Authentication of Encrypted Secret Information in Image Steganography

被引:0
|
作者
Kalaivani, B. [1 ]
Padmaa, M. [2 ]
机构
[1] Saranathan Coll Engn, ME Commun Syst, Panjappur 620012, Thiruchirappall, India
[2] Saranathan Coll Engn, Dept ECE, Panjappur 620012, Thiruchirappall, India
关键词
Steganography; Discrete Wavelet Transform; Veracity Verification code; Steganalysis;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Steganography is the art of hiding the existence of data in another transmission medium to achieve secret communication. Steganalysis is the method of discovering the secret message. These two areas are very useful in secret communication. In this paper the proposed scheme is an image steganography that can verify the integrity of the secret information which is transmitted to the receiver. Integrity is the method to verify whether the information is altered by the attacker. The process embeds the encrypted secret message into the cover image with the veracity verification code. To verify the integrity the veracity verification code is used. Two special AC coefficients are used to create the veracity verification code. The Bit Error rate (BER) and the Peak Signal to Noise Ratio (PSNR) calculation are performed.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] Authentication of Secret Information in Image Steganography
    Babu, K. Suresh
    Raja, K. B.
    Kumar, Kiran K.
    Devi, Manjula T. H.
    Venugopal, K. R.
    Patnaik, L. M.
    2008 IEEE REGION 10 CONFERENCE: TENCON 2008, VOLS 1-4, 2008, : 1659 - +
  • [2] Secret image sharing with steganography and authentication
    Lin, CC
    Tsai, WH
    JOURNAL OF SYSTEMS AND SOFTWARE, 2004, 73 (03) : 405 - 414
  • [3] A new approach to the secret image sharing with steganography and authentication
    Wu, C-C
    Hwang, M-S
    Kao, S-J
    IMAGING SCIENCE JOURNAL, 2009, 57 (03): : 140 - 151
  • [4] Authentication of Secret Information in Image Stenography
    Karthik, Jidagam Venkata
    Reddy, B. Venkateswara
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2014, 14 (06): : 58 - 63
  • [5] Invertible secret image sharing with steganography and authentication for AMBTC compressed images
    Wu, Xiaotian
    Yang, Ching-Nung
    SIGNAL PROCESSING-IMAGE COMMUNICATION, 2019, 78 : 437 - 447
  • [6] Authentication of Secret Message using Rabin-Karp in Image Steganography
    Karthikeyan, B.
    Nishmitha, P.
    Poojasree, B.
    Asha, S.
    PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICCS), 2019, : 388 - 391
  • [7] Advanced Steganography Algorithm using Encrypted secret message
    Nath, Joyshree
    Nath, Asoke
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2011, 2 (03) : 19 - 24
  • [8] Secret information hiding in image randomly method using steganography and cryptography
    Hammoud, Awad Kadhim
    Mohaisen, Hatem Nahi
    Mohammed, Mohammed Q.
    INTERNATIONAL JOURNAL OF NONLINEAR ANALYSIS AND APPLICATIONS, 2021, 12 : 1283 - 1291
  • [9] Steganography with High Reconstruction Robustness: Hiding of Encrypted Secret Images
    Zhu, Xishun
    Lai, Zhengliang
    Zhou, Nanrun
    Wu, Jianhua
    MATHEMATICS, 2022, 10 (16)
  • [10] Detection of Hidden Encrypted URL in Image Steganography
    Aljamea, Moudhi
    Athar, Tanver
    Iliopoulos, Costas S.
    Samiruzzaman, M.
    NINTH INTERNATIONAL CONFERENCES ON PERVASIVE PATTERNS AND APPLICATIONS (PATTERNS 2017), 2017, : 3 - 8