Authentication of Encrypted Secret Information in Image Steganography

被引:0
|
作者
Kalaivani, B. [1 ]
Padmaa, M. [2 ]
机构
[1] Saranathan Coll Engn, ME Commun Syst, Panjappur 620012, Thiruchirappall, India
[2] Saranathan Coll Engn, Dept ECE, Panjappur 620012, Thiruchirappall, India
关键词
Steganography; Discrete Wavelet Transform; Veracity Verification code; Steganalysis;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Steganography is the art of hiding the existence of data in another transmission medium to achieve secret communication. Steganalysis is the method of discovering the secret message. These two areas are very useful in secret communication. In this paper the proposed scheme is an image steganography that can verify the integrity of the secret information which is transmitted to the receiver. Integrity is the method to verify whether the information is altered by the attacker. The process embeds the encrypted secret message into the cover image with the veracity verification code. To verify the integrity the veracity verification code is used. Two special AC coefficients are used to create the veracity verification code. The Bit Error rate (BER) and the Peak Signal to Noise Ratio (PSNR) calculation are performed.
引用
收藏
页数:5
相关论文
共 50 条
  • [41] An Improvement of Image Secret Sharing and Hiding With Authentication
    Aghaziarati, S.
    Saryazdi, S.
    Nezamabadipour, H.
    2012 9TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2012, : 38 - 42
  • [42] Visual Pattern Embedding in Multi-Secret Image Steganography
    Ogiela, Marek R.
    Koptyra, Katarzyna
    2015 INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATICS AND BIOMEDICAL SCIENCES (ICIIBMS), 2015, : 434 - 437
  • [43] An Enhanced Steganography Network for Concealing and Protecting Secret Image Data
    Chen, Feng
    Xing, Qinghua
    Sun, Bing
    Yan, Xuehu
    Cheng, Jingwen
    ENTROPY, 2022, 24 (09)
  • [44] LSB Steganography with Usage of Mojette Transform for Secret Image Scrambling
    Oravec, Jakub
    Turan, Jan
    Ovsenik, L'ubos
    PROCEEDINGS OF THE 23RD INTERNATIONAL CONFERENCE ON SYSTEMS, SIGNALS AND IMAGE PROCESSING, (IWSSIP 2016), 2016, : 269 - 272
  • [45] Secret Key-Based Image Steganography in Spatial Domain
    Gajabe, Rajashree
    Ali, Syed Taqi
    INTERNATIONAL JOURNAL OF IMAGE AND GRAPHICS, 2022, 22 (02)
  • [46] Secret image sharing using grayscale payload decomposition and irreversible image steganography
    Chakraborty, Soumendu
    Jalal, Anand Singh
    Bhatnagar, Charul
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2013, 18 (04) : 180 - 192
  • [47] Secret data transmission using advance steganography and image compression
    Pandey, Digvijay
    Wairya, Subodh
    Mandawi, Raghda Salam Ai
    Najim, Saif Al-din M.
    Khalaf, Haitham Abbas
    Al-Barzinji, Shokhan M.
    Obaid, Ahmed J.
    INTERNATIONAL JOURNAL OF NONLINEAR ANALYSIS AND APPLICATIONS, 2021, 12 : 1243 - 1257
  • [48] Secret key estimation for image sequential steganography in transform domain
    Luo, Xiangyang
    Wang, Daoshun
    Wang, Ping
    Liu, Fenlin
    GLOBECOM 2007: 2007 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-11, 2007, : 538 - +
  • [49] Secret Image Sharing Using Steganography with Different Cover Images
    Jagadeesh, Noopa
    Nandakumar, Aishwarya
    Harmya, P.
    Anju, S. S.
    ADVANCES IN COMPUTING AND COMMUNICATIONS, PT 2, 2011, 191 : 490 - 497
  • [50] Image Authentication Using Only Partial Phase Information from a Double-Random-Phase-Encrypted Image in the Fresnel Domain
    Zheng, Jiecai
    Li, Xueqing
    JOURNAL OF THE OPTICAL SOCIETY OF KOREA, 2015, 19 (03) : 241 - 247