shital S. Dhande
Conference paper
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 38)

Abstract

Now a days data sensitivity and information security remains as a key challenge for every IT industry. Most of the industries have their focus on data security. The existing data security techniques like cryptography, steganography are used only to protect the data from unauthorized access. Recently, it is found that cryptography is not enough to protect the data when it is transmitted over wireless network. Proposed concept focuses on the Data Hiding mechanism, which enables the proper use of sample selections of carrier channel through the use of extended Fibonacci series. Proposed concept have achieved better results and generates less noise in carrier object after the concealing of secret information in it.

Keywords

Data security Carrier object Wireless media Steganography Cryptography Extended Fibonacci series psnr Mean square error Data Hiding Capacity 

References

  1. 1.
    Ni, Z., Shi, Y.-Q., Ansari, N., Su, W.: Reversible data hiding. IEEE Trans. Circuits Syst. Video Technol. 16(3), 354–362 (2006)CrossRefGoogle Scholar
  2. 2.
    Tai, W.-L., Yeh, C.-M., Chang, C.-C.: Reversible data hiding based on histogram modification of pixel differences. IEEE Trans. Circuits Syst. Video Technol. 19(6), 906–910 (2009)CrossRefGoogle Scholar
  3. 3.
    Zhang, X.: Reversible data hiding in encrypted images. IEEE Signal Process. Lett. 18(4), 255–258 (2011)CrossRefGoogle Scholar
  4. 4.
    Hong, W., Chen, T., Wu, H.: An improved reversible data hiding in encrypted. IEEE Signal Process. Lett. 19, 199–202 (2012)CrossRefGoogle Scholar
  5. 5.
    Liao, X., Shu, C.: Reversible data hiding in encrypted images based on absolute mean difference of multiple neighbouring pixels. J. Vis. Commun. Image Representation 28, 21–27 (2015)CrossRefGoogle Scholar
  6. 6.
    Qian, Z., Dai, S., Jiang, F., Zhang, X.: Improved joint reversible data hiding in encrypted images. J. Vis. Commun. Image Representation 40, 732–738 (2016)CrossRefGoogle Scholar
  7. 7.
    Zhou, J., Sun, W., Dong, L., et al.: Secure reversible image data hiding over encrypted domain via key modulation. IEEE Trans. Circuits Syst. Video Technol. 26(3), 441–452 (2016)CrossRefGoogle Scholar
  8. 8.
    Zhang, X.: Separable reversible data hiding in encrypted image. IEEE Trans. Inf. Forensics Secur. 7(2), 826–832 (2012)CrossRefGoogle Scholar
  9. 9.
    Wu, X., Sun, W.: High-capacity reversible data hiding in encrypted images by prediction error. Signal Process. 104, 387–400 (2014)CrossRefGoogle Scholar
  10. 10.
    Qian, Z., Zhang, X.: Reversible data hiding in encrypted image with distributed source encoding. IEEE Trans. Circuits Syst. Video Technol. 26(4), 636–646 (2016)MathSciNetCrossRefGoogle Scholar
  11. 11.
    Qian, Z., Zhang, X., Feng, G.: Reversible data hiding in encrypted images based on progressive recovery. IEEE Signal Process. Lett. 23(11), 1672–1676 (2016)CrossRefGoogle Scholar
  12. 12.
    Huang, F., Huang, J., Shi, Y.Q.: New framework for reversible data hiding in encrypted domain. IEEE Trans. Inf. Forensics Secur. 11(12), 2777–2789 (2016)CrossRefGoogle Scholar
  13. 13.
    Ma, K., Zhang, W., Zhao, X., et al.: Reversible data hiding in encrypted images by reserving room before encryption. IEEE Trans. Inf. Forensics Secur. 8(3), 553–562 (2013)CrossRefGoogle Scholar
  14. 14.
    Zhang, W., Ma, K., Yu, N.: Reversibility improved data hiding in encrypted images. Signal Process. 94, 118–127 (2014)CrossRefGoogle Scholar
  15. 15.
    Cao, X., Du, L., Wei, X.: High capacity reversible data hiding in encrypted images by patch-level sparse representation. IEEE Trans. Cybern. 46(5), 1132–1143 (2016)CrossRefGoogle Scholar
  16. 16.
    Kayarkar, H., Sanyal, S.: A survey on various data hiding techniques and their comparative analysis, pp. 1–9 (2012)Google Scholar
  17. 17.
    Naseem, M., Hussain, I.M., Khan, M.K., Ajmal, A.: An optimum modified bit plane splicing LSB algorithm for secret data hiding. Int. J. Comput. Appl. 29(120), 36–38 (2011)Google Scholar
  18. 18.
    Nosrati, M., Karimi, R., Hariri, M.: An introduction to steganography methods. World Appl. Program. 1(3), 191–195 (2011). ISSN 2222-2510Google Scholar
  19. 19.
    Thampi, S.M.: Information hiding techniques: a tutorial review. ISTE-STTP on Network Security and Cryptography, LBSCE, pp. 1–19 (2004)Google Scholar
  20. 20.
    Dey, S., Abraham, A., Sanyal, S.: An LSB data hiding technique using natural numbers. In: IEEE Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2007, 26–28 November 2007, Kaohsiung City, Taiwan, pp. 473–476. IEEE Computer Society press, USA (2007). ISBN 0-7695-2994-1Google Scholar
  21. 21.
    Fallahpour, M., Shirmohammadi, S., Semsarzadeh, M., Zhao, J.: Tampering detection in compressed digital video using watermarking. IEEE Trans. Instrum. Meas. 63(5), 1057–1072 (2014)CrossRefGoogle Scholar
  22. 22.
    Mahjabin, T., Hossain, S.M., Haque, M.S.: A block based data hiding method in images using pixel value differencing and LSB substitution method. IEEE (2012)Google Scholar
  23. 23.
    Fu, M.S., Au, O.C.: Data hiding watermarking for halftone images. IEEE Trans. Image Process. 11(4), 477–484 (2002)CrossRefGoogle Scholar
  24. 24.
    Kuo, W.-C., Jiang, D.-J., Huang, Y.-C.: A reversible data hiding scheme based on block division. In: Congress on Image and Signal Processing, vol. 1, , pp. 365–369, 27–30 May 2008Google Scholar
  25. 25.
    Shiu, C.-W., Chen, Y.-C., Hong, W.: Encrypted image-based reversible data hiding with public key cryptography from difference expansion. Signal Process Image Commun. 39, 226–233 (2015)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringSCETAmravatiIndia

Personalised recommendations