Randomly Hiding Secret Data using Dynamic Programming for Image Steganography

被引:0
|
作者
Khandelwal, Pulkit [1 ]
Bisht, Neha [1 ]
Thanikaiselvan, V [1 ]
机构
[1] VIT Univ, Sch Elect Engn, Vellore 632014, Tamil Nadu, India
关键词
data hiding; steganography; random traversing; dynamic programming; PSNR;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Data hiding in multimedia systems is a ubiquitous practice encouraging secret communication of highly confidential information among different parties. To accomplish such a task, a steganographic system is to be realized. Adding to the plethora of algorithms designed to hide secret data in images, a new data hiding scheme based on Energy and Cost of the Image has been proposed. Energy of an image describes the relationship between adjacent pixels which is based on its potential. Offshoots of Dynamic Programming are used to estimate the cost of the image and further random traversal is employed to select the pixels in which data is to be embedded. The information in the form of bits is embedded in each of the selected pixel in a predefined manner. The mean square error and peak signal to noise ratio has also been calculated along with structural similarity index to assess the quality of the cover and the obtained stego image. The final results show a remarkable improvement over some of the existing methods in terms of payload capacity, robustness, fidelity and the metrics calculated. With minimum computational time a robust steganography scheme is achieved.
引用
收藏
页码:777 / 783
页数:7
相关论文
共 50 条
  • [21] Secure Image Steganography Approach for Hiding Compressed Data
    Abdul-Zaher, Khadija M.
    Sewesy, Adel Abo El-Magd
    Mohamed, Marghany Hassan
    SOFT COMPUTING FOR SECURITY APPLICATIONS, ICSCS 2022, 2023, 1428 : 575 - 595
  • [22] Reversible secret image sharing with steganography and dynamic embedding
    Hu, Wei-Tong
    Li, Ming-Chu
    Guo, Cheng
    Ren, Yi-Zhi
    SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (11) : 1267 - 1276
  • [23] Improved BEMD data hiding Scheme Data hiding Binary Exploitation Modification Direction Scheme Using Image Steganography
    Agarwal, Shuchi
    Bisht, Jaipal Singh
    2017 INTERNATIONAL CONFERENCE ON RECENT INNOVATIONS IN SIGNAL PROCESSING AND EMBEDDED SYSTEMS (RISE), 2017, : 206 - 211
  • [24] Content dependent secret hiding in visual steganography
    Ogiela, Marek R.
    Ogiela, Lidia
    OPTICS AND PHOTONICS FOR INFORMATION PROCESSING XVI, 2022, 12225
  • [25] Secret Data Transmission using Vital Image Steganography over Transposition Cipher
    Jain, Mamta
    Lenka, Saroj Kumar
    2015 International Conference on Green Computing and Internet of Things (ICGCIoT), 2015, : 1026 - 1029
  • [26] Vibrant color image steganography using channel differences and secret data distribution
    Parvez, Mohammad Tanvir
    Gutub, Adnan Abdul-Aziz
    KUWAIT JOURNAL OF SCIENCE & ENGINEERING, 2011, 38 (1B): : 127 - 142
  • [27] Analysis of Data Hiding with Multi-bit Image Steganography
    Qu, Junfeng
    Song, Yinglei
    Wei, Yong
    Song, Jia
    2018 8TH INTERNATIONAL CONFERENCE ON ELECTRONICS INFORMATION AND EMERGENCY COMMUNICATION (ICEIEC), 2018, : 59 - 62
  • [28] An improved image steganography technique using edge based data hiding in DCT domain
    Ayub, Nadish
    Selwal, Arvind
    JOURNAL OF INTERDISCIPLINARY MATHEMATICS, 2020, 23 (02) : 357 - 366
  • [29] Hiding shares by multimedia image steganography for optimized counting-based secret sharing
    Gutub, Adnan
    Al-Ghamdi, Maimoona
    MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (11-12) : 7951 - 7985
  • [30] Digital 3D Barcode Image as a Container for Data Hiding Using Steganography
    Rani, Rama
    Deep, Gaurav
    PROCEEDINGS OF 4TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, COMPUTING AND CONTROL (ISPCC 2K17), 2017, : 325 - 330