Image Steganography for Confidential Communication and Secured Data Storing

被引:0
|
作者
Sivagurunathan, P. T. [1 ]
Archana, M. [1 ]
Shree, N. Durga [1 ]
Yuvashrie, G. [1 ]
机构
[1] M Kumarasamy Coll Engn, Dept Elect & Commun Engn, Karur 639113, Tamil Nadu, India
关键词
Image steganography; Cover image; Secret data; Encryption; Decryption; Extracted data; Transform;
D O I
10.1007/978-981-19-3590-9_24
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Since the Middle Ages, steganography has been utilized to hide messages under a cover material. The purpose of our paper is to use modern steganography techniques to disguise digital messages. A secret message (text or picture) with N * N RGB pixel must be conveyed in a container image with N * N RGB with minimal content alterations. The carrier, often known as the cover image, can be made public. In this study, lift Haar wavelet transform based on AES is useful in training the model which consists of a hidden network and a reveal network, in addition to LSB encoding. Using the proposed assignment algorithm, the text is encrypted and embedded into the cover image. When compared to older systems with good embedding, this technique will provide greater security and robustness. The system will have improved PSNR and MSE values, and load capacity is analyzed in this proposed system.
引用
收藏
页码:315 / 324
页数:10
相关论文
共 50 条
  • [1] Steganography for Confidential Communication and Secret Data storage
    Chaudhary, Dev Kumar
    Srivastava, Sandeep
    Choudhury, Tanupriya
    [J]. PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND INTERNET OF THINGS (ICGCIOT 2018), 2018, : 461 - 465
  • [2] Secured Data Communication System Using RSA with Mersenne Primes and Steganography
    Pund-Dange, Shilpa
    Desai, Chitra G.
    [J]. 2015 2ND INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2015, : 1306 - 1310
  • [3] Optical coding for storing confidential data
    Huang, QZ
    Du, LJ
    Guo, YK
    Wangding
    [J]. ALGORITHMS, DEVICES, AND SYSTEMS FOR OPTICAL INFORMATION PROCESSING, 1997, 3159 : 287 - 291
  • [4] Image Segmentaion and Steganography for Secured Information Transmission
    Juneja, Mamta
    Sandhu, Parvinder Singh
    [J]. INFORMATION PROCESSING AND MANAGEMENT, 2010, 70 : 617 - 620
  • [5] Secured image steganography based on Catalan transform
    Mukhopadhyay, Souradeep
    Hossain, Sabbir
    Ghosal, Sudipta Kr
    Sarkar, Ram
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (09) : 14495 - 14520
  • [6] Secured image steganography based on Catalan transform
    Souradeep Mukhopadhyay
    Sabbir Hossain
    Sudipta Kr Ghosal
    Ram Sarkar
    [J]. Multimedia Tools and Applications, 2021, 80 : 14495 - 14520
  • [7] Secured Image transmission with GA based Audio Steganography
    Bhowal, Krishna
    Sarkar, D.
    Biswas, S.
    Sarkar, P. P.
    [J]. 2011 ANNUAL IEEE INDIA CONFERENCE (INDICON-2011): ENGINEERING SUSTAINABLE SOLUTIONS, 2011,
  • [8] Secured and Authentic Communication by Combined Approach of Digital Watermarking and Steganography
    Sahu, Satya Prakash
    Verma, Satya
    [J]. COMPUTER NETWORKS AND INFORMATION TECHNOLOGIES, 2011, 142 : 595 - +
  • [9] Secured Communication using Steganography Framework with Sample RTF Implementation
    Ganeshkumar, Vijayaratnam
    Koggalage, Ravindra L. W.
    [J]. 2009 INTERNATIONAL CONFERENCE ON INDUSTRIAL AND INFORMATION SYSTEMS, 2009, : 15 - 21
  • [10] Secured Data Hiding and Sharing using Improved LSB-based Image Steganography Technique
    Molato, Mark Rennel D.
    Gerardo, Bobby D.
    Medina, Ruji P.
    [J]. 2018 4TH INTERNATIONAL CONFERENCE ON INDUSTRIAL AND BUSINESS ENGINEERING (ICIBE 2018), 2018, : 238 - 243