Authentication of Encrypted Secret Information in Image Steganography

被引:0
|
作者
Kalaivani, B. [1 ]
Padmaa, M. [2 ]
机构
[1] Saranathan Coll Engn, ME Commun Syst, Panjappur 620012, Thiruchirappall, India
[2] Saranathan Coll Engn, Dept ECE, Panjappur 620012, Thiruchirappall, India
关键词
Steganography; Discrete Wavelet Transform; Veracity Verification code; Steganalysis;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Steganography is the art of hiding the existence of data in another transmission medium to achieve secret communication. Steganalysis is the method of discovering the secret message. These two areas are very useful in secret communication. In this paper the proposed scheme is an image steganography that can verify the integrity of the secret information which is transmitted to the receiver. Integrity is the method to verify whether the information is altered by the attacker. The process embeds the encrypted secret message into the cover image with the veracity verification code. To verify the integrity the veracity verification code is used. Two special AC coefficients are used to create the veracity verification code. The Bit Error rate (BER) and the Peak Signal to Noise Ratio (PSNR) calculation are performed.
引用
收藏
页数:5
相关论文
共 50 条
  • [31] Hiding Encrypted Multiple Secret Images in a Cover Image
    Guttikonda, Prashanti
    Cherukuri, Hemanthi
    Mundukur, Nirupama Bhat
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND DATA ENGINEERING, 2018, 9 : 95 - 104
  • [32] Reversible secret image sharing with steganography and dynamic embedding
    Hu, Wei-Tong
    Li, Ming-Chu
    Guo, Cheng
    Ren, Yi-Zhi
    SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (11) : 1267 - 1276
  • [33] Secret image sharing based on cellular automata and steganography
    Eslami, Z.
    Razzaghi, S. H.
    Ahmadabadi, J. Zarepour
    PATTERN RECOGNITION, 2010, 43 (01) : 397 - 404
  • [34] Image Steganography to Hide Unlimited Secret Text Size
    Almazaydeh, Wa'el Ibrahim A.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2022, 22 (04): : 73 - 82
  • [35] Secret-to-Image Reversible Transformation for Generative Steganography
    Zhou, Zhili
    Su, Yuecheng
    Li, Jin
    Yu, Keping
    Wu, Q. M. Jonathan
    Fu, Zhangjie
    Shi, Yunqing
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (05) : 4118 - 4134
  • [36] A Lossless Secret Image Sharing Scheme Based on Steganography
    Li, Li
    Abd El-Latif, Ahmed A.
    Yan, Xuehu
    Wang, Shen
    Niu, Xiamu
    PROCEEDINGS OF THE 2012 SECOND INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2012), 2012, : 1247 - 1250
  • [37] Guest Editorial Special Issue on Steganography and Image Authentication
    Chin-Chen Chang
    Yung-Chen Chou
    Journal of Electronic Science and Technology, 2013, 11 (01) : 1 - 2
  • [38] Research on reversible image steganography of encrypted image based on image interpolation and difference histogram shift
    Ye, Hanmin
    Su, Keqin
    Cheng, Xiaohui
    Huang, Shiming
    IET IMAGE PROCESSING, 2022, 16 (07) : 1959 - 1972
  • [39] Steganography and authentication in image sharing without parity bits
    Yang, Ching-Nung
    Ouyang, Jin-Fwu
    Harn, Lein
    OPTICS COMMUNICATIONS, 2012, 285 (07) : 1725 - 1735
  • [40] Image steganography using exploiting modification direction for compressed encrypted data
    Younus, Zeyad Safaa
    Hussain, Mohammed Khaire
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (06) : 2951 - 2963