High Capacity and Reversible Steganographic Technique with Authentication Capability

被引:0
作者
Ansari, Iffat Rehman [1 ]
Hurrah, Nasir N. [1 ]
Khan, Mohd Ayyub [2 ]
Khan, Ekram [1 ]
机构
[1] AMU, Zakir Husain Coll Engn & Technol, Dept Elect Engn, Aligarh, Uttar Pradesh, India
[2] AMU, Univ Polytech, Elect Engn Sect, Aligarh, Uttar Pradesh, India
来源
COMPUTER VISION AND IMAGE PROCESSING, CVIP 2023, PT III | 2024年 / 2011卷
关键词
Steganography; Fragile Watermark; DCT Coefficients; Embedding Capacity; Image Authentication; FRAGILE WATERMARKING; HIGH PAYLOAD; SCHEME; IMAGES; SECURE; DCT;
D O I
10.1007/978-3-031-58535-7_28
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper proposes a high capacity and reversible DCT-based steganographic technique with authentication capability for 8-bit grayscale general and medical images. The technique obtains 64 DCT coefficients by performing DCT on an (8 x 8) cover image block and only uses selected AC coefficients to hide the secret message. The proposed scheme embeds a fragile watermark using LSB substitution in the selected pixel of the (8 x 8) stego image block to verify the stego image's authenticity. The proposed scheme's performance is evaluated based on payload, imperceptibility, fragility, and image authentication analyses. Simulation results confirm that the steganographic technique is reversible, supports a good payload, and produces high quality watermarked images. The proposed technique outperforms state-of-the-art techniques in embedding capacity while maintaining good image quality. The fragility and authentication analysis confirm that our proposed scheme is fragile in nature and can detect various image processing and geometrical attacks. Our scheme can verify the stego image's authenticity and is also capable of detecting whether the message has been corrupted.
引用
收藏
页码:337 / 349
页数:13
相关论文
共 28 条
[1]  
[Anonymous], 2012, Int. J. Comput. Technol.
[2]   A high payload data hiding scheme based on dual tree complex wavelet transform [J].
Atta, Randa ;
Ghanbari, Mohammad .
OPTIK, 2021, 226
[3]   A high payload steganography mechanism based on wavelet packet transformation and neutrosophic set [J].
Atta, Randa ;
Ghanbari, Mohammad .
JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2018, 53 :42-54
[4]   A secure image watermarking for tamper detection and localization [J].
Bhalerao, Siddharth ;
Ansari, Irshad Ahmad ;
Kumar, Anil .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 12 (01) :1057-1068
[5]  
Biswas Suman, 2023, 2023 7th International Conference on Trends in Electronics and Informatics (ICOEI), P1554, DOI 10.1109/ICOEI56765.2023.10125935
[6]   LSB based non blind predictive edge adaptive image steganography [J].
Chakraborty, Soumendu ;
Jalal, Anand Singh ;
Bhatnagar, Charul .
MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (06) :7973-7987
[7]  
Debnath S., 2022, 2022 2 INT C ART INT, P1, DOI [10.1109/AISP53593.2022.9760680, DOI 10.1109/AISP53593.2022.9760680]
[8]   A comparative analysis of image steganography based on DCT algorithm and steganography tool to hide nuclear reactors confidential information [J].
El Rahman, Sahar A. .
COMPUTERS & ELECTRICAL ENGINEERING, 2018, 70 :380-399
[9]  
El Safy R. O., 2009, 2009 International Conference on Networking and Media Convergence (ICNM'09), P111, DOI 10.1109/ICNM.2009.4907200
[10]   A Robust Image Watermarking Technique With an Optimal DCT-Psychovisual Threshold [J].
Ernawan, Ferda ;
Kabir, Muhammad Nomani .
IEEE ACCESS, 2018, 6 :20464-20480