A Novel Steganographic Approach for Secured Communication via Boustrophedon Transformation to Develop IoT-based Smart City

被引:0
作者
Mandal, Jyotsna Kumar [1 ]
Dey, Srishti [1 ]
Kumar, Ajay [2 ]
机构
[1] Univ Kalyani, Dept Comp Sci & Engn, Kalyani 741235, India
[2] Broadband & Access Technol Adv Reg Telecom Trainin, Jharkhand Telecom Circle, Ranchi 834009, India
关键词
Boustrophedon transform; Entringer numbers; IF; inverse Boustrophedon transform; IoT; MSE; Payload; PSNR; Smart city; DOMAIN STEGANOGRAPHY;
D O I
10.1080/03772063.2022.2146005
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Steganography is a vast arena to provide security in digital media at the time of network-level transmission. This research is based on a pioneer steganographic approach introducing Image Authentication using Boustrophedon Transformation (IABT) to ensure secured communication. The research experiment is performed using ten benchmark images of 512 x 512 dimensions and the performance result of each of the images has been analyzed thoroughly. In order to implement this transformation technique to the cover images, each of the cover media is decomposed into 1 x 3 blocks. These decomposed spatial components are transformed into frequency components by implementing the Boustrophedon transformation. Confidential data in a bit stream format is embedded into each of the transformed coefficients. Furthermore, the Inverse Boustrophedon transformation is used for converting the transformed embedded coefficients back to the pixel components. This process is kept on repeating until the entire bit stream of the hidden information is inserted into the carrier media to produce a steganography image. Moreover, the performance factor of the proposed method is examined in terms of PSNR, MSE, IF, and Payload, which shows overall better performances of the IABT.
引用
收藏
页码:5764 / 5772
页数:9
相关论文
共 19 条
[1]   A novel image steganography technique based on quantum substitution boxes [J].
Abd EL-Latif, Ahmed A. ;
Abd-El-Atty, Bassem ;
Venegas-Andraca, Salvador E. .
OPTICS AND LASER TECHNOLOGY, 2019, 116 :92-102
[2]  
[Anonymous], HELP VISION REF PSNR
[3]  
[Anonymous], MATLAB Answers
[4]   An efficient steganographic approach for protecting communication in the Internet of Things (IoT) critical infrastructures [J].
Bairagi, Anupam Kumar ;
Khondoker, Rahamatullah ;
Islam, Rafiqul .
INFORMATION SECURITY JOURNAL, 2016, 25 (4-6) :197-212
[5]   Image Steganography Based on Complemented Message and Inverted bit LSB Substitution [J].
Bhardwaj, Rupali ;
Sharma, Vaishali .
PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING AND COMMUNICATIONS, 2016, 93 :832-838
[6]  
Bhattacharyya D, 2011, COMM COM INF SC, V151, P315
[7]   Frequency Domain Steganography with Reversible Texture Combination [J].
Bikku, Thulasi ;
Paturi, Radhika .
TRAITEMENT DU SIGNAL, 2019, 36 (01) :109-117
[8]   A comparative analysis of image steganography based on DCT algorithm and steganography tool to hide nuclear reactors confidential information [J].
El Rahman, Sahar A. .
COMPUTERS & ELECTRICAL ENGINEERING, 2018, 70 :380-399
[9]  
Ghosal S., 2014, ADV MODELL ANAL B, V57, P68
[10]   ECG steganography using curvelet transform [J].
Jero, S. Edward ;
Ramu, Palaniappan ;
Ramakrishnan, S. .
BIOMEDICAL SIGNAL PROCESSING AND CONTROL, 2015, 22 :161-169