Image Steganography Using Priority-Based Neural Network and Pyramid
Steganography is the process of concealing such that it does not attract third-party attention. Hence just by looking nobody can guess that hiding has been done, whereas cryptography is also an art of hiding, but the only disadvantage being that anyone ca
- PDF / 334,894 Bytes
- 10 Pages / 439.37 x 666.142 pts Page_size
- 8 Downloads / 210 Views
Abstract Steganography is the process of concealing such that it does not attract third-party attention. Hence just by looking nobody can guess that hiding has been done, whereas cryptography is also an art of hiding, but the only disadvantage being that anyone can guess about the encryption. Hence it attracts the attention of intruders who can try hard to decrypt it. Hence in our proposed methodology we have tried to combine the two and tried to make the hiding process stronger for secret message communication. The encryption method used is a novel one and we have introduced a unique pyramid named the ScDs pyramid. For ease of work we have taken the help of a priority algorithm which is fed to a neural network. The method is found to perform better than the related existing methods. The proposed algorithm can be used for security purposes related to the Internet or network, watermarking, and so on. Keywords Cover image Stego image
Neural network priority Pyramid ScDs pyramid
1 Introduction Computer-mediated communication has opened new ways to communicate, but has brought with it lots of security issues! Is the message I am sending secretly to someone really that secret? The answer is NO! Intruders are always trying to break the security shell and peep into our so-called private zone. Thus securing our data from unauthorized access has become a big issue in recent years. Our proposed methodology highlights these problems and tries to give a secure solution. If we
Sreeparna Chakrabarti (&) Debabrata Samanta Department of MCA, Acharya Institute of Technology, Bangalore, India e-mail: [email protected] Debabrata Samanta e-mail: [email protected] © Springer Science+Business Media Singapore 2016 N.R. Shetty et al. (eds.), Emerging Research in Computing, Information, Communication and Applications, DOI 10.1007/978-981-10-0287-8_15
163
164
Sreeparna Chakrabarti and Debabrata Samanta
combine the method of cryptography and steganography together for message transmission it will be stronger. Via cryptography, message contents are hidden from an unwanted third party, though he or she is aware that a secret message exists. Hence, if the attacker breaks the cryptographic system by any means, the secret message will be revealed. On the other hand, if we secure a system via steganography the attacker has to break it in two stages: (i) First, the attacker has to know the existence of steganography. (ii) Then he should be able to read, modify, or remove the secret message. Therefore steganography alone is not strong enough. In our proposed system, we use both together. Hence even if the attacker detects the existence of a hidden message, he will not be able to read/modify that. Even if he manages to remove it our secret message is not revealed. The attacker has to be sure whether our image contains any hidden message. For this he can take the help of a statistical hypothesis-testing problem whose test function is f : c ef0; 1g. If there is a secret message in c the value of f ðcÞ is 1, e
Data Loading...