Puzzle based Highly Secure Steganography

被引:0
|
作者
Shankar, Siva S. [1 ]
Rengarajan, A. [2 ]
机构
[1] Bharath Univ, Madras, Tamil Nadu, India
[2] Dr RR Dr SR Engn Coll, Dept CSE VelTech MultiTech, Madras, Tamil Nadu, India
关键词
Embedding; Extraction; Random Permutation; Steganography;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Steganography is the insertion of secret data inside a normal cover media such as digital image, audio, video or text. The inserted message must not be damaged when processing is applied on the cover media. Several image processing operations such as format conversion, lossy and lossless compression, noise removal and other enhancement. This paper presents multi layer image encryption and decryption using random puzzle based method to embed secret data into the cover image. This approach enhances the security and provides robust embedding. In this work, a 8x8 Sudoku puzzle which has a 64x64 reference matrix is used. The proposed method gives a superior average capacity of 5 bits per pixel. The message is embedded at the sender using random permutation puzzle. At the Receiver end, the user has to rearrange the image thereby solving the puzzle. The attacker lacks knowledge of original image order and is unable to solve the puzzle. Our outcome indicate that the recommended approach provides high steganographic security while providing high embedding capacity of about 5 bits per pixel. A brief analysis of the performance and security aspects of the proposed method are presented.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] A Highly Secure DNA Based Image Steganography
    Das, Prasenjit
    Kar, Nirmalya
    [J]. 2014 INTERNATIONAL CONFERENCE ON GREEN COMPUTING COMMUNICATION AND ELECTRICAL ENGINEERING (ICGCCEE), 2014,
  • [2] Highly Secure DNA-based Audio Steganography
    Shyamasree, C. M.
    Anees, Sheena
    [J]. 2013 INTERNATIONAL CONFERENCE ON RECENT TRENDS IN INFORMATION TECHNOLOGY (ICRTIT), 2013, : 519 - 524
  • [3] A Methodology Based on Steganography and Cryptography to Protect Highly Secure Messages
    Rasras, Rashad J.
    AlQadi, Ziad A.
    Abu Sara, Mutaz Rasmi
    [J]. ENGINEERING TECHNOLOGY & APPLIED SCIENCE RESEARCH, 2019, 9 (01) : 3681 - 3684
  • [4] Secure Steganography Scheme Based on Steganography Generative Adversarial Network
    Pan, Guangxu
    Yang, Zhongpeng
    Ma, Yong
    [J]. FRONTIERS IN CYBER SECURITY, FCS 2023, 2024, 1992 : 487 - 502
  • [5] A Novel Puzzle Based Image Steganography Technique
    Espina, Marilou O.
    Fajardo, Arnel C.
    Gerardo, Bobby D.
    Medina, Ruji P.
    [J]. ELEVENTH INTERNATIONAL CONFERENCE ON GRAPHICS AND IMAGE PROCESSING (ICGIP 2019), 2020, 11373
  • [6] Secure steganography based on embedding capacity
    Hedieh Sajedi
    Mansour Jamzad
    [J]. International Journal of Information Security, 2009, 8 : 433 - 445
  • [7] Steganography-Based Secure Communication
    Bhatia, Manjot
    Muttoo, Sunil Kumar
    Bhatia, M. P. S.
    [J]. PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON SOFT COMPUTING FOR PROBLEM SOLVING (SOCPROS 2012), 2014, 236 : 781 - 792
  • [8] Secure steganography based on embedding capacity
    Sajedi, Hedieh
    Jamzad, Mansour
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2009, 8 (06) : 433 - 445
  • [9] SEBS - Secure Emoticons Based Steganography
    Rafat, Khan Farhan
    Hussain, Junaid
    [J]. PROCEEDINGS OF THE 11TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2016), 2016, : 280 - 287
  • [10] Secure Key Based Image Realization Steganography
    Samima, Shabnam
    Roy, Ratnakirti
    Changder, Suvamoy
    [J]. 2013 IEEE SECOND INTERNATIONAL CONFERENCE ON IMAGE INFORMATION PROCESSING (ICIIP), 2013, : 377 - 382