IJSTR

International Journal of Scientific & Technology Research

Home About Us Scope Editorial Board Blog/Latest News Contact Us
0.2
2019CiteScore
 
10th percentile
Powered by  Scopus
Scopus coverage:
Nov 2018 to May 2020

CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT

IJSTR >> Volume 8 - Issue 10, October 2019 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



Efficient Approach of Image Hiding

[Full Text]

 

AUTHOR(S)

Haval Muhammed Sidiqi, Prof. Dr. Muzhir Shaban Al-Ani

 

KEYWORDS

Chaotic Approach, DWT, Data hiding, Image Steganography, Image processing, Spatial Domain, Security.

 

ABSTRACT

In the End, the thesis was covered an efficient method of construction a secure image hiding approach in digital images. The digital image steganography process has been achieving the improvement of constrained intensity of human visual system (HVS). Image steganography method was utilized image as cover media for hiding secret message. The major principles necessities for a steganography framework are to be untraceable while augmenting the measure of the data is going to embed into spread unique image. The proposed encoding of restricted image based on chaos approach, in which the image was distributed into various sorts then interchange these parts to generate the new form of depiction. The next step was applying discrete wavelet transform, so the facsimile data was prepared to be concealed. The performance measurement has been applied in this approach to find peak signal to noise ratio (PSNR) and mean square error (MSE) between embedded and extracted image. The obtained results indicated that this approach leading to more secure approach comparing to other methods. The archived values of PSNR is in between 38.7447 and 59 depending on the size of the secrete image.

 

