Data Hiding and Integrity Verification based on Quotient Value Differencing and Merkle Tree

被引:3
|
作者
Khadse, Dipak Bhayyaji [1 ]
Swain, Gandharba [1 ]
机构
[1] Koneru Lakshmaiah Educ Fdn, Dept Comp Sci & Engn, Guntur 522302, Andhra Pradesh, India
关键词
Steganography; Data hiding; QVD; Tamper detection; Merkle tree; STEGANOGRAPHIC METHOD; IMAGE STEGANOGRAPHY; MODIFICATION DIRECTIONS; LSB; PVD; SUBSTITUTION; HISTOGRAM;
D O I
10.1007/s13369-022-06961-9
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
The three important quality aspects of image steganography mechanisms are hiding capacity (HC), peak signal-to-noise ratio (PSNR), and attack resistance. While the stego-image (SI) is on transit from sender to receiver, the camouflaged data may be altered due to several reasons. No existing steganography technique focuses on evaluating the integrity of extracted data at the receiver. Therefore, there is a need to develop techniques to check the integrity of the extracted bits from the SI at the receiver. This article offers a steganography technique with integrity check at the receiver. The image is sliced into various non-overlapping blocks of size 3 x 3. The secret information is camouflaged using bit replacement and differencing mechanisms in 7 MSBs of the 9 pixels. After bits are camouflaged in these 7 MSBs of all the pixels, the verification bits are generated using Merkle tree concept. The root of the tree holds the verification bits and these are camouflaged in the LSBs of various pixels in the block. The experimental outcomes report that without compromising the HC and PSNR values, the extracted data at the receiver could be verified successfully.
引用
收藏
页码:1793 / 1805
页数:13
相关论文
共 50 条
  • [1] Data Hiding and Integrity Verification based on Quotient Value Differencing and Merkle Tree
    Dipak Bhayyaji Khadse
    Gandharba Swain
    [J]. Arabian Journal for Science and Engineering, 2023, 48 : 1793 - 1805
  • [2] Range query integrity verification based on Merkle hash tree
    [J]. 1600, Southeast University (47):
  • [3] Blockchain Based Data Integrity Verification for Cloud Storage with T-Merkle Tree
    He, Kai
    Shi, Jiaoli
    Huang, Chunxiao
    Hu, Xinrong
    [J]. ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2020, PT III, 2020, 12454 : 65 - 80
  • [4] A position-aware Merkle tree for dynamic cloud data integrity verification
    Mao, Jian
    Zhang, Yan
    Li, Pei
    Li, Teng
    Wu, Qianhong
    Liu, Jianwei
    [J]. SOFT COMPUTING, 2017, 21 (08) : 2151 - 2164
  • [5] A position-aware Merkle tree for dynamic cloud data integrity verification
    Jian Mao
    Yan Zhang
    Pei Li
    Teng Li
    Qianhong Wu
    Jianwei Liu
    [J]. Soft Computing, 2017, 21 : 2151 - 2164
  • [6] Data Hiding Using Quotient Value Differencing and Remainder Value Substitution Avoiding Incorrect Extraction Problem
    Khadse, Dipak Bhayyaji
    Swain, Gandharba
    [J]. SENSING AND IMAGING, 2021, 22 (01):
  • [7] Data Hiding Using Quotient Value Differencing and Remainder Value Substitution Avoiding Incorrect Extraction Problem
    Dipak Bhayyaji Khadse
    Gandharba Swain
    [J]. Sensing and Imaging, 2021, 22
  • [8] An Overview of Pixel Value Differencing based Data Hiding Techniques
    Singh, Akanksha
    Rawat, Mukesh
    Shukla, Awdhesh K.
    Kumar, Amod
    Singh, Balvinder
    [J]. 2018 ELEVENTH INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING (IC3), 2018, : 374 - 376
  • [9] Data Integrity Audit Scheme Based on Quad Merkle Tree and Blockchain
    Liu, Zhenpeng
    Ren, Lele
    Feng, Yongjiang
    Wang, Shuo
    Wei, Jianhang
    [J]. IEEE ACCESS, 2023, 11 : 59263 - 59273
  • [10] Image tamper detection and correction using Merkle tree and remainder value differencing
    Kosuru, S. N. V. J. Devi
    Swain, Gandharba
    Kumar, Naween
    Pradhan, Anita
    [J]. OPTIK, 2022, 261