Data Hiding Using Randomization and Multiple Encrypted Secret Images

被引:0
|
作者
Das, Pallavi [1 ]
Kushwaha, Satish Chandra [1 ]
Chakraborty, Madhupama [1 ]
机构
[1] Natl Inst Technol, Agartala 799046, West Tripura, India
来源
2015 INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND SIGNAL PROCESSING (ICCSP) | 2015年
关键词
Digital Image Steganography; Spatial domain; least significant bit (LSB) substitution; Image Quality Parameters;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper proposes a new image steganography method of hiding multiple secret images (2 bit binary image) in a single cover image (24 bit cover image). According to the proposed method, one of the secret images is embedded in a randomized nature in one of the primary color matrix of the color cover image using the least significant bit substitution technique. The other secret images are encrypted using the first secret image. From the stego-image, the first secret image embedded randomly in the cover image is extracted and then this extracted image is used to decode the remaining secret images. The focus is to secure the transmitted information even if the channel is revealed, to recognize the authenticity of the extracted images and increase the hiding capacity in a single 24-bit image maintaining the visual quality of the stego-image. Results reveal that the proposed method has low error, comparatively fast computational speed and satisfactory visual quality of the stego-image.
引用
收藏
页码:298 / 302
页数:5
相关论文
共 50 条
  • [31] Reversible data hiding in encrypted images using multiple Huffman coding based on optimal block allocation
    Liansheng, Sui
    Zhi, Pang
    Ying, Cheng
    Zhaolin, Xiao
    Ailing, Tian
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 83 (12) : 34887 - 34911
  • [32] Hiding in encrypted images: a three tier security data hiding technique
    Shabir A. Parah
    Javaid A. Sheikh
    Umer I. Assad
    Ghulam M. Bhat
    Multidimensional Systems and Signal Processing, 2017, 28 : 549 - 572
  • [33] Hiding in encrypted images: a three tier security data hiding technique
    Parah, Shabir A.
    Sheikh, Javaid A.
    Assad, Umer I.
    Bhat, Ghulam M.
    MULTIDIMENSIONAL SYSTEMS AND SIGNAL PROCESSING, 2017, 28 (02) : 549 - 572
  • [34] Progressive reversible data hiding in encrypted images based on polynomial secret sharing and Chinese remainder theorem
    Jiang, Chao
    Zhang, Minqing
    Jiang, Zongbao
    Kong, Yongjun
    Di, Fuqiang
    JOURNAL OF ELECTRONIC IMAGING, 2024, 33 (04)
  • [35] Reversible Data Hiding Over Encrypted Images via Preprocessing-Free Matrix Secret Sharing
    Hua, Zhongyun
    Liu, Xingyu
    Zheng, Yifeng
    Yi, Shuang
    Zhang, Yushu
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2024, 34 (03) : 1799 - 1814
  • [36] Reversible Data Hiding in Encrypted Images Based on Preprocessing-Free Variable Threshold Secret Sharing
    Jiang, Chao
    Zhang, Minqing
    Zhang, Xiong
    Di, Fuqiang
    APPLIED SCIENCES-BASEL, 2024, 14 (13):
  • [37] Reversible Data Hiding in Encrypted Images With Dual Data Embedding
    Qiu, Yingqiang
    Ying, Qichao
    Lin, Xiaodan
    Zhang, Yaowen
    Qian, Zhenxing
    IEEE ACCESS, 2020, 8 (08): : 23209 - 23220
  • [38] A Reversible Data Hiding Method in Compressible Encrypted Images
    Imaizumi, Shoko
    Izawa, Yusuke
    Hirasawa, Ryoichi
    Kiya, Hitoshi
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2020, E103A (12) : 1579 - 1588
  • [39] A Proactive Approach to Reversible Data Hiding in Encrypted Images
    Nair, Nirmal S.
    Mathew, Tojo
    Neethu, A. S.
    Viswanath, Viswajith P.
    Nair, Madhu S.
    Wilscy, M.
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES, ICICT 2014, 2015, 46 : 1510 - 1517
  • [40] Reversible Data Hiding in Partially-Encrypted Images
    Chen, Haishan
    Hong, Wien
    Ni, Jiangqun
    Chen, Tung-Shou
    CLOUD COMPUTING AND SECURITY, PT III, 2018, 11065 : 670 - 679