Data hiding technique in steganography for information security using number theory

被引:23
作者
Rehman, Amjad [1 ]
Saba, Tanzila [2 ]
Mahmood, Toqeer [3 ]
Mehmood, Zahid [4 ]
Shah, Mohsin [5 ,6 ]
Anjum, Adeel [7 ]
机构
[1] Al Yamamah Univ Riyadh, CCIS, Riyadh, Saudi Arabia
[2] Prince Sultan Univ, Dept Informat Syst CCIS, Riyadh, Saudi Arabia
[3] Univ Engn & Technol, Dept Comp Sci, Taxila, Pakistan
[4] Univ Engn & Technol, Dept Software Engn, Taxila, Pakistan
[5] Univ Sci & Technol China, Sch Informat Sci & Technol, Hefei, Anhui, Peoples R China
[6] Hazara Univ Masehra, Dept Telecommun, Masehra, Khyber Pakhtunk, Pakistan
[7] COMSATS Univ Islamabad, Dept Comp Sci, Islamabad, Pakistan
关键词
Data hiding; forensic image analysis; statistical techniques; steganography; VIDEO STEGANOGRAPHY; IMAGES; WAVELET; SCHEME; STEGANALYSIS; WATERMARKING; CAPACITY; DOMAIN;
D O I
10.1177/0165551518816303
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the current era, due to the widespread availability of the Internet, it is extremely easy for people to communicate and share multimedia contents with each other. However, at the same time, secure transfer of personal and copyrighted material has become a critical issue. Consequently, secure means of data transfer are the most urgent need of the time. Steganography is the science and art of protecting the secret data from an unauthorised access. The steganographic approaches conceal secret data into a cover file of type audio, video, text and/or image. The actual challenge in steganography is to achieve high robustness and capacity without bargaining on the imperceptibility of the cover file. In this article, an efficient steganography method is proposed for the transfer of secret data in digital images using number theory. For this purpose, the proposed method represents the cover image using the Fibonacci sequence. The representation of an image in the Fibonacci sequence allows increasing the bit planes from 8-bit to 12-bit planes. The experimental results of the proposed method in comparison with other existing steganographic methods exhibit that our method not only achieves high embedding of secret data but also gives high quality of stego images in terms of peak signal-to-noise ratio (PSNR). Furthermore, the robustness of the technique is also evaluated in the presence of salt and pepper noise attack on the cover images.
引用
收藏
页码:767 / 778
页数:12
相关论文
共 42 条
[1]   Efficient High Capacity Steganography Technique [J].
Abdulla, Alan Anwer ;
Jassim, Sabah A. ;
Sellahewa, Harin .
MOBILE MULTIMEDIA/IMAGE PROCESSING, SECURITY, AND APPLICATIONS 2013, 2013, 8755
[2]   On the limits of steganography [J].
Anderson, RJ ;
Petitcolas, FAP .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1998, 16 (04) :474-481
[3]  
[Anonymous], 2013, INT J COMPUTERS TECH, DOI DOI 10.24297/IJCT.V11I3.1167
[4]  
Aroukatos N., 2012, Proceedings of the 2012 Ninth International Conference on Information Technology: New Generations (ITNG), P392, DOI 10.1109/ITNG.2012.96
[5]   Intelligent reversible watermarking in integer wavelet domain for medical images [J].
Arsalan, Muhammad ;
Malik, Sana Ambreen ;
Khan, Asifullah .
JOURNAL OF SYSTEMS AND SOFTWARE, 2012, 85 (04) :883-894
[6]  
Bailey K, 2006, MULTIMED TOOLS APPL, V30, P55, DOI 10.1007/s11042-006-0008-4
[7]  
Battisti F., 2006, P 3 INT C COMP DEV C
[8]  
Bhowal K, 2017, TURK J ELECTR ENG CO, V25, P2136, DOI [10.3906/elk-162-267, 10.3906/elk-1602-267]
[9]   Color local complexity estimation based steganographic (CLCES) method [J].
Carvajal-Gamez, Blanca E. ;
Gallegos-Funes, Francisco J. ;
Rosales-Silva, Alberto J. .
EXPERT SYSTEMS WITH APPLICATIONS, 2013, 40 (04) :1132-1142
[10]   High payload steganography mechanism using hybrid edge detector [J].
Chen, Wen-Jan ;
Chang, Chin-Chen ;
Le, T. Hoang Ngan .
EXPERT SYSTEMS WITH APPLICATIONS, 2010, 37 (04) :3292-3301