Secret Key-Based Image Steganography in Spatial Domain

被引:0
|
作者
Gajabe, Rajashree [1 ]
Ali, Syed Taqi [1 ]
机构
[1] Visvesvaraya Natl Inst Technol, Dept CSE, Nagpur 440010, Maharashtra, India
关键词
Image steganography; cover image; stego image; secret key; message;
D O I
10.1142/S0219467822500140
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Day by day, the requirement for secure communication among users is rising in a digital world, to protect the message from the undesirable users. Steganography is a methodology that satisfies the user's necessity of secure communication by inserting a message into different formats. This paper proposes a secret key-based image steganography to secure the message by concealing the grayscale image inside a cover image. The proposed technique shares the 20 characters long secret key between two clients where the initial eight characters of a secret key are utilized for bit permutation of characters and pixels while the last 12 characters of secret key decide the encryption keys and position of pixels of a grayscale image into the cover. The grayscale image undergoes operation such as encryption and chaotic baker followed by its hiding in a cover to form a stego image. The execution of the proposed strategy is performed on Matlab 2018. It shows that the proposed approach manages to store the maximum message of size 16 KB into the cover of size 256 x 256. The image quality of stego images has been evaluated using PSNR, MSE. For a full payload of 16 KB, PSNR is around 51 dB to 53 dB which is greater than satisfactory PSNR.
引用
收藏
页数:25
相关论文
共 50 条
  • [1] Secret key estimation for image sequential steganography in transform domain
    Luo, Xiangyang
    Wang, Daoshun
    Wang, Ping
    Liu, Fenlin
    [J]. GLOBECOM 2007: 2007 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-11, 2007, : 538 - +
  • [2] A Novel Approach to Digital Image Steganography of Key-Based Encrypted Text
    Chakrabarti, Sreeparna
    Samanta, Debabrata
    [J]. 2015 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, SIGNALS, COMMUNICATION AND OPTIMIZATION (EESCO), 2015,
  • [3] Secret key-based Authentication with a Privacy Constraint
    Kittichokechai, Kittipong
    Caire, Giuseppe
    [J]. 2015 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2015, : 1791 - 1795
  • [4] Spatial Domain Image Steganography based on Security and Randomization
    Tiwari, Namita
    Sandilya, Madhu
    Chawla, Meenu
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2014, 5 (01) : 156 - 159
  • [5] A Review on Spatial Domain Technique Based on Image Steganography
    Sharma, Neha
    Batra, Usha
    [J]. 2017 INTERNATIONAL CONFERENCE ON COMPUTING AND COMMUNICATION TECHNOLOGIES FOR SMART NATION (IC3TSN), 2017, : 24 - 27
  • [6] Random Image Steganography in Spatial Domain
    Samidha, Diwedi
    Agrawal, Dipesh
    [J]. 2013 INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN VLSI, EMBEDDED SYSTEM, NANO ELECTRONICS AND TELECOMMUNICATION SYSTEM (ICEVENT 2013), 2013,
  • [7] Image steganography in spatial domain: A survey
    Hussain, Mehdi
    Wahab, Ainuddin Wahid Abdul
    Bin Idris, Yamani Idna
    Ho, Anthony T. S.
    Jung, Ki-Hyun
    [J]. SIGNAL PROCESSING-IMAGE COMMUNICATION, 2018, 65 : 46 - 66
  • [8] Secret Key-Based Identification and Authentication With a Privacy Constraint
    Kittichokechai, Kittipong
    Caire, Giuseppe
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2016, 62 (11) : 6189 - 6203
  • [9] Evaluating Adversarial Robustness of Secret Key-Based Defenses
    Ali, Ziad Tariq Muhammad
    Mohammed, Ameer
    Ahmad, Imtiaz
    [J]. IEEE ACCESS, 2022, 10 : 34872 - 34882
  • [10] An Analysis of Edge Based Image Steganography Techniques in Spatial Domain
    Singla, Deepali
    Juneja, Mamta
    [J]. 2014 RECENT ADVANCES IN ENGINEERING AND COMPUTATIONAL SCIENCES (RAECS), 2014,