Authentication of Secret Information in Image Steganography

被引:0
|
作者
Babu, K. Suresh [1 ]
Raja, K. B. [1 ]
Kumar, Kiran K. [1 ]
Devi, Manjula T. H. [1 ]
Venugopal, K. R. [1 ]
Patnaik, L. M. [2 ]
机构
[1] Bangalore Univ, Univ Visvesvaraya Coll Engn, Dept Comp Sci & Engn, Bangalore 560001, Karnataka, India
[2] Indian Inst Sci, Microprocessor Appl Lab, Bangalore, Karnataka, India
关键词
Steganography; Discrete Wavelet Transform (DWT); Veracity verification code; Discrete Cosine Transform (DCT);
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, Steganography and Steganalysis are two important areas of research that involve a number or applications. These two areas of research are important especially when reliable and secure information exchange is required. Steganography is an art of embedding information in a cover image without causing statistically significant variations to the cover image. Steganalysis is the technology that attempts to) defeat Steganography by detecting the hidden information and extracting. In this paper we propose an image Steganography that can verify the reliability of the information being transmitted to the receiver. The method can verify whether the attacker has tried to edit, delete or forge the secret information in the stego-image. The technique embeds the hidden information in the spatial domain of the cover image and uses two special AC coefficients of the Discrete Wavelet Transform domain to verify the veracity (integrity) of the secret information from the stego image. The analysis shows that the BER and PSNR is improved in the case of DWT than DCT.
引用
收藏
页码:1659 / +
页数:2
相关论文
共 50 条
  • [21] Highly Randomized Image Steganography using Secret Keys
    Dagar, Sunny
    [J]. 2014 RECENT ADVANCES AND INNOVATIONS IN ENGINEERING (ICRAIE), 2014,
  • [22] Reversible secret image sharing with steganography and dynamic embedding
    Hu, Wei-Tong
    Li, Ming-Chu
    Guo, Cheng
    Ren, Yi-Zhi
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (11) : 1267 - 1276
  • [23] Secret image sharing based on cellular automata and steganography
    Eslami, Z.
    Razzaghi, S. H.
    Ahmadabadi, J. Zarepour
    [J]. PATTERN RECOGNITION, 2010, 43 (01) : 397 - 404
  • [24] Image Steganography to Hide Unlimited Secret Text Size
    Almazaydeh, Wa'el Ibrahim A.
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2022, 22 (04): : 73 - 82
  • [25] Secret-to-Image Reversible Transformation for Generative Steganography
    Zhou, Zhili
    Su, Yuecheng
    Li, Jin
    Yu, Keping
    Wu, Q. M. Jonathan
    Fu, Zhangjie
    Shi, Yunqing
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (05) : 4118 - 4134
  • [26] A Lossless Secret Image Sharing Scheme Based on Steganography
    Li, Li
    Abd El-Latif, Ahmed A.
    Yan, Xuehu
    Wang, Shen
    Niu, Xiamu
    [J]. PROCEEDINGS OF THE 2012 SECOND INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2012), 2012, : 1247 - 1250
  • [27] Guest Editorial Special Issue on Steganography and Image Authentication
    Chin-Chen Chang
    Yung-Chen Chou
    [J]. Journal of Electronic Science and Technology, 2013, 11 (01) : 1 - 2
  • [28] Steganography and authentication in image sharing without parity bits
    Yang, Ching-Nung
    Ouyang, Jin-Fwu
    Harn, Lein
    [J]. OPTICS COMMUNICATIONS, 2012, 285 (07) : 1725 - 1735
  • [29] Novel Mutual Authentication Protocol for Cloud Computing using Secret Sharing and Steganography
    Nimmy, K.
    Sethumadhavan, M.
    [J]. 2014 FIFTH INTERNATIONAL CONFERENCE ON THE APPLICATIONS OF DIGITAL INFORMATION AND WEB TECHNOLOGIES (ICADIWT), 2014, : 101 - 106
  • [30] A Secure Mutual Authentication Protocol for Cloud Computing using Secret Sharing and Steganography
    Sarvabhatla, Mrudula
    Giri, M.
    Vorugunti, Chandra Sekhar
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING IN EMERGING MARKETS (CCEM), 2014, : 9 - 16