REFERENCES

[1] M.B.Ould MEDENI and El Mamoun SOUIDI, (2010) “A Generalization of the PVD Steganographic Method”, International Journal of Computer Science and Information Security, Vol.8.No.8, pp156-159
[2] S.Arivazhagan, W.Sylvia Lilly Jebarani, and S.Bagavath (2011) “Colour Image Steganography Using Median Maintenance”, ICTACT Journal on Image and Video Processing, Vol. 2, Iss:01, pp.246-253.
[3] Sathishkumar GA,Ramachandran S, Bagan KB. (2012) Encrypt Image using random pixel permutation by chaotic mapping. In IEEE symposium on computers & informatics (pp. 247-51).
[4] Hemalatha.S, U.Dinesh Acharya , (2013) “Comparison of Secure and High Capacity Color Image Steganography Techniques in RGB and YCBCR domains”, International Journal of Advanced Information Technology, Vol.3, No.3, pp.1-9.
[5] Praneeta Dehare, Padma Bonde (2014) “Hiding Image in Image by using FMM with LSB Substitution in Image Steganography “, International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 2 Issue: 11,pp 3663 – 3667.
[6] Ahmed Shihab, (2015) “Image Steganography Based on Discrete Wavelet Transform and Enhancing Resilient Backpropogation Neural Network”, master thesis 2015 Department of Computer Science Faculty of Information Technology Middle East University Amman-Jordan.
[7] R. Rejani,D.Murugan and Deepu. (2016) “DIGITAL DATA PROTECTION USING STEGANOGRAPHY “ICTACT JOURNAL ON COMMUNICATION TECHNOLOGY, MARCH 2016, VOLUME: 07, ISSUE: 01 ISSN: 2229-6948(ONLINE) DOI: 10.21917/ijct.2016.0183.
[8] Ashwini W, Archana Patankar (2017) “QR Code Based Image Steganography” International Journal of Advance Research, Ideas and Innovations in Technology. ISSN: 2454-132XImpact factor: 4.295(Volume3, Issue3).
[9] Govind R. Suryawanshi, Suresh N. (2018) “Analysis of Effect of Spatial Domain Steganography Technique on DCT Domain ” international Journal of Applied Engineering Research ISSN 0973-4562 Volume 13, pp. 634-640.
[10] Dr. K.B.Priya Iyer , Manisha R , Subhashree R ,Vedhavalli K “ANALYSIS OF DATA SECURITY IN CLOUD COMPUTING” International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics,2016 IEEE
[11] Wu, Chia-Chun, Shang-Juh Kao, and Min-Shiang Hwang., 2011, "A high quality image sharing with steganography and adaptive authentication scheme", Journal of Systems and Software 84.12, PP. 2196- 2207.
[12] Anjali A. Shejul, Prof. U. L. Kulkarn (2010) “A DWT based Approach for Steganography using Biometric” International Conference On Data Storage and Data Engineering, IEEE,2010, pp. 39-43.
[13] Kumar. A., Sharma. R., 2013, “A Secure Image Steganography Based on RSA Algorithm and HashLSB Technique” International Journal of Advanced Research in Computer Science and Software Engineering,Volume 3, PP. 363-372.
[14] Shaveta Mahajan, Arpinder Singh (2012) “A Review of Methods and Approach for Secure Steganography”, International Journal of Advanced Research Computer Science and Software Engineering, October 2012, vol.2, issue 10, pp. 67-70.
[15] Tomáš Pevný, Jessica Fridrich, And Andrew D. Ker (2012) “From Blind To Quantitative Steganalysis,” IEEE Transactions On Information Forensics And Security, 2012, Vol. 7, No. 2, pp. no 445-454.
[16] Jan Kodovský, Jessica Fridrich (2012) “Ensemble Classifiers For Steganalysis Of Digital Media,” IEEE Transactions On Information Forensics And Security,2012, Vol. 7, No. 2, pp no. 432-444.
[17] Islam. R., Siddiqa. A., Uddin. P., Mandal. A.K and Hossain. D, 2014, “An Efficient Filtering Based Approach Improving LSB Image Steganography using Status Bit along with AES Cryptography” 3rd International Conference On Informatics, Electronics & Vision.
[18] Mohammad T. Sh. (2018) “A New Combined Method with High Security for Digital Images Steganography Based on Imperialist Competitive Algorithm and Symmetric Encryption Algorithm” International Journal of Research in Computer Application and Roborics ISSN 2320-7345
[19] Sajasi S, Eftekhari Moghadam A.M, 2015, "An adaptive image steganographic scheme based on Noise Visibility Function and an optimal chaotic based encryption method", Elsevier, Applied Soft Computing 30, PP. 375–389.
[20] Gaba, J, Kumar M, 2013, "Design and Analysis of Compress-Encrypt-Stego Technique for Steganography", MOOC Innovation and Technology in Education (MITE), IEEE International Conference, PP. 32 – 36.
[21] Hadi Hajilar Lahrod, Ali Rahnemaei, Seyed Hadi Seyed Hatami., 2016, "A New Method for Encrypting Digital Data Using Symmetric Key in Information Exchange Spaces", International Journal of Computer Applications Technology and Research Volume 5– Issue 6, pp. 391 – 394.
[22] Zhi-liang ZHU, Chong WANG, Hua CHAI, Hai YU, “A Chaotic Image Encryption Scheme Based on Magic Cube Transformation”, IEEE Conference Publications, 2011
[23] Shoaib Ansari, Neelesh Gupta, Sudhir Agrawal, “An Image Encryption Approach Using Chaotic Map in Frequency Domain”, International Journal of Emerging Technology and Advanced Engineering-Volume 2, Issue 8, August 2012
[24] Zhenjun Tang, JuanSong, Xianquan Zhang, Ronghai Sun, “Multiple-image encryption with bit-plane decomposition and chaotic maps”, Optics and Lasers in Engineering, Volume 80, May 2016
[25] Benyamin Norouzi, Sattar Mirzakuchaki, “Breaking an Image Encryption Algorithm based on the New Substitution Stage with Chaotic Functions”, Optik - International Journal for Light and Electron Optics 127(14), Volume 127, Issue 14, July 2016
[26] Adrian-Viorel Dianconu, “Circular inter-intra bit-level permutation and chaos-based image encryption”, Information Sciences, Volumes 355–356, Elsevier, August 2016
[27] XiaoweiLi, ChengqingLi, In-KwonLee, “Chaotic image encryption using pseudo-random masks and pixel mapping”, European Association for Signal Processing, Volume 125, Elsevier, August 2016
[28] Wenhao Liu, Kehui Sun, Congxu Zhu, “A fast image encryption algorithm based on chaotic map”, Elsevier, 2016
[29] AkramBelazi, Ahmed A. Abd El-Latif, SafyaBelghith, “A novel image encryption scheme based on substitution-permutation network and chaos”, European Association for Signal Processing, Elsevier, 2016
[30] Khadijeh Mirzaei Talarposhti, Mehrzad Khaki Jamei, “A secure image encryption method based on dynamic harmony search (DHS) combined with chaotic map”, Optics and Lasers in Engineering, Volume 81, Elsevier, 2016