Authentication of Encrypted Secret Information in Image Steganography

被引:0
|
作者
Kalaivani, B. [1 ]
Padmaa, M. [2 ]
机构
[1] Saranathan Coll Engn, ME Commun Syst, Panjappur 620012, Thiruchirappall, India
[2] Saranathan Coll Engn, Dept ECE, Panjappur 620012, Thiruchirappall, India
关键词
Steganography; Discrete Wavelet Transform; Veracity Verification code; Steganalysis;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Steganography is the art of hiding the existence of data in another transmission medium to achieve secret communication. Steganalysis is the method of discovering the secret message. These two areas are very useful in secret communication. In this paper the proposed scheme is an image steganography that can verify the integrity of the secret information which is transmitted to the receiver. Integrity is the method to verify whether the information is altered by the attacker. The process embeds the encrypted secret message into the cover image with the veracity verification code. To verify the integrity the veracity verification code is used. Two special AC coefficients are used to create the veracity verification code. The Bit Error rate (BER) and the Peak Signal to Noise Ratio (PSNR) calculation are performed.
引用
收藏
页数:5
相关论文
共 50 条
  • [21] Reversibility-oriented secret image sharing mechanism with steganography and authentication based on code division multiplexing
    Xie, Xiao-Zhu
    Chang, Chin-Chen
    Lin, Chia-Chen
    IET IMAGE PROCESSING, 2019, 13 (09) : 1411 - 1420
  • [22] Secret Image Sharing Based on Encrypted Pixels
    Zhou, Zhili
    Yang, Ching-Nung
    Cao, Yi
    Sun, Xingming
    IEEE ACCESS, 2018, 6 : 15021 - 15025
  • [23] Effect of Secret Image Transformation on the Steganography Process
    Buker, Mohamed
    Tora, Hakan
    Gokcay, Erhan
    2017 24TH IEEE INTERNATIONAL CONFERENCE ON ELECTRONICS, CIRCUITS AND SYSTEMS (ICECS), 2017, : 351 - 355
  • [24] Image Steganography for Increasing Security of OTP Authentication
    Arokiasamy, Aldrin Wilfred
    Skarbek, Wladyslaw
    PHOTONICS APPLICATIONS IN ASTRONOMY, COMMUNICATIONS, INDUSTRY, AND HIGH-ENERGY PHYSICS EXPERIMENTS 2018, 2018, 10808
  • [25] Leveraging coverless image steganography to hide secret information by generating anime characters using GAN
    Rehman, Hafiz Abdul
    Bajwa, Usama Ijaz
    Raza, Rana Hammad
    Alfarhood, Sultan
    Safran, Mejdl
    Zhang, Fan
    EXPERT SYSTEMS WITH APPLICATIONS, 2024, 248
  • [26] Reversible secret image sharing scheme in encrypted images
    Sang-Ho Shin
    Ki-Hyun Jung
    Multimedia Tools and Applications, 2016, 75 : 13931 - 13949
  • [27] Highly Randomized Image Steganography using Secret Keys
    Dagar, Sunny
    2014 RECENT ADVANCES AND INNOVATIONS IN ENGINEERING (ICRAIE), 2014,
  • [28] Reversible secret image sharing scheme in encrypted images
    Shin, Sang-Ho
    Jung, Ki-Hyun
    MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (21) : 13931 - 13949
  • [29] Hiding Encrypted Multiple Secret Images in a Cover Image
    Guttikonda, Prashanti
    Cherukuri, Hemanthi
    Mundukur, Nirupama Bhat
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND DATA ENGINEERING, 2018, 9 : 95 - 104
  • [30] Reversible secret image sharing with steganography and dynamic embedding
    Hu, Wei-Tong
    Li, Ming-Chu
    Guo, Cheng
    Ren, Yi-Zhi
    SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (11) : 1267 - 1276