Authentication of Secret Information in Image Steganography

被引:0
|
作者
Babu, K. Suresh [1 ]
Raja, K. B. [1 ]
Kumar, Kiran K. [1 ]
Devi, Manjula T. H. [1 ]
Venugopal, K. R. [1 ]
Patnaik, L. M. [2 ]
机构
[1] Bangalore Univ, Univ Visvesvaraya Coll Engn, Dept Comp Sci & Engn, Bangalore 560001, Karnataka, India
[2] Indian Inst Sci, Microprocessor Appl Lab, Bangalore, Karnataka, India
关键词
Steganography; Discrete Wavelet Transform (DWT); Veracity verification code; Discrete Cosine Transform (DCT);
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, Steganography and Steganalysis are two important areas of research that involve a number or applications. These two areas of research are important especially when reliable and secure information exchange is required. Steganography is an art of embedding information in a cover image without causing statistically significant variations to the cover image. Steganalysis is the technology that attempts to) defeat Steganography by detecting the hidden information and extracting. In this paper we propose an image Steganography that can verify the reliability of the information being transmitted to the receiver. The method can verify whether the attacker has tried to edit, delete or forge the secret information in the stego-image. The technique embeds the hidden information in the spatial domain of the cover image and uses two special AC coefficients of the Discrete Wavelet Transform domain to verify the veracity (integrity) of the secret information from the stego image. The analysis shows that the BER and PSNR is improved in the case of DWT than DCT.
引用
收藏
页码:1659 / +
页数:2
相关论文
共 50 条
  • [1] Authentication of Encrypted Secret Information in Image Steganography
    Kalaivani, B.
    Padmaa, M.
    [J]. 2014 INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND SIGNAL PROCESSING (ICCSP), 2014,
  • [2] Secret image sharing with steganography and authentication
    Lin, CC
    Tsai, WH
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2004, 73 (03) : 405 - 414
  • [3] A new approach to the secret image sharing with steganography and authentication
    Wu, C-C
    Hwang, M-S
    Kao, S-J
    [J]. IMAGING SCIENCE JOURNAL, 2009, 57 (03): : 140 - 151
  • [4] Authentication of Secret Information in Image Stenography
    Karthik, Jidagam Venkata
    Reddy, B. Venkateswara
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2014, 14 (06): : 58 - 63
  • [5] Invertible secret image sharing with steganography and authentication for AMBTC compressed images
    Wu, Xiaotian
    Yang, Ching-Nung
    [J]. SIGNAL PROCESSING-IMAGE COMMUNICATION, 2019, 78 : 437 - 447
  • [6] Authentication of Secret Message using Rabin-Karp in Image Steganography
    Karthikeyan, B.
    Nishmitha, P.
    Poojasree, B.
    Asha, S.
    [J]. PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICCS), 2019, : 388 - 391
  • [7] Secret information hiding in image randomly method using steganography and cryptography
    Hammoud, Awad Kadhim
    Mohaisen, Hatem Nahi
    Mohammed, Mohammed Q.
    [J]. INTERNATIONAL JOURNAL OF NONLINEAR ANALYSIS AND APPLICATIONS, 2021, 12 : 1283 - 1291
  • [8] Secret sharing systems with authentication-based steganography
    Wang, Shiuh-Jeng
    Lin, I-Shuan
    Hsieh, Ye-Lin
    Weng, Chi-Yao
    [J]. 2008 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS, 2008, : 1146 - +
  • [9] Secret Image Sharing with Reversible Steganography
    Chang, Chin-Chen
    Lin, Pei-Yu
    Chan, Chi-Shiang
    [J]. PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND NATURAL COMPUTING, VOL II, 2009, : 253 - +
  • [10] Invertible secret image sharing with steganography
    Lin, Pei-Yu
    Chan, Chi-Shiang
    [J]. PATTERN RECOGNITION LETTERS, 2010, 31 (13) : 1887 - 1893