Eight neighbour bits swap encryption-based image steganography using arithmetic progression technique

被引:0
|
作者
Mukherjee S. [1 ]
Sanyal G. [1 ]
机构
[1] Department of Computer Science and Engineering, National Institute of Technology Durgapur, Durgapur
来源
Mukherjee, Srilekha (srilekha.mukherjee3@gmail.com) | 1600年 / Inderscience Publishers, 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland卷 / 12期
关键词
Arithmetic progression technique; Cross correlation coefficient; Eight neighbour bits swap encryption; Peak signal to noise ratio; Psnr; Steganography;
D O I
10.1504/IJICS.2020.105188
中图分类号
学科分类号
摘要
This paper presents a steganographic approach of concealing the secret data so as to facilitate secure communication. Eight neighbour bits swap (ENBS) encryption has been used on the chosen cover image in the first stage. This results in the scrambling of the data bits, thereby disrupting the normal pixel orientation. Finally data bits from the secret image are embedded within the scrambled cover using the technique of arithmetic progression. Lastly inverse eight neighbour bits swap (ENBS) transformation is applied on the above generated image. This results in a descrambling operation, i.e., reverting back the normal orientation. Henceforth the stego is generated. Several quantitative and qualitative benchmarks analysis pertaining to this approach is made. All the results show that the imperceptibility is well maintained. Also the payload is high with negligible distortion produced in the image. © 2020 Inderscience Enterprises Ltd.
引用
收藏
页码:130 / 146
页数:16
相关论文
共 25 条
  • [21] A robust image steganography based on a novel technique by using improved DNA and modified chaotic approach
    Omar Younis Abdulhammed
    The Journal of Supercomputing, 2024, 80 : 226 - 248
  • [22] Optimal location using genetic algorithms for chaotic image steganography technique based on discrete framelet transform
    Darani, A. Yousefian
    Yengejeh, Y. Khedmati
    Navarro, G.
    Pakmanesh, H.
    Sharafi, J.
    DIGITAL SIGNAL PROCESSING, 2024, 144
  • [23] Encryption Based DWT-SVD Medical Image Watermarking Technique Using Hamming Code
    Thakur, S.
    Singh, A. K.
    Ghrera, S. P.
    PROCEEDINGS OF ICETIT 2019: EMERGING TRENDS IN INFORMATION TECHNOLOGY, 2020, 605 : 1091 - 1099
  • [24] An Efficient Image Encryption Technique Based on Optimized Key Generation in ECC Using Genetic Algorithm
    Shankar, K.
    Eswaran, P.
    ARTIFICIAL INTELLIGENCE AND EVOLUTIONARY COMPUTATIONS IN ENGINEERING SYSTEMS, ICAIECES 2015, 2016, 394 : 705 - 714
  • [25] A New Dual Image Based Reversible Data Hiding Method Using Most Significant Bits and Center Shifting Technique
    Solak, Serdar
    Tezcan, Gokhan
    APPLIED SCIENCES-BASEL, 2022, 12 (21):