Cover selection technique for secure transform domain image steganography

被引:0
|
作者
Mansi S. Subhedar
机构
[1] Pillai HOC College of Engineering and Technology,Department of E & TC Engineering
关键词
Image steganography; Cover selection; Statistical texture analysis; Double density dual tree wavelet transform; LU decomposition; Steganalysis;
D O I
10.1007/s42044-020-00077-9
中图分类号
学科分类号
摘要
In image steganography, an appropriate cover selection offers the least detectable stego image thereby assuring the security of covert communication. In this paper, a new framework is proposed for the optimal choice of cover from the image database based on statistical texture analysis. Texture analysis using a gray level co-occurrence matrix (GLCM) and run-length matrix (RLM) helps to identify the heterogeneity of images. Textural features were extracted and a non-linear support vector machine was employed to classify a suitable cover from image database. This can further be used as a host image to carry the secret message for the image steganography scheme. To justify the validity of the proposed cover selection technique, image steganography algorithm based on double density dual tree DWT (DDDTDWT) and LU decomposition is also proposed in this work. Performance measures like imperceptibility, robustness, and steganalyser’s inability to detect the stego image were employed to check validity of the proposed schemes. Better imperceptibility, strong robustness to stego attacks, and poor detection accuracy by steganalyser confirms the efficacy of proposed cover selection and transform domain image steganography techniques.
引用
收藏
页码:241 / 252
页数:11
相关论文
共 50 条
  • [1] Curvelet transform and cover selection for secure steganography
    Mansi S. Subhedar
    Vijay H. Mankar
    [J]. Multimedia Tools and Applications, 2018, 77 : 8115 - 8138
  • [2] Curvelet transform and cover selection for secure steganography
    Subhedar, Mansi S.
    Mankar, Vijay H.
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (07) : 8115 - 8138
  • [3] Using contourlet transform and cover selection for secure steganography
    Sajedi, Hedieh
    Jamzad, Mansour
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2010, 9 (05) : 337 - 352
  • [4] Using contourlet transform and cover selection for secure steganography
    Hedieh Sajedi
    Mansour Jamzad
    [J]. International Journal of Information Security, 2010, 9 : 337 - 352
  • [5] Secure Cover Selection for Steganography
    Wang, Zichi
    Zhang, Xinpeng
    [J]. IEEE ACCESS, 2019, 7 : 57857 - 57867
  • [6] Secure Cover Selection Steganography
    Sajedi, Hedieh
    Jamzad, Mansour
    [J]. ADVANCES IN INFORMATION SECURITY AND ASSURANCE, 2009, 5576 : 317 - 326
  • [7] A Secure Image Steganography Technique Using Integer Wavelet Transform
    Hemalatha, S.
    Renuka, A.
    Acharya, U. Dinesh
    Kamath, Priya R.
    [J]. PROCEEDINGS OF THE 2012 WORLD CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGIES, 2012, : 755 - 758
  • [8] Cover Selection for More Secure Steganography
    Esfahani, Reza
    Norozi, Zynolabedin
    Jandaghi, Gholamreza
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2018, 12 (01): : 21 - 36
  • [9] Performance Evaluation of Image Steganography based on Cover Selection and Contourlet Transform
    Subhedar, Mansi S.
    Mankar, Vijay H.
    [J]. 2013 INTERNATIONAL CONFERENCE ON CLOUD & UBIQUITOUS COMPUTING & EMERGING TECHNOLOGIES (CUBE 2013), 2013, : 172 - +
  • [10] Cover Image Selection Technique for Secured LSB-based Image Steganography
    Molato, Mark Rennel D.
    Gerardo, Bobby D.
    [J]. 2018 INTERNATIONAL CONFERENCE ON ALGORITHMS, COMPUTING AND ARTIFICIAL INTELLIGENCE (ACAI 2018), 2018,