A Huffman code LSB based image steganography technique using multi-level encryption and achromatic component of an image

被引:0
|
作者
Shahid Rahman
Jamal Uddin
Hameed Hussain
Aftab Ahmed
Ayaz Ali Khan
Muhammad Zakarya
Afzal Rahman
Muhammad Haleem
机构
[1] Qurtuba University of Science and Information Technology,
[2] University of Buner,undefined
[3] Abdul Wali Khan University,undefined
[4] University of Lakki Marwat,undefined
[5] Sohar University,undefined
[6] Kardan University,undefined
来源
关键词
D O I
暂无
中图分类号
学科分类号
摘要
In the recent couple of years, due to the accelerated popularity of the internet, various organizations such as government offices, military, private companies, etc. use different transferring methods for exchanging their information. The Internet has various benefits and some demerits, but the primary bad mark is security of information transmission over an unreliable network, and widely uses of images. So, Steganography is the state of the art of implanting a message in the cover objects, that nobody can suspect or identify it. Therefore, in the field of cover steganography, it is very critical to track down a mechanism for concealing data by utilizing different blends of compression strategies. Amplifying the payload limit, and robustness, and working on the visual quality are the vital factors of this research to make a reliable mechanism. Different cover steganography research strategies have been recommended, and each adores its benefits and impediments but there is a need to foster some better cover steganography implements to accomplish dependability between the essential model of cover steganography. To handle these issues, in this paper we proposed a method in view of Huffman code, Least Significant Bits (LSB) based cover steganography utilizing Multi-Level Encryption (MLE) and colorless part (HC-LSBIS-MLE-AC) of the picture. It also used different substitution and flicking concepts, MLE, Magic matrix, and achromatic concepts for proving the proficiency, and significance of the method. The algorithm was also statistically investigated based on some Statistical Assessment Metrics (SAM) such as Mean Square Error (MSE), Peak Signal Noise Ratio (PSNR), Normalized Cross Correlation (NCC), Structural Similarity Index Metric (SSIM), etc. and different perspectives. The observational outcomes show the likelihood of the proposed algorithm and the capacity to give unwavering quality between security, payload, perception, computation, and temper protection.
引用
收藏
相关论文
共 50 条
  • [41] LSB Based Image Steganography Using PN Sequence & GCD Transform
    Pathak, Rupendra Kumar
    Meena, Shweta
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC), 2015, : 754 - 758
  • [42] A New Chaotic Image Steganography Technique Based on Huffman Compression of Turkish Texts and Fractal Encryption With Post-Quantum Security
    Kasapbasi, Mustafa Cem
    [J]. IEEE ACCESS, 2019, 7 : 148495 - 148510
  • [43] A Novel Image Encryption Technique using Multi-wave based Carrier Image
    Panduranga, H. T.
    Kumar, Naveen S. K.
    [J]. INTERNATIONAL CONFERENCE ON MODELLING OPTIMIZATION AND COMPUTING, 2012, 38 : 2998 - 3004
  • [44] A Novel Image Steganography Technique Using AES Encryption in DCT Domain
    Sahu, Aman
    Pradhan, Chittaranjan
    [J]. DISTRIBUTED COMPUTING AND INTELLIGENT TECHNOLOGY, ICDCIT 2023, 2023, 13776 : 349 - 354
  • [45] Huffman Encoding with White Tailed Eagle Algorithm-based Image Steganography Technique
    Alkhliwi, Sultan
    [J]. ENGINEERING TECHNOLOGY & APPLIED SCIENCE RESEARCH, 2023, 13 (02) : 10453 - 10459
  • [46] Improved image steganography technique for colored images using huffman encoding with symlet wavelets
    Rubab, Saddaf
    Younus, M.
    [J]. International Journal of Computer Science Issues, 2012, 9 (02) : 194 - 196
  • [47] Encryption with Image Steganography Based Data Hiding Technique in IIoT Environment
    Ragab, Mahmoud
    Alshehri, Samah
    Alhadrami, Hani A.
    Kateb, Faris
    Ashary, Ehab Bahaudien
    Abdel-khalek, S.
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 72 (01): : 1323 - 1338
  • [48] A secure image steganography based on LSB technique and 2D chaotic maps
    Khalil, Noura
    Sarhan, Amany
    Alshewimy, Mahmoud A. M.
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2024, 119
  • [49] Implementation of Colour Image Steganography using LSB and Edge Detection Technique: A LabVIEW Approach
    Dande, Shruti C.
    Agrawal, Sushma S.
    Hirekhan, Sunil R.
    [J]. 2016 INTERNATIONAL CONFERENCE ON COMMUNICATION AND SIGNAL PROCESSING (ICCSP), VOL. 1, 2016, : 1466 - 1470
  • [50] A Review on "A Novel Technique for Image Steganography Based on Block-DCT and Huffman Encoding"
    Das, Rig
    Tuithung, Themrichon
    [J]. INTERNATIONAL CONFERENCE ON GRAPHIC AND IMAGE PROCESSING (ICGIP 2012), 2013, 8768