OPTP: A new steganography scheme with high capacity and security

被引:0
|
作者
Massoud Hadian Dehkordi
Samaneh Mashhadi
Seyed Taghi Farahi
Mohammad Hossein Noorallahzadeh
Shahed Vahedi
Ahmad Gholami
Reza Alimoradi
机构
[1] Cryptography and Data Security Laboratory,
[2] School of Mathematics,undefined
[3] Iran University of Science and Technology,undefined
[4] Qom University,undefined
来源
Multimedia Tools and Applications | 2024年 / 83卷
关键词
Steganography; Security; Lossy compression; High capacity;
D O I
暂无
中图分类号
学科分类号
摘要
Steganography is the art of hiding secret information (text, audio, video, image or file) in a cover medium. Our goal in this paper is to propose a new image steganography scheme that simultaneously increases capacity and security. Increasing these two characteristics at the same time while maintaining the quality of the extracted secret image is a big challenge for scheme designers, and requires a trade-off. In the present paper, a new steganography scheme called OPTP is introduced in the spatial domain, where for the first time, One secret Picture is sent using only Two cover Pictures; therefore the name OPTP. In this method, two stego images are generated for each secret image using a simple equation, which brings higher capacity, security and quality compared to other existing schemes. To increase the capacity, we introduced a new lossy compression algorithm that performs better compared to conventional compression methods. Regarding the security, we used a key without initial handshake, and bloom filter is employed for the verification. We will compare features and results of the proposed scheme with some existing and recent schemes in the literature.
引用
收藏
页码:17579 / 17599
页数:20
相关论文
共 50 条
  • [31] A Reversible Data Hiding Scheme with High Security and Improved Embedding Capacity
    Yadav, Gyan Singh
    Ojha, Aparajita
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 1555 - 1559
  • [32] A New Hybrid Security Allocation Steganography Algorithm
    Tayel, Mazhar B.
    Hafez, Alaa El-Din Sayed
    Zied, Hamed Shawky
    2013 8TH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS (ICCES), 2013, : 217 - 220
  • [33] A New Approach for Data Security in Cryptography and Steganography
    Guttikonda, Prashanti
    Kaviti, Sandhya Rani
    Popuri, Ashok Kumar
    COMPUTER COMMUNICATION, NETWORKING AND INTERNET SECURITY, 2017, 5 : 35 - 44
  • [34] New Steganography Scheme Using Graphs Product
    Douiri, Sidi Mohamed
    Medeni, M. B. Ould
    Elbernoussi, Souad
    2014 INTERNATIONAL CONFERENCE ON INTERACTIVE COLLABORATIVE LEARNING (ICL), 2014, : 525 - 528
  • [35] New JPEG Steganographic Scheme with High Security Performance
    Huang, Fangjun
    Shi, Yun Qing
    Huang, Jiwu
    DIGITAL WATERMARKING, 2011, 6526 : 189 - +
  • [36] High Capacity Image Steganography System based on Multi-layer Security and LSB Exchanging Method
    Hameed R.S.
    Mokri S.S.
    Taha M.S.
    Taher M.M.
    International Journal of Advanced Computer Science and Applications, 2022, 13 (08) : 108 - 115
  • [37] A high embedding capacity approach to adaptive steganography
    Arjun, N. Santosh
    Negi, Atul
    2006 1ST INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION MANAGEMENT, 2006, : 525 - +
  • [38] A High-Capacity and High-Security Image Steganography Network Based on Chaotic Mapping and Generative Adversarial Networks
    Huo, Lin
    Chen, Ruipei
    Wei, Jie
    Huang, Lang
    APPLIED SCIENCES-BASEL, 2024, 14 (03):
  • [39] High Capacity Image Steganography in Wavelet Domain
    Sarreshtedari, Saeed
    Ghaemmaghami, Shahrokh
    2010 7TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE-CCNC 2010, 2010, : 267 - 271
  • [40] Capacity analysis of steganography based on the digital images under the constraints of security
    Jiang, Cuiling
    Lin, Jiajun
    Pang, Yilin
    2008 INTERNATIONAL CONFERENCE ON AUDIO, LANGUAGE AND IMAGE PROCESSING, VOLS 1 AND 2, PROCEEDINGS, 2008, : 909 - 912