An Enhanced Steganographic Model Based on DWT Combined with Encryption and Error Correction Techniques

被引:1
|
作者
Yasin, Adwan [1 ]
Sabha, Muath [2 ]
Shehab, Nizar [1 ]
Yasin, Mariam [1 ]
机构
[1] Arab Amer Univ, Dept Comp Sci, Jenin, Israel
[2] Arab Amer Univ, Multi Media Dept, Jenin, Israel
关键词
Steganography; DWT; LSB; hamming code; encryption and decryption;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The problem of protecting information, modification, privacy and origin validation are very important issues and became the concern of many researchers. Handling these problems definitely is a big challenge and this is probably why so much attention directed to the development of information protection schemes. In this paper, we propose a robust model that combines and integrates steganographic techniques with encryption, and error detection and correction techniques in order achieve secrecy, authentication and integrity. The idea of applying these techniques is based on decomposing the image into three separate color planes Red, Green and Blue and then depending on the encryption key we divide the image into N blocks. By applying DWT on each block independently, this model enables hiding the information in the image in an unpredictable manner. The part of the image where information embedded is a key depended and unknown to the intruder and by this we achieve blinded DWT effect. To enhance reliability the proposed model that uses hamming code which helps to recover lost or modified information. The proposed Model implemented and tested successfully.
引用
收藏
页码:49 / 55
页数:7
相关论文
共 50 条
  • [1] DWT-Based error concealment techniques
    Niu, Y
    [J]. DCC 2002: DATA COMPRESSION CONFERENCE, PROCEEDINGS, 2002, : 480 - 480
  • [2] A COMBINED ENCRYPTION AND ERROR CORRECTION SCHEME: AES-TURBO
    Cam, Hakan
    Ozduran, Volkan
    Ucan, Osman N.
    [J]. ISTANBUL UNIVERSITY-JOURNAL OF ELECTRICAL AND ELECTRONICS ENGINEERING, 2009, 9 (01):
  • [3] ROBUST AUDIO WATERMARKING BASED ON DYNAMIC DWT WITH ERROR CORRECTION
    Alshammas, Hemam A.
    [J]. PROCEEDINGS OF THE 2013 ITU KALEIDOSCOPE ACADEMIC CONFERENCE: BUILDING SUSTAINABLE COMMUNITIES (K-2013), 2013, : 203 - 208
  • [4] A novel error correction and encryption algorithm combined fountain code and AES
    Lin, Wenliang
    Deng, Zhongliang
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (16)
  • [5] Combined error correction techniques for quantum computing architectures
    Byrd, MS
    Lidar, DA
    [J]. JOURNAL OF MODERN OPTICS, 2003, 50 (08) : 1285 - 1297
  • [6] Blind QR Code Steganographic Approach Based upon Error Correction Capability
    Chiang, Yin-Jen
    Lin, Pei-Yu
    Wang, Ran-Zan
    Chen, Yi-Hui
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2013, 7 (10): : 2527 - 2543
  • [7] Error correction based on verification techniques
    Huang, SY
    Chen, KC
    Cheng, KT
    [J]. 33RD DESIGN AUTOMATION CONFERENCE, PROCEEDINGS 1996, 1996, : 258 - 261
  • [8] A joint encryption and error correction scheme based on chaos and LDPC
    Jie Liu
    Xiaojun Tong
    Yang Liu
    Miao Zhang
    Jing Ma
    [J]. Nonlinear Dynamics, 2018, 93 : 1149 - 1163
  • [9] A joint encryption and error correction scheme based on chaos and LDPC
    Liu, Jie
    Tong, Xiaojun
    Liu, Yang
    Zhang, Miao
    Ma, Jing
    [J]. NONLINEAR DYNAMICS, 2018, 93 (03) : 1149 - 1163
  • [10] Improved Security Based on Combined Encryption and Steganography Techniques
    Mocanu, Stefan
    Duluta, Andrei
    Merezeanu, Daniel
    Pietraru, Radu
    [J]. STUDIES IN INFORMATICS AND CONTROL, 2017, 26 (01): : 115 - 126