Eight neighbour bits swap encryption-based image steganography using arithmetic progression technique

被引:0
|
作者
Mukherjee S. [1 ]
Sanyal G. [1 ]
机构
[1] Department of Computer Science and Engineering, National Institute of Technology Durgapur, Durgapur
来源
Mukherjee, Srilekha (srilekha.mukherjee3@gmail.com) | 1600年 / Inderscience Publishers, 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland卷 / 12期
关键词
Arithmetic progression technique; Cross correlation coefficient; Eight neighbour bits swap encryption; Peak signal to noise ratio; Psnr; Steganography;
D O I
10.1504/IJICS.2020.105188
中图分类号
学科分类号
摘要
This paper presents a steganographic approach of concealing the secret data so as to facilitate secure communication. Eight neighbour bits swap (ENBS) encryption has been used on the chosen cover image in the first stage. This results in the scrambling of the data bits, thereby disrupting the normal pixel orientation. Finally data bits from the secret image are embedded within the scrambled cover using the technique of arithmetic progression. Lastly inverse eight neighbour bits swap (ENBS) transformation is applied on the above generated image. This results in a descrambling operation, i.e., reverting back the normal orientation. Henceforth the stego is generated. Several quantitative and qualitative benchmarks analysis pertaining to this approach is made. All the results show that the imperceptibility is well maintained. Also the payload is high with negligible distortion produced in the image. © 2020 Inderscience Enterprises Ltd.
引用
收藏
页码:130 / 146
页数:16
相关论文
共 50 条
  • [21] Digital Image Watermarking using Discrete Wavelet Transform and Arithmetic Progression Technique
    Malonia, Meeta
    Agarwal, Surendra Kumar
    2016 IEEE STUDENTS' CONFERENCE ON ELECTRICAL, ELECTRONICS AND COMPUTER SCIENCE (SCEECS), 2016,
  • [22] An Image Encryption Technique Using Scan Based Approach and Image as Key
    Somaraj, Shrija
    AliHussain, Mohammad
    PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND INFORMATICS, ICCII 2016, 2017, 507 : 645 - 653
  • [23] Secured Image Transmission Through Region-Based Steganography Using Chaotic Encryption
    Dash, Shreela
    Das, M. N.
    Das, Mamatarani
    COMPUTATIONAL INTELLIGENCE IN DATA MINING, 2019, 711 : 535 - 544
  • [24] DWT-SVD Based Image Steganography Using Threshold Value Encryption Method
    Khandelwal, Jyoti
    Sharma, Vijay Kumar
    Singh, Dilbag
    Zaguia, Atef
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 72 (02): : 3299 - 3312
  • [25] Image Steganography Using Fractal Cover and Combined Chaos-DNA Based Encryption
    Durafe A.
    Patidar V.
    Annals of Data Science, 2024, 11 (03) : 855 - 885
  • [26] A Steganography-Based Optical Image Encryption System Using RGB Channel Integration
    Cheng-Hung Chuang
    Journal of Electronic Science and Technology, 2013, 11 (01) : 3 - 8
  • [27] Steganography Based Secret Image Sharing Using Block Division Technique
    Tulasidasu, M.
    Sirisha, B. Lakshmi
    Reddy, K. Rasool
    2015 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS (CICN), 2015, : 1173 - 1176
  • [28] Chaotic map based random image steganography using LSB technique
    Rajendran S.
    Doraipandian M.
    International Journal of Network Security, 2017, 19 (04) : 593 - 598
  • [29] An Improved Image Steganography Technique based on MSB using Bit Differencing
    Ul Islam, Ammad
    Khalid, Faiza
    Shah, Mohsin
    Khan, Zakir
    Mahmood, Toqeer
    Khan, Adnan
    Ali, Usman
    Naeem, Muhammad
    2016 SIXTH INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING TECHNOLOGY (INTECH), 2016, : 265 - 269
  • [30] A selective image encryption algorithm based on a chaotic model using modular sine arithmetic
    Wang, Xingyuan
    Guan, Nana
    Liu, Pengbo
    OPTIK, 2022, 258