Secure data hiding scheme using firefly algorithm with hidden compression

被引:3
作者
Sharma, Shilpa [1 ]
Patil, Harshal [2 ]
机构
[1] Manipal Univ Jaipur, Dept Comp Applicat, Jaipur 303007, Rajasthan, India
[2] Jaipur Natl Univ, Dept Comp & Syst Sci, Jaipur 302017, Rajasthan, India
关键词
DWT; FA; Spatial; data hiding; MSE; PSNR; Steganography;
D O I
10.1080/09720529.2020.1729502
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
The goal of proposed procedure is to make a protected information concealing framework to shroud the incognito information by finding the intense area in the spread picture to such an extent that the created stego picture is unrivaled, furnish high security with a less significant memory use, less computational impulsiveness, high visual feature and can achieve great execution. In RDH the spread picture will be recovered in the wake of removing the secrecy information which was inserted in that picture. This paper shows another method in reversible information concealing strategy dependent on Firefly calculation (FA). The most ideal area to cover up the hidden information that will be established by firefly calculation. The firefly calculation results in the salt and pepper commotion. Picture de-noising consists of the control of the picture data to build an outwardly astounding picture. 2D respective channel is utilized to channel the picture after shrouded the mystery data. In this framework, a hearty computerized shading picture watermarking strategy utilizing Discrete Wavelet Transform(DWT) is projected. DWT is used for implanting the mystery information into spread picture and after that IDWT is connected to recuperate unique picture. Invert procedure is connected for extraction of discharge information. The experimental results demonstrates that proposed strategy accomplished enhanced MSE and higher PSNR. This make the proposed technique increasingly compelling and secure for concealing information.
引用
收藏
页码:525 / 534
页数:10
相关论文
共 9 条
  • [1] Amsaveni A, 2015, 2015 2ND INTERNATIONAL CONFERENCE ON ELECTRONICS AND COMMUNICATION SYSTEMS (ICECS), P650, DOI 10.1109/ECS.2015.7124988
  • [2] [Anonymous], J SOFTW ENG
  • [3] [Anonymous], MULTIMEDIA TOOLS APP
  • [4] [Anonymous], 2013, INT J ADV INFORM TEC
  • [5] [Anonymous], 2013, J COMPUT COMMUN
  • [6] A novel general multiple-base data embedding algorithm
    Chen, Wei-Sung
    Liao, Yi-Kai
    Lin, Yun-Te
    Wang, Chung-Ming
    [J]. INFORMATION SCIENCES, 2016, 358 : 164 - 190
  • [7] Juneja M, 2013, J INF PROCESS SYST, V9, P405
  • [8] Malik A, 2017, J INFORM OPTIM SCI, V38, P647, DOI 10.1080/02522667.2016.1197572
  • [9] Steganalysis by subtractive pixel adjacency matrix and dimensionality reduction
    Zhang Hao
    Ping XiJian
    Xu ManKun
    Wang Ran
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2014, 57 (04) : 1 - 7