A stegano-visual cryptography technique for multimedia security

被引:13
作者
Gurunathan, K. [1 ,2 ]
Rajagopalan, P. [3 ]
机构
[1] Anna Univ, Chennai, Tamil Nadu, India
[2] Mother Therasa Coll Engn & Technol, Dept CSE, Pudukottai, Tamil Nadu, India
[3] GKM Coll Engn & Technol, Dept CSE, Chennai, Tamil Nadu, India
关键词
Steganography; Information hiding; Multimedia; Visual cryptography (VC); Joint photographic experts group (JPEG); Joint quantization table modification (JQTM) and cuckoo search (CS) algorithm; IMAGE STEGANOGRAPHY; JPEG; SEARCH; SCHEME;
D O I
10.1007/s11042-019-7471-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Owing to the increasing growth in digital communication as well as the multimedia applications, security has now become a very significant problem in the communication as well as storage space of such images. The Visual Cryptography (VC) has been used for hiding the information that are in the images which is a special technique of encryption that is decrypted by a human visual system. In this paper, a technique for embedding a secret message within that of a cover-image to ensure the interceptors will not observe the presence of such hidden data is presented. The method has an essential conception by means of a simple Least Significant Bit (LSB) substitution. Being inspired by the steganography approach, the current work splits the cover images into n blocks of 8X 8 pixels and into a secret message of n partitions in order to improve the image quality and to increase the capacity of secret message along with its security level. For the purpose of improving this stego-image quality and for increasing the capacity of secret message along with its security level, being inspired by the current work that splits cover images into the n blocks of 8X 8 pixels and into a secret message of n partitions. In the proposed method, the Cuckoo Search (CS) is used for searching an approximate and optimal solution of finding any optimal substitution matrix to transform the message in every block as opposed to finding a single optimal matrix for substitution and the entire cover-image is presented. The final quality of its resulting in the stego-image, and its secret message and its capacity with the level of security of this method proposed will be calculated and then comparted to the other different methods. The results of the experiment proved that the proposed method outperformed all the Joint Photographic Experts Group (the JPEG) and the Joint Quantization Table Modification (the JQTM) based method in terms of quality of image, security level and embedding capacity.
引用
收藏
页码:3893 / 3911
页数:19
相关论文
共 29 条
[1]  
Abbas SA, 2015, 2015 IEEE SEVENTH INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND INFORMATION SYSTEMS (ICICIS), P572, DOI 10.1109/IntelCIS.2015.7397279
[2]   High capacity steganographic method based upon JPEG [J].
Almohammad, Adel ;
Hierons, Robert M. ;
Ghinea, Gheorghita .
ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, :544-+
[3]  
[Anonymous], INT J ADV ENG TECHNO
[4]  
[Anonymous], 2010, 2010 2 INT C COMPUTI
[5]  
[Anonymous], 2018, International Journal of Engineering & Technology, DOI DOI 10.14419/IJET.V7I1.9.9729
[6]  
[Anonymous], 2016, Int. J. Comput. Sci. Inf. Sec
[7]  
Awad A, 2017, J ED COLL WASIT U, V1, P497, DOI [10.31185/eduj.Vol1.Iss26.105, DOI 10.31185/EDUJ.VOL1.ISS26.105]
[8]  
Bloisi Domenico, 2007, VISAPP 2007. Second International Conference on Computer Vision Theory and Applications, P127
[9]   A steganographic method based upon JPEG and quantization table modification [J].
Chang, CC ;
Chen, TS ;
Chung, LZ .
INFORMATION SCIENCES, 2002, 141 (1-2) :123-138
[10]  
Chhabra N, 2012, INT J COMPUT SCI NET, V12, P126