Robust image steganography approach based on RIWT-Laplacian pyramid and histogram shifting using deep learning

被引:12
作者
Sukumar, Arunkumar [1 ]
Subramaniyaswamy, V [1 ]
Ravi, Logesh [2 ]
Vijayakumar, V. [3 ]
Indragandhi, V [4 ]
机构
[1] SASTRA Deemed Univ, Sch Comp, Thanjavur, India
[2] Sri Ramachandra Inst Higher Educ & Res, Sri Ramachandra Fac Engn & Technol, Chennai, Tamil Nadu, India
[3] Univ New South Wales, Sch Comp Sci & Engn, Sydney, NSW, Australia
[4] Vellore Inst Technol, Sch Elect Engn, Vellore, Tamil Nadu, India
关键词
Image steganography; Multimedia; Arnold scrambling; Sub-matrix generation; Laplacian pyramid; Histogram shifting; Redundant integer wavelet transform; Deep learning; DISCRETE WAVELET TRANSFORM; SVD-BASED ROBUST; ALGORITHM;
D O I
10.1007/s00530-020-00665-6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, highly sensitive medical images are vulnerable to data threats and privacy attacks. They must be kept secure while transmitting them across insecure channels precisely for this purpose. The robust image steganography is focused on this work by exploiting Redundant Integer Wavelet Transform (RIWT), Laplacian Pyramid, Arnold scrambling and Histogram shifting algorithm to facilitate secure communication of secret images in the context. Stego images thus generated are subjected to a deep learning approach to assess if it can be classified as a cover or not. If not, the HS parameter is modified to generate stego images in such a way to classify it as a cover image. Thus it is difficult to suspect the existence of a secret image by the Human Visual System (HVS). The efficiency of our method is analyzed by comparing it with related methods present in the literature. Average NCC values between the original secret image and the extracted secret image are 0.8917 which is higher than the schemes in the literature. Average PSNR values of the stego image are 36.375 even when the embedding rate is increased to 4 bits per pixel. The analysis was done on security and robustness also reveals better results. From the experimental analysis, it is proved that the proposed method is superior to the related methods of the literature.
引用
收藏
页码:651 / 666
页数:16
相关论文
共 48 条
[1]   An Introduction to Image Steganography Techniques [J].
Altaay, Alaa A. Jabbar ;
bin Sahib, Shahrin ;
Zamani, Mazdak .
2012 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE APPLICATIONS AND TECHNOLOGIES (ACSAT), 2012, :122-126
[2]  
[Anonymous], INT J COMPUTER THEOR
[3]  
[Anonymous], 2010, J. Inf. Hiding Multimed. Signal Process
[4]  
[Anonymous], ARXIV12080803
[5]   RIWT and QR factorization based hybrid robust image steganography using block selection algorithm for IoT devices [J].
Arunkumar, S. ;
Vairavasundaram, Subramaniyaswamy ;
Ravichandran, K. S. ;
Ravi, Logesh .
JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2019, 36 (05) :4265-4276
[6]   SVD-based robust image steganographic scheme using RIWT and DCT for secure transmission of medical images [J].
Arunkumar, S. ;
Subramaniyaswamy, V ;
Vijayakumar, V. ;
Chilamkurti, Naveen ;
Logesh, R. .
MEASUREMENT, 2019, 139 :426-437
[7]  
Arunkumar S., 2018, BIOMED RES-TOKYO, V29, P394
[8]   A Novel DWT based Image Securing Method using Steganography [J].
Baby, Della ;
Thomas, Jitha ;
Augustine, Gisny ;
George, Elsa ;
Michael, Neenu Rosia .
PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES, ICICT 2014, 2015, 46 :612-618
[9]  
Bandyopadhyay D, 2014, INT J SECURITY PRIVA, V3, P11
[10]   THE LAPLACIAN PYRAMID AS A COMPACT IMAGE CODE [J].
BURT, PJ ;
ADELSON, EH .
IEEE TRANSACTIONS ON COMMUNICATIONS, 1983, 31 (04) :532-540