Data Hiding and Integrity Verification based on Quotient Value Differencing and Merkle Tree

被引:3
|
作者
Khadse, Dipak Bhayyaji [1 ]
Swain, Gandharba [1 ]
机构
[1] Koneru Lakshmaiah Educ Fdn, Dept Comp Sci & Engn, Guntur 522302, Andhra Pradesh, India
关键词
Steganography; Data hiding; QVD; Tamper detection; Merkle tree; STEGANOGRAPHIC METHOD; IMAGE STEGANOGRAPHY; MODIFICATION DIRECTIONS; LSB; PVD; SUBSTITUTION; HISTOGRAM;
D O I
10.1007/s13369-022-06961-9
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
The three important quality aspects of image steganography mechanisms are hiding capacity (HC), peak signal-to-noise ratio (PSNR), and attack resistance. While the stego-image (SI) is on transit from sender to receiver, the camouflaged data may be altered due to several reasons. No existing steganography technique focuses on evaluating the integrity of extracted data at the receiver. Therefore, there is a need to develop techniques to check the integrity of the extracted bits from the SI at the receiver. This article offers a steganography technique with integrity check at the receiver. The image is sliced into various non-overlapping blocks of size 3 x 3. The secret information is camouflaged using bit replacement and differencing mechanisms in 7 MSBs of the 9 pixels. After bits are camouflaged in these 7 MSBs of all the pixels, the verification bits are generated using Merkle tree concept. The root of the tree holds the verification bits and these are camouflaged in the LSBs of various pixels in the block. The experimental outcomes report that without compromising the HC and PSNR values, the extracted data at the receiver could be verified successfully.
引用
收藏
页码:1793 / 1805
页数:13
相关论文
共 50 条
  • [41] Merkle-Tree Based Approach for Ensuring Integrity of Electronic Medical Records
    Sharma, Brihat
    Sekharan, Chandra N.
    Zuo, Fanyu
    [J]. 2018 9TH IEEE ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2018, : 983 - 987
  • [42] MtMR: Ensuring MapReduce Computation Integrity with Merkle Tree-Based Verifications
    Wang, Yongzhi
    Shen, Yulong
    Wang, Hua
    Cao, Jinli
    Jiang, Xiaohong
    [J]. IEEE TRANSACTIONS ON BIG DATA, 2018, 4 (03) : 418 - 431
  • [43] High capacity data hiding based on multi-directional pixel value differencing and decreased difference expansion
    Pratap Chandra Mandal
    Imon Mukherjee
    [J]. Multimedia Tools and Applications, 2022, 81 : 5325 - 5347
  • [44] An Optimal Information Hiding Approach Based on Pixel Value Differencing and Modulus Function
    Aditya Kumar Sahu
    Gandharba Swain
    [J]. Wireless Personal Communications, 2019, 108 : 159 - 174
  • [45] An Optimal Information Hiding Approach Based on Pixel Value Differencing and Modulus Function
    Sahu, Aditya Kumar
    Swain, Gandharba
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2019, 108 (01) : 159 - 174
  • [46] Redactable Signature Scheme for Tree-structured Data based on Merkle Tree
    Hirose, Shoichi
    Kuwakado, Hidenori
    [J]. PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT 2013), 2013, : 313 - 320
  • [47] High capacity data hiding based on multi-directional pixel value differencing and decreased difference expansion
    Mandal, Pratap Chandra
    Mukherjee, Imon
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (04) : 5325 - 5347
  • [48] A data hiding scheme using pixel value differencing and improving exploiting modification directions
    Shen, Shu-Yuan
    Huang, Li-Hong
    [J]. COMPUTERS & SECURITY, 2015, 48 : 131 - 141
  • [49] Merkle Tree and Blockchain-Based Cloud Data Auditing
    Mohan, Arun Prasad
    Asfak, Mohamed R.
    Gladston, Angelin
    [J]. INTERNATIONAL JOURNAL OF CLOUD APPLICATIONS AND COMPUTING, 2020, 10 (03) : 54 - 66
  • [50] An Improved Data Hiding Scheme Based on Formula Fully Exploiting Modification Directions and Pixel Value Differencing Method
    Kuo, Wen-Chung
    Li, Jyun-Jia
    Wang, Chun-Cheng
    Wuu, Lih-Chyau
    Huang, Yu-Chih
    [J]. 2016 11TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS), 2016, : 136 - 140