Eight neighbour bits swap encryption-based image steganography using arithmetic progression technique

被引:0
|
作者
Mukherjee S. [1 ]
Sanyal G. [1 ]
机构
[1] Department of Computer Science and Engineering, National Institute of Technology Durgapur, Durgapur
来源
Mukherjee, Srilekha (srilekha.mukherjee3@gmail.com) | 1600年 / Inderscience Publishers, 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland卷 / 12期
关键词
Arithmetic progression technique; Cross correlation coefficient; Eight neighbour bits swap encryption; Peak signal to noise ratio; Psnr; Steganography;
D O I
10.1504/IJICS.2020.105188
中图分类号
学科分类号
摘要
This paper presents a steganographic approach of concealing the secret data so as to facilitate secure communication. Eight neighbour bits swap (ENBS) encryption has been used on the chosen cover image in the first stage. This results in the scrambling of the data bits, thereby disrupting the normal pixel orientation. Finally data bits from the secret image are embedded within the scrambled cover using the technique of arithmetic progression. Lastly inverse eight neighbour bits swap (ENBS) transformation is applied on the above generated image. This results in a descrambling operation, i.e., reverting back the normal orientation. Henceforth the stego is generated. Several quantitative and qualitative benchmarks analysis pertaining to this approach is made. All the results show that the imperceptibility is well maintained. Also the payload is high with negligible distortion produced in the image. © 2020 Inderscience Enterprises Ltd.
引用
收藏
页码:130 / 146
页数:16
相关论文
共 50 条
  • [31] A Perceptual Encryption-Based Image Communication System for Deep Learning-Based Tuberculosis Diagnosis Using Healthcare Cloud Services
    Ahmad, Ijaz
    Shin, Seokjoo
    ELECTRONICS, 2022, 11 (16)
  • [32] A pixel permutation based image encryption technique using chaotic map
    Anwar, Shamama
    Meghana, Solleti
    MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (19) : 27569 - 27590
  • [33] A pixel permutation based image encryption technique using chaotic map
    Shamama Anwar
    Solleti Meghana
    Multimedia Tools and Applications, 2019, 78 : 27569 - 27590
  • [34] A Novel Image Encryption Technique using Multi-wave based Carrier Image
    Panduranga, H. T.
    Kumar, Naveen S. K.
    INTERNATIONAL CONFERENCE ON MODELLING OPTIMIZATION AND COMPUTING, 2012, 38 : 2998 - 3004
  • [35] LSB Modification based Audio Steganography using Advanced Encryption Standard (AES-256) Technique
    Hashim, Jibran
    Hameed, Arsalan
    Abbas, Muhammad Jamshed
    Awais, Muhammad
    Qazi, Hassaan Aziz
    Abbas, Sohail
    2018 12TH INTERNATIONAL CONFERENCE ON MATHEMATICS, ACTUARIAL SCIENCE, COMPUTER SCIENCE AND STATISTICS (MACS), 2018,
  • [36] LSB Technique-Based Dual-Image Steganography Using COS Function
    Jan, Aiman
    Parah, Shabir A.
    Hussan, Muzamil
    Malik, Bilal A.
    PROCEEDINGS OF EMERGING TRENDS AND TECHNOLOGIES ON INTELLIGENT SYSTEMS (ETTIS 2021), 2022, 1371 : 243 - 249
  • [37] An improved image steganography technique using edge based data hiding in DCT domain
    Ayub, Nadish
    Selwal, Arvind
    JOURNAL OF INTERDISCIPLINARY MATHEMATICS, 2020, 23 (02) : 357 - 366
  • [38] Image Encryption based on watermarking technique in Fourier domain using Pixel scrambling
    Dahiya, Monika
    Sukhija, Sanatan
    Kumar, Deepak
    Singh, Hukum
    2017 FOURTH INTERNATIONAL CONFERENCE ON IMAGE INFORMATION PROCESSING (ICIIP), 2017, : 312 - 316
  • [39] Cryptanalysis of a Pixel Permutation Based Image Encryption Technique Using Chaotic Map
    Mokhnache, Abdelaziz
    Ziet, Lahcene
    TRAITEMENT DU SIGNAL, 2020, 37 (01) : 95 - 100
  • [40] A New Chaotic Image Steganography Technique Based on Huffman Compression of Turkish Texts and Fractal Encryption With Post-Quantum Security
    Kasapbasi, Mustafa Cem
    IEEE ACCESS, 2019, 7 : 148495 - 148510