Camouflaging in Digital Image for Secure Communication

被引:1
|
作者
Jindal B. [1 ]
Singh A.P. [2 ]
机构
[1] Yadavindra College of Engineering, Punjabi University, Guru Kashi Campus, Talwandi Sabo District, Bathinda, Punjab
[2] Sant Longowal Institute of Engineering and Technology (Deemed-to-be-University), Longowal, Sangrur
关键词
Least significant bit; Matrix; Moderate-bit; Parity; Security; Steganography;
D O I
10.1007/s40031-013-0050-3
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The present paper reports on a new type of camouflaging in digital image for hiding crypto-data using moderate bit alteration in the pixel. In the proposed method, cryptography is combined with steganography to provide a two layer security to the hidden data. The novelty of the algorithm proposed in the present work lies in the fact that the information about hidden bit is reflected by parity condition in one part of the image pixel. The remaining part of the image pixel is used to perform local pixel adjustment to improve the visual perception of the cover image. In order to examine the effectiveness of the proposed method, image quality measuring parameters are computed. In addition to this, security analysis is also carried by comparing the histograms of cover and stego images. This scheme provides a higher security as well as robustness to intentional as well as unintentional attacks. © 2013, The Institution of Engineers (India).
引用
收藏
页码:85 / 92
页数:7
相关论文
共 50 条
  • [1] High Secure Digital Image Steganography for Secrete Communication
    Shalini, Keral, V
    Abirami, T.
    2017 THIRD INTERNATIONAL CONFERENCE ON SCIENCE TECHNOLOGY ENGINEERING & MANAGEMENT (ICONSTEM), 2017, : 920 - 922
  • [2] Is the Secure IC Camouflaging Really Secure?
    Wang, Xueyan
    Zhou, Qiang
    Cai, Yici
    Qu, Gang
    2016 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2016, : 1710 - 1713
  • [3] Secure Communication Using Digital Watermarking with Encrypted Text Hidden in an Image
    Sundari, M.
    Revathi, P. B.
    Sumesh, S.
    SECURITY IN COMPUTING AND COMMUNICATIONS (SSCC 2015), 2015, 536 : 247 - 255
  • [4] Synchronization of spatiotemporal chaotic systems and application to secure communication of digital image
    王兴元
    张娜
    任小丽
    张永雷
    Chinese Physics B, 2011, (02) : 129 - 136
  • [5] Synchronization of spatiotemporal chaotic systems and application to secure communication of digital image
    Wang Xing-Yuan
    Zhang Na
    Ren Xiao-Li
    Zhang Yong-Lei
    CHINESE PHYSICS B, 2011, 20 (02)
  • [6] A digital secure image communication scheme based on the chaotic Chebyshev map
    Liao, XF
    Li, XM
    Pen, J
    Chen, GR
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2004, 17 (05) : 437 - 445
  • [7] Digital image secure communication using Chebyshev map chaotic sequences
    Peng, J
    Liao, XF
    Wu, ZF
    2002 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS AND WEST SINO EXPOSITION PROCEEDINGS, VOLS 1-4, 2002, : 492 - 496
  • [8] DIGITAL SIGNATURES FOR SECURE COMMUNICATION.
    Upganlawar, Saket
    Sooryavanshi, Praduman
    Bhosle, Anand
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTELLIGENT SUSTAINABLE SYSTEMS (ICISS 2017), 2017, : 820 - 823
  • [9] Novel Algorithms for Secure Medical Image Communication Using Digital Signature with Various Attacks
    Umamageswari, A.
    Suresh, G. R.
    2013 FIFTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (ICOAC), 2013, : 152 - 157
  • [10] Chaotic Generator in Digital Secure Communication
    Chang, Shu-Ming
    WORLD CONGRESS ON ENGINEERING 2009, VOLS I AND II, 2009, : 1056 - 1060