Efficient Implementation of Multi-image Secret Hiding Based on LSB and DWT Steganography Comparisons

被引:61
作者
Gutub, Adnan [1 ]
Al-Shaarani, Faiza [1 ]
机构
[1] Umm Al Qura Univ, Comp Engn Dept, Mecca, Saudi Arabia
关键词
Data hiding; Steganography; LSB; DWT; Cryptography; PSNR; MSE; IMAGE STEGANOGRAPHY; SCHEME; PVD;
D O I
10.1007/s13369-020-04413-w
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
The protection of confidential information transmitted over the Internet and restricting access to specific classified data have become a major security and privacy issue. To conceal the existence of such data, digital image steganography is employed hiding the secret in questions within a cover image, arriving at a new image that is virtually indistinguishable from the original. Thus, concealed data within the cover image is prevented from being detected via unauthorized access. In light of the above, certain aspects, such as the capacity of the cover image and the imperceptibility, need to be analyzed and addressed as they constitute the crucial assessment parameters for the performance of the steganography algorithms. In this paper, we compare the steganography algorithms of least significant bit and discrete wavelet transform in terms of efficiency and capacity of concealing multiple images within a single cover image. We cover the mechanism of the embedding and extraction algorithms for multiple numbers of images to come up with knowledgeable remarks. Furthermore, performance of these stego-algorithms has been evaluated with regard to the capacity of the cover image, imperceptibility of the data, and security.
引用
收藏
页码:2631 / 2644
页数:14
相关论文
共 35 条
[1]  
Al-Juaid N.A., 2018, J Inf Secur Cybercrimes Res (JISCR), V1, P8, DOI [10.26735/16587790.2018.006, DOI 10.26735/16587790.2018.006]
[2]   Combining RSA and audio steganography on personal computers for enhancing security [J].
Al-Juaid, Nouf ;
Gutub, Adnan .
SN APPLIED SCIENCES, 2019, 1 (08)
[3]   Enhancing speed of SIMON: A light-weight-cryptographic algorithm for IoT applications [J].
Alassaf, Norah ;
Gutub, Adnan ;
Parah, Shabir A. ;
Al Ghamdi, Manal .
MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (23) :32633-32657
[4]  
ALHUSAINY MAF, 2015, EUROPEAN J SCI RES, V130, P101
[5]  
Alotaibi M., 2019, Journal of Information Security and Cybercrimes Research, V2, P9, DOI 10.26735/16587790.2019.001
[6]  
ALSAIDI A, J FORENSIC RES, V10
[7]  
Alsaidi A., 2018, J COMPUTER SCI COMPU, V8, DOI [10.20967/jcscm.2018.03.002, DOI 10.20967/jcscm.2018.03.002]
[8]  
[Anonymous], 2018, J Res Eng Appl Sci
[9]  
BUCERZAN D, 2016, INT WORKSH SOFT COMP
[10]  
Divya V, 2016, PROCEEDINGS OF 2016 ONLINE INTERNATIONAL CONFERENCE ON GREEN ENGINEERING AND TECHNOLOGIES (IC-GET)