Steganography based information security with high embedding capacity

被引:0
|
作者
Sirisha, B. Lakshmi [1 ]
Kumar, S. Srinivas [1 ]
Mohan, B. Chandra [2 ]
机构
[1] Jawaharlal Nehru Technol Univ, Dept ECE, Kakinada, Andhra Prades, India
[2] Bapatla Engn Coll, Dept ECE, Bapatla, Andhra Prades, India
关键词
Image hiding; Image steganography; Image quality metrics; Information Security; Secret image sharing; Cramer's rule; SECRET; AUTHENTICATION; IMAGES;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A novel high embedding capacity for spatial domain image steganography is proposed in this paper. In this method, two secret images are embedded into a cover image of same size with good quality. A ( t, n) threshold secret sharing scheme is one popular method of implementing steganography. In this method, the secret image is distributed among n participants. Any t ( or more) out of n authorized participants can recover the secret image and less than t participants cannot recover the secret image. The proposed method also satisfies the reversibility property of steganography to reconstruct secret and cover images without any loss of information. Various image quality metrics are used to assess the quality of the stego images. The proposed scheme is efficient in terms of embedding capacity and is computationally faster compared to the existing methods.
引用
收藏
页码:17 / 21
页数:5
相关论文
共 50 条
  • [1] Enhancement of Embedding Capacity and Security in Reversible Steganography
    Krishna, M. Murali
    Roberts, Nirmal
    PROCEEDINGS OF THE 2016 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2016, : 803 - 807
  • [2] Secure steganography based on embedding capacity
    Hedieh Sajedi
    Mansour Jamzad
    International Journal of Information Security, 2009, 8 : 433 - 445
  • [3] Secure steganography based on embedding capacity
    Sajedi, Hedieh
    Jamzad, Mansour
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2009, 8 (06) : 433 - 445
  • [4] A high embedding capacity approach to adaptive steganography
    Arjun, N. Santosh
    Negi, Atul
    2006 1ST INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION MANAGEMENT, 2006, : 525 - +
  • [5] Steganography based information security
    Ratan, R
    Madhavan, CEV
    IETE TECHNICAL REVIEW, 2002, 19 (04): : 213 - 219
  • [6] A PVD based high capacity steganography algorithm with embedding in non-sequential position
    Nabanita Mukherjee (Ganguly)
    Goutam Paul
    Sanjoy Kumar Saha
    Debanjan Burman
    Multimedia Tools and Applications, 2020, 79 : 13449 - 13479
  • [7] A PVD based high capacity steganography algorithm with embedding in non-sequential position
    Mukherjee, Nabanita
    Paul, Goutam
    Saha, Sanjoy Kumar
    Burman, Debanjan
    MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (19-20) : 13449 - 13479
  • [8] A genetic algorithm based image steganography scheme with high embedding capacity and low distortion
    Yadav, Gyan Singh
    IMAGING SCIENCE JOURNAL, 2021, 69 (1-4): : 143 - 152
  • [9] Text Steganography with High Embedding Capacity Using Arabic Calligraphy
    Hamzah, Ali A.
    Bayomi, Hanaa
    EMERGING TRENDS IN INTELLIGENT COMPUTING AND INFORMATICS: DATA SCIENCE, INTELLIGENT INFORMATION SYSTEMS AND SMART COMPUTING, 2020, 1073 : 127 - 138
  • [10] OPTP: A new steganography scheme with high capacity and security
    Massoud Hadian Dehkordi
    Samaneh Mashhadi
    Seyed Taghi Farahi
    Mohammad Hossein Noorallahzadeh
    Shahed Vahedi
    Ahmad Gholami
    Reza Alimoradi
    Multimedia Tools and Applications, 2024, 83 : 17579 - 17599