A secure multimedia steganography scheme using hybrid transform and support vector machine for cloud-based storage

被引:8
|
作者
Sukumar, Arunkumar [1 ]
Subramaniyaswamy, V. [1 ]
Vijayakumar, V. [2 ]
Ravi, Logesh [3 ]
机构
[1] SASTRA Deemed Univ, Sch Comp, Thanjavur, India
[2] Vellore Inst Technol, Sch Comp Sci & Engn, Chennai, Tamil Nadu, India
[3] Sri Ramachandra Inst Higher Educ & Res, Sri Ramachandra Fac Engn & Technol, Chennai, Tamil Nadu, India
关键词
Multimedia security; Image steganography; Discrete Rajan transform; Support vector machine; Diamond embedding; IMAGE STEGANOGRAPHY; COLOR IMAGE;
D O I
10.1007/s11042-019-08476-2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing is widely accepted by both individuals and enterprises alike for the storage of multimedia contents. It is due to the introduction of a new architecture where the cost of computation, storage, and services needed for maintenance for storage of multimedia are less. Cloud computing addresses the scarcity of resources for clients by offering options to pay for services only as they are used. But once the organization's multimedia contents are uploaded into cloud space, the user loses control over their contents which may no longer be safe. The cloud user has to take some measure to avoid privacy issues. Steganography is preferred over encryption for providing multimedia security as content concealed in a cover image is not revealed. The multimedia content is transformed using Discrete Rajan Transform (DRT) and embedded into a chosen cover image which is created by Integer Wavelet using Diamond Encoding Scheme. Generated stego images are stored in the cloud. When the multimedia content is required, stego images are downloaded from the cloud and are subjected to inverse transform of IWT. SVM provides Good learning ability to our extraction process which makes our algorithm more robust to various attacks, viz., salt and pepper noise, Gaussian noise, cropping, compression, etc. Experimental values for Peak Signal to Noise Ratio (PSNR) for two secret images are 53 and 50 respectively which is better over the available schemes in the literature. Similarly for robustness and security evaluation, our scheme provides a better result.
引用
收藏
页码:10825 / 10849
页数:25
相关论文
共 50 条
  • [31] A Group Based Identity Anonymity and Secure Cloud Storage Scheme
    Liu, Fan
    Jiang, Rui
    [J]. PROCEEDINGS OF THE 1ST INTERNATIONAL WORKSHOP ON CLOUD COMPUTING AND INFORMATION SECURITY (CCIS 2013), 2013, 52 : 238 - 241
  • [32] Intelligent busbar protection scheme based on combination of support vector machine and S-transform
    Gil, Milad
    Abdoos, Ali Akbar
    [J]. IET GENERATION TRANSMISSION & DISTRIBUTION, 2017, 11 (08) : 2056 - 2064
  • [33] A novel secure image steganography scheme based on Hamming encoding and LSB matching revisited using Lah Transform
    Nguyen, Tuan Duc
    Le, Hai Quoc
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (32) : 77347 - 77375
  • [34] Adaptive Image Fusion Scheme Based on Contourlet Transform, Kernel PCA and Support Vector Machine
    Malik, Madiha Hussain
    Gilani, S. A. M.
    Anwaar-ul-Haq
    [J]. INNOVATIONS AND ADVANCED TECHNIQUES IN SYSTEMS, COMPUTING SCIENCES AND SOFTWARE ENGINEERING, 2008, : 313 - +
  • [35] Cloud-based Secure Healthcare Framework by using Enhanced Ciphertext Policy Attribute-Based Encryption Scheme
    Satar, Siti Dhalila Mohd
    Mohamed, Mohamad Afendee
    Hussin, Masnida
    Hanapi, Zurina Mohd
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (06) : 393 - 399
  • [36] Prediction Based on Wavelet Transform and Support Vector Machine
    Liu, Xiaohong
    Zhu, Yanwei
    Zhang, Yongli
    Wang, Xinchun
    [J]. INFORMATION COMPUTING AND APPLICATIONS, PT I, 2011, 243 : 618 - +
  • [37] SOS-FCI: a secure offloading scheme in fog–cloud-based IoT
    Yashar Salami
    Vahid Khajehvand
    Esmaeil Zeinali
    [J]. The Journal of Supercomputing, 2024, 80 : 570 - 600
  • [38] Cloud-based disaster management architecture using hybrid machine learning approach in IoT
    Ozen, Figen
    Souri, Alireza
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (29) : 72357 - 72370
  • [39] A Cloud-Based Secure Emergency Message Dissemination Scheme in Vehicular Adhoc Networks
    Rajasekar, R.
    Sivakumar, P.
    [J]. INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2022, 33 (01): : 117 - 131
  • [40] SUAS: Scalable User Authentication Scheme for Secure Accessing to Cloud-Based Environments
    Moghaddam, Faraz Fatemi
    Ravan, Rama Roshan
    Khodadadi, Touraj
    Javadianasl, Yashar
    Halalzadeh, Abbasali
    [J]. 2014 IEEE SYMPOSIUM ON COMPUTER APPLICATIONS AND INDUSTRIAL ELECTRONICS (ISCAIE), 2014,