Steganography based information security with high embedding capacity

被引:0
作者
Sirisha, B. Lakshmi [1 ]
Kumar, S. Srinivas [1 ]
Mohan, B. Chandra [2 ]
机构
[1] Jawaharlal Nehru Technol Univ, Dept ECE, Kakinada, Andhra Prades, India
[2] Bapatla Engn Coll, Dept ECE, Bapatla, Andhra Prades, India
来源
2015 NATIONAL CONFERENCE ON RECENT ADVANCES IN ELECTRONICS & COMPUTER ENGINEERING (RAECE) | 2015年
关键词
Image hiding; Image steganography; Image quality metrics; Information Security; Secret image sharing; Cramer's rule; SECRET; AUTHENTICATION; IMAGES;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A novel high embedding capacity for spatial domain image steganography is proposed in this paper. In this method, two secret images are embedded into a cover image of same size with good quality. A ( t, n) threshold secret sharing scheme is one popular method of implementing steganography. In this method, the secret image is distributed among n participants. Any t ( or more) out of n authorized participants can recover the secret image and less than t participants cannot recover the secret image. The proposed method also satisfies the reversibility property of steganography to reconstruct secret and cover images without any loss of information. Various image quality metrics are used to assess the quality of the stego images. The proposed scheme is efficient in terms of embedding capacity and is computationally faster compared to the existing methods.
引用
收藏
页码:17 / 21
页数:5
相关论文
共 50 条
[21]   A DWT Based Perfect Secure and High Capacity Image Steganography Method [J].
Farahani, Mohammad Reza Dastjani ;
Pourmohammad, Ali .
2013 INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES (PDCAT), 2013, :314-317
[22]   Towards improving the security of image steganography via minimizing the spatial embedding impact [J].
Su, Wenkang ;
Ni, Jiangqun ;
Hu, Xianglei ;
Huang, Fangjun .
DIGITAL SIGNAL PROCESSING, 2022, 131
[23]   Regulating Kashida Arabic steganography to improve security and capacity performance [J].
Gutub A. .
Multimedia Tools and Applications, 2025, 84 (9) :5457-5490
[24]   A Secure and High Embedding Capacity Image Steganography Scheme Using Image Enhancement Technique, Compression, and Genetic Algorithm [J].
Apau, Richard ;
Twum, Frimpong ;
Asante, Michael ;
Ben Hayfron-Acquah, James .
PROCEEDINGS OF NINTH INTERNATIONAL CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGY, VOL 10, ICICT 2024, 2025, 1055 :307-325
[25]   A Novel Steganography Scheme Based on Asymmetric Embedding Model [J].
Hu, Xianglei ;
Chen, Haishan ;
Ni, Jiangqun ;
Su, Wenkang .
CLOUD COMPUTING AND SECURITY, PT IV, 2018, 11066 :183-194
[27]   An Improved LSB Embedding Technique for Image Steganography [J].
Sugathan, Sherin .
PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON APPLIED AND THEORETICAL COMPUTING AND COMMUNICATION TECHNOLOGY (ICATCCT), 2016, :609-612
[28]   High-Capacity Image Steganography Based on Improved FC-DenseNet [J].
Duan, Xintao ;
Nao, Liu ;
Mengxiao, Gou ;
Yue, Dongli ;
Xie, Zimei ;
Ma, Yuanyuan ;
Qin, Chuan .
IEEE ACCESS, 2020, 8 :170174-170182
[29]   Reversible and colorable deep image steganography with large capacity [J].
Wu, Li ;
Cheng, Hang ;
Yan, Wanxi ;
Chen, Fei ;
Wang, Meiqing ;
Wang, Tingqiang .
JOURNAL OF ELECTRONIC IMAGING, 2023, 32 (04)
[30]   Improving Security and Capacity for Arabic Text Steganography Using 'Kashida' Extensions [J].
Al-Haidari, Fahd ;
Gutub, Adnan ;
Al-Kahsah, Khalid ;
Hamodi, Jameel .
2009 IEEE/ACS INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, VOLS 1 AND 2, 2009, :396-399