Authentication of Encrypted Secret Information in Image Steganography

被引:0
|
作者
Kalaivani, B. [1 ]
Padmaa, M. [2 ]
机构
[1] Saranathan Coll Engn, ME Commun Syst, Panjappur 620012, Thiruchirappall, India
[2] Saranathan Coll Engn, Dept ECE, Panjappur 620012, Thiruchirappall, India
关键词
Steganography; Discrete Wavelet Transform; Veracity Verification code; Steganalysis;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Steganography is the art of hiding the existence of data in another transmission medium to achieve secret communication. Steganalysis is the method of discovering the secret message. These two areas are very useful in secret communication. In this paper the proposed scheme is an image steganography that can verify the integrity of the secret information which is transmitted to the receiver. Integrity is the method to verify whether the information is altered by the attacker. The process embeds the encrypted secret message into the cover image with the veracity verification code. To verify the integrity the veracity verification code is used. Two special AC coefficients are used to create the veracity verification code. The Bit Error rate (BER) and the Peak Signal to Noise Ratio (PSNR) calculation are performed.
引用
收藏
页数:5
相关论文
共 50 条
  • [31] Secret image sharing based on cellular automata and steganography
    Eslami, Z.
    Razzaghi, S. H.
    Ahmadabadi, J. Zarepour
    PATTERN RECOGNITION, 2010, 43 (01) : 397 - 404
  • [32] Image Steganography to Hide Unlimited Secret Text Size
    Almazaydeh, Wa'el Ibrahim A.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2022, 22 (04): : 73 - 82
  • [33] Secret-to-Image Reversible Transformation for Generative Steganography
    Zhou, Zhili
    Su, Yuecheng
    Li, Jin
    Yu, Keping
    Wu, Q. M. Jonathan
    Fu, Zhangjie
    Shi, Yunqing
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (05) : 4118 - 4134
  • [34] A Lossless Secret Image Sharing Scheme Based on Steganography
    Li, Li
    Abd El-Latif, Ahmed A.
    Yan, Xuehu
    Wang, Shen
    Niu, Xiamu
    PROCEEDINGS OF THE 2012 SECOND INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2012), 2012, : 1247 - 1250
  • [35] Guest Editorial Special Issue on Steganography and Image Authentication
    Chin-Chen Chang
    Yung-Chen Chou
    Journal of Electronic Science and Technology, 2013, 11 (01) : 1 - 2
  • [36] Research on reversible image steganography of encrypted image based on image interpolation and difference histogram shift
    Ye, Hanmin
    Su, Keqin
    Cheng, Xiaohui
    Huang, Shiming
    IET IMAGE PROCESSING, 2022, 16 (07) : 1959 - 1972
  • [37] Steganography and authentication in image sharing without parity bits
    Yang, Ching-Nung
    Ouyang, Jin-Fwu
    Harn, Lein
    OPTICS COMMUNICATIONS, 2012, 285 (07) : 1725 - 1735
  • [38] Image steganography using exploiting modification direction for compressed encrypted data
    Younus, Zeyad Safaa
    Hussain, Mohammed Khaire
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (06) : 2951 - 2963
  • [39] A Secure Mutual Authentication Protocol for Cloud Computing using Secret Sharing and Steganography
    Sarvabhatla, Mrudula
    Giri, M.
    Vorugunti, Chandra Sekhar
    2014 IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING IN EMERGING MARKETS (CCEM), 2014, : 9 - 16
  • [40] Novel Mutual Authentication Protocol for Cloud Computing using Secret Sharing and Steganography
    Nimmy, K.
    Sethumadhavan, M.
    2014 FIFTH INTERNATIONAL CONFERENCE ON THE APPLICATIONS OF DIGITAL INFORMATION AND WEB TECHNOLOGIES (ICADIWT), 2014, : 101 - 106