Efficient Implementation of Multi-image Secret Hiding Based on LSB and DWT Steganography Comparisons

被引:0
作者
Adnan Gutub
Faiza Al-Shaarani
机构
[1] Umm Al-Qura University,Computer Engineering Department
来源
Arabian Journal for Science and Engineering | 2020年 / 45卷
关键词
Data hiding; Steganography; LSB; DWT; Cryptography; Steganography; PSNR; MSE;
D O I
暂无
中图分类号
学科分类号
摘要
The protection of confidential information transmitted over the Internet and restricting access to specific classified data have become a major security and privacy issue. To conceal the existence of such data, digital image steganography is employed hiding the secret in questions within a cover image, arriving at a new image that is virtually indistinguishable from the original. Thus, concealed data within the cover image is prevented from being detected via unauthorized access. In light of the above, certain aspects, such as the capacity of the cover image and the imperceptibility, need to be analyzed and addressed as they constitute the crucial assessment parameters for the performance of the steganography algorithms. In this paper, we compare the steganography algorithms of least significant bit and discrete wavelet transform in terms of efficiency and capacity of concealing multiple images within a single cover image. We cover the mechanism of the embedding and extraction algorithms for multiple numbers of images to come up with knowledgeable remarks. Furthermore, performance of these stego-algorithms has been evaluated with regard to the capacity of the cover image, imperceptibility of the data, and security.
引用
收藏
页码:2631 / 2644
页数:13
相关论文
共 71 条
[1]  
Kavitha KK(2012)Steganography using least significant bit algorithm Int. J. Eng. Res. Appl. 2 338-341
[2]  
Koshti A(2012)Information hiding using least significant bit steganography and cryptography Int. J. Mod. Educ. Comput. Sci. 4 27-57
[3]  
Dunghav P(2017)A data hiding scheme using parity-bit pixel value differencing and improved rightmost digit replacement Signal Process. Image Commun. 50 44-326
[4]  
Gupta S(2019)Comprehensive survey of image steganography: techniques, evaluations, and trends in future research Neurocomputing 335 299-63
[5]  
Goyal A(2018)Recursive information hiding scheme through LSB, PVD Shift, and MPE IETE Tech. Rev. 35 53-66
[6]  
Bhushan B(2018)Image steganography in spatial domain: a survey Signal Process. Image Commun. 65 46-172
[7]  
Hussain M(2011)A survey on image steganography and steganalysis J. Inf. Hiding Multimed. Signal Process. 2 142-598
[8]  
Wahab AWA(2017)Chaotic map based random image steganography using LSB technique IJ Netw. Secur. 19 593-21
[9]  
Ho ATS(2019)Protecting medical records against cybercrimes within Hajj period by 3-layer security Recent Trends Inf. Technol. Its Appl. 2 1-18
[10]  
Javed N(2018)Enhancing PC data security via combining RSA cryptography and video based steganography J. Inf. Secur. Cybercrimes Res. (JISCR) 1 8-20