Data Hiding Using Randomization and Multiple Encrypted Secret Images

被引:0
|
作者
Das, Pallavi [1 ]
Kushwaha, Satish Chandra [1 ]
Chakraborty, Madhupama [1 ]
机构
[1] Natl Inst Technol, Agartala 799046, West Tripura, India
来源
2015 INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND SIGNAL PROCESSING (ICCSP) | 2015年
关键词
Digital Image Steganography; Spatial domain; least significant bit (LSB) substitution; Image Quality Parameters;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper proposes a new image steganography method of hiding multiple secret images (2 bit binary image) in a single cover image (24 bit cover image). According to the proposed method, one of the secret images is embedded in a randomized nature in one of the primary color matrix of the color cover image using the least significant bit substitution technique. The other secret images are encrypted using the first secret image. From the stego-image, the first secret image embedded randomly in the cover image is extracted and then this extracted image is used to decode the remaining secret images. The focus is to secure the transmitted information even if the channel is revealed, to recognize the authenticity of the extracted images and increase the hiding capacity in a single 24-bit image maintaining the visual quality of the stego-image. Results reveal that the proposed method has low error, comparatively fast computational speed and satisfactory visual quality of the stego-image.
引用
收藏
页码:298 / 302
页数:5
相关论文
共 50 条
  • [1] Hiding Encrypted Multiple Secret Images in a Cover Image
    Guttikonda, Prashanti
    Cherukuri, Hemanthi
    Mundukur, Nirupama Bhat
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND DATA ENGINEERING, 2018, 9 : 95 - 104
  • [2] Secret Sharing Based Reversible Data Hiding in Encrypted Images With Multiple Data-Hiders
    Chen, Bing
    Lu, Wei
    Huang, Jiwu
    Weng, Jian
    Zhou, Yicong
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (02) : 978 - 991
  • [3] Adopting secret sharing for reversible data hiding in encrypted images
    Wu, Xiaotian
    Weng, Jian
    Yan, WeiQi
    SIGNAL PROCESSING, 2018, 143 : 269 - 281
  • [4] Reversible Data Hiding in Encrypted Images Using Cipher-Feedback Secret Sharing
    Hua, Zhongyun
    Wang, Yanxiang
    Yi, Shuang
    Zhou, Yicong
    Jia, Xiaohua
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2022, 32 (08) : 4968 - 4982
  • [5] Reversible Data Hiding in Encrypted Images With Secret Sharing and Hybrid Coding
    Yu, Chunqiang
    Zhang, Xianquan
    Qin, Chuan
    Tang, Zhenjun
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2023, 33 (11) : 6443 - 6458
  • [6] Reversible Data Hiding in Encrypted Images Based on Polynomial Secret Sharing
    Zhang Minqing
    Wang Zexi
    Ke Yan
    Kong Yongjun
    Di Fuqiang
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2022, 44 (12) : 4337 - 4347
  • [7] Reversible data hiding in encrypted images based on secret sharing and hierarchical embedding
    Ren, Yu
    Qin, Jiaohua
    Xiang, Xuyu
    Tan, Yun
    COMPUTERS & ELECTRICAL ENGINEERING, 2024, 119
  • [8] Matrix-Based Secret Sharing for Reversible Data Hiding in Encrypted Images
    Hua, Zhongyun
    Wang, Yanxiang
    Yi, Shuang
    Zheng, Yifeng
    Liu, Xingyu
    Chen, Yongyong
    Zhang, Xinpeng
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (05) : 3669 - 3686
  • [9] Secure Data Hiding in PDF Files Using an Encrypted Secret Message
    Arshakyan, Anahit
    MEETING SECURITY CHALLENGES THROUGH DATA ANALYTICS AND DECISION SUPPORT, 2016, 47 : 264 - 270
  • [10] Reversible Data Hiding in Encrypted JPEG Images With Polynomial Secret Sharing for IoT Security
    Xu, Shuying
    Horng, Ji-Hwei
    Chang, Ching-Chun
    Chang, Chin-Chen
    IEEE INTERNET OF THINGS JOURNAL, 2025, 12 (01): : 1098 - 1108