Data Hiding and Integrity Verification based on Quotient Value Differencing and Merkle Tree

被引:11
作者
Khadse, Dipak Bhayyaji [1 ]
Swain, Gandharba [1 ]
机构
[1] Koneru Lakshmaiah Educ Fdn, Dept Comp Sci & Engn, Guntur 522302, Andhra Pradesh, India
关键词
Steganography; Data hiding; QVD; Tamper detection; Merkle tree; STEGANOGRAPHIC METHOD; IMAGE STEGANOGRAPHY; MODIFICATION DIRECTIONS; LSB; PVD; SUBSTITUTION; HISTOGRAM;
D O I
10.1007/s13369-022-06961-9
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
The three important quality aspects of image steganography mechanisms are hiding capacity (HC), peak signal-to-noise ratio (PSNR), and attack resistance. While the stego-image (SI) is on transit from sender to receiver, the camouflaged data may be altered due to several reasons. No existing steganography technique focuses on evaluating the integrity of extracted data at the receiver. Therefore, there is a need to develop techniques to check the integrity of the extracted bits from the SI at the receiver. This article offers a steganography technique with integrity check at the receiver. The image is sliced into various non-overlapping blocks of size 3 x 3. The secret information is camouflaged using bit replacement and differencing mechanisms in 7 MSBs of the 9 pixels. After bits are camouflaged in these 7 MSBs of all the pixels, the verification bits are generated using Merkle tree concept. The root of the tree holds the verification bits and these are camouflaged in the LSBs of various pixels in the block. The experimental outcomes report that without compromising the HC and PSNR values, the extracted data at the receiver could be verified successfully.
引用
收藏
页码:1793 / 1805
页数:13
相关论文
共 35 条
[1]   A New Steganographic Algorithm Based on Multi Directional PVD and Modified LSB [J].
Darabkh, Khalid A. ;
Al-Dhamari, Ahlam K. ;
Jafar, Iyad F. .
INFORMATION TECHNOLOGY AND CONTROL, 2017, 46 (01) :16-36
[2]   Secure Medical Data Transmission Model for IoT-Based Healthcare Systems [J].
Elhoseny, Mohamed ;
Ramirez-Gonzalez, Gustavo ;
Abu-Elnasr, Osama M. ;
Shawkat, Shihab A. ;
Arunkumar, N. ;
Farouk, Ahmed .
IEEE ACCESS, 2018, 6 :20596-20608
[3]   Detecting LSB steganography in color and gray-scale images [J].
Fridrich, J. ;
Goljan, M. ;
Du, R. .
IEEE Multimedia, 2001, 8 (04) :22-28
[4]   A PVD based high capacity steganography algorithm with embedding in non-sequential position [J].
Mukherjee, Nabanita ;
Paul, Goutam ;
Saha, Sanjoy Kumar ;
Burman, Debanjan .
MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (19-20) :13449-13479
[5]   An Adaptive Image Steganography Method Based on Histogram of Oriented Gradient and PVD-LSB Techniques [J].
Hameed, Mohamed Abdel ;
Hassaballah, M. ;
Aly, Saleh ;
Awad, Ali Ismail .
IEEE ACCESS, 2019, 7 :185189-185204
[6]   Data hiding scheme improving embedding capacity using mixed PVD and LSB on bit plane [J].
Jung, Ki-Hyun .
JOURNAL OF REAL-TIME IMAGE PROCESSING, 2018, 14 (01) :127-136
[7]   New adaptive steganographic method using least-significant-bit substitution and pixel-value differencing [J].
Khodaei, M. ;
Faez, K. .
IET IMAGE PROCESSING, 2012, 6 (06) :677-686
[8]   Dual watermarking: An approach for securing digital documents [J].
Kumar, Chandan ;
Singh, Amit Kumar ;
Kumar, Pardeep .
MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (11-12) :7339-7354
[9]   Enhanced AMBTC based data hiding method using hamming distance and pixel value differencing [J].
Kumar, Rajeev ;
Kim, Dae-Soo ;
Jung, Ki-Hyun .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 47 :94-103
[10]   High-payload image hiding with quality recovery using tri-way pixel-value differencing [J].
Lee, Yen-Po ;
Lee, Jen-Chun ;
Chen, Wei-Kuei ;
Chang, Ko-Chin ;
Su, Ing-Jiunn ;
Chang, Chien-Ping .
INFORMATION SCIENCES, 2012, 191 :214-225