Image steganography for securing secret data using hybrid hiding model
- PDF / 1,393,153 Bytes
- 21 Pages / 439.37 x 666.142 pts Page_size
- 94 Downloads / 231 Views
Image steganography for securing secret data using hybrid hiding model Sumeet Kaur 1
2
& Savina Bansal & Rakesh Kumar Bansal
2
Received: 22 May 2020 / Revised: 14 August 2020 / Accepted: 17 September 2020 # Springer Science+Business Media, LLC, part of Springer Nature 2020
Abstract
Image steganography is the process of concealing the confidential message in digital images. The purpose of this research is to secure the transmission of an image from attackers. This research introduced an innovative Image Hiding Encryption and Decryption (IHED) for encrypting and decrypting images. Moreover, the encoding process is performed on the Mid-frequency (MF) values are identified by a novel Mid Search African Buffalo Model (MSABM). The efficiency of the proposed model is validated by applying some attacks such as a novel White Floor Square Attack (WFSA), RS steganalysis, Chisquare attack, and visual attack. Furthermore, the proposed methodology showed that the embedded image has high Peak Signal to Noise Ratio (PSNR), embedding rate, Structural Similarity Index Metric (SSIM) and reduced Mean Square Error (MSE). Finally, the proposed strategy is compared with existing approaches and achieved better results by increasing the security of embedded secrets in the steganography system. Keywords Image steganography . Encryption . Decryption . Whitefloor Square Attack . Mid-frequency . RS Steganalysis
1 Introduction Steganography is the technique for hiding a document, text, image, or video in another document, text, image, or video [11]. Generally, steganography is hiding a confidential
* Sumeet Kaur [email protected]
1
Department of Computer Science and Engineering, I.K. Gujral Punjab Technical University, Jalandhar-Kapurthala Highway, VPO-Ibban, Kapurthala, Punjab 144603, India
2
Department of Electronics and Communication Engineering, Maharaja Ranjit Singh Punjab Technical University, Dabwali Road, Lal Singh Nagar, Bathinda, Punjab 151001, India
Multimedia Tools and Applications
data [13] within an original cover image that someone cannot identify the hidden messages. The purpose of steganography is to maintain the secret announcement among two parties [19]. Here, the confidential data is hosted up into the cover image that is called as stego image [2], which is not found [5] by human eyes. Moreover, when the stego image is reached to the receiver then decomposes or decryption process is performed to attain the secret image [23]. In the present day, there are three valuable techniques are developed in image steganography [37]. They are Least Significant Bit (LSB) substitution [32], blocking [22], and palette alteration [7]. LSB substitution modus or task is defined the way towards shifting the LSB pixels [11] of the transporter image [36]. Sometimes, the technique utilized to hide the message using steganography is not very effective [14]. Moreover, the decomposition of pixel value is processed using dissimilar number series [33]. The intensity of the grey scale pictures is in various ranges that depend upon
Data Loading...