Image steganography with N-puzzle encryption
- PDF / 2,344,347 Bytes
- 25 Pages / 439.37 x 666.142 pts Page_size
- 54 Downloads / 205 Views
Image steganography with N-puzzle encryption Srilekha Mