Image Steganography for Confidential Communication and Secured Data Storing

被引:0
|
作者
Sivagurunathan, P. T. [1 ]
Archana, M. [1 ]
Shree, N. Durga [1 ]
Yuvashrie, G. [1 ]
机构
[1] M Kumarasamy Coll Engn, Dept Elect & Commun Engn, Karur 639113, Tamil Nadu, India
关键词
Image steganography; Cover image; Secret data; Encryption; Decryption; Extracted data; Transform;
D O I
10.1007/978-981-19-3590-9_24
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Since the Middle Ages, steganography has been utilized to hide messages under a cover material. The purpose of our paper is to use modern steganography techniques to disguise digital messages. A secret message (text or picture) with N * N RGB pixel must be conveyed in a container image with N * N RGB with minimal content alterations. The carrier, often known as the cover image, can be made public. In this study, lift Haar wavelet transform based on AES is useful in training the model which consists of a hidden network and a reveal network, in addition to LSB encoding. Using the proposed assignment algorithm, the text is encrypted and embedded into the cover image. When compared to older systems with good embedding, this technique will provide greater security and robustness. The system will have improved PSNR and MSE values, and load capacity is analyzed in this proposed system.
引用
收藏
页码:315 / 324
页数:10
相关论文
共 50 条
  • [31] Towards secured image steganography based on content-adaptive adversarial perturbation
    Sharma, Vipal Kumar
    Mir, Roohie Naaz
    Rout, Ranjeet Kumar
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2023, 105
  • [32] Analysis of the GCR Communication Channel For Image Steganography
    Poljicak, Ante
    Donevski, Davor
    Jelusic, Petar Branislav
    Tomasegovic, Tamara
    Cigula, Tomislav
    [J]. 2019 61ST INTERNATIONAL SYMPOSIUM ELMAR, 2019, : 65 - 68
  • [33] A STEGANOGRAPHY APPLICATION FOR SECURE DATA COMMUNICATION
    Baykara, Muhammet
    Das, Resul
    [J]. 2013 INTERNATIONAL CONFERENCE ON ELECTRONICS, COMPUTER AND COMPUTATION (ICECCO), 2013, : 309 - 313
  • [34] Secured Medical Data Transfer Using Reverse Data Hiding System Through Steganography
    Aiswarya, S.
    Gomathi, R.
    [J]. INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2022, 34 (02): : 969 - 982
  • [35] High capacity and secured methodologies for steganography
    Tiwari, Rajesh Kumar
    [J]. INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2012, 4 (01) : 1 - 18
  • [36] Reciprocal Time Domain Disruption of Image for Secured Communication
    Banu, Aashiq S.
    Sridevi, A.
    Sivaraman, R.
    Sriram, Nikhil Krishnaa
    Rengarajanl, Amirtharajan
    Paramasivam, V. Moorthi
    [J]. 2019 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI - 2019), 2019,
  • [37] Secured Image Transmission Through Region-Based Steganography Using Chaotic Encryption
    Dash, Shreela
    Das, M. N.
    Das, Mamatarani
    [J]. COMPUTATIONAL INTELLIGENCE IN DATA MINING, 2019, 711 : 535 - 544
  • [38] Confidential storage and transmission of medical image data
    Norcen, R
    Podesser, A
    Pommer, A
    Schmidt, HP
    Uhl, A
    [J]. COMPUTERS IN BIOLOGY AND MEDICINE, 2003, 33 (03) : 277 - 292
  • [39] Efficient Data Dissemination For Secured Communication In Vanet
    Vijayakarthika, R.
    Banumathi, V.
    [J]. SECOND INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ENGINEERING AND TECHNOLOGY (ICCTET 2014), 2014, : 313 - 320
  • [40] A Novel Image Steganography Technique for Secured Online Transaction Using DWT and Visual Cryptography
    Devi, Anitha M. D.
    Kumar, K. B. Shiva
    [J]. INTERNATIONAL CONFERENCE ON MATERIALS, ALLOYS AND EXPERIMENTAL MECHANICS (ICMAEM-2017), 2017, 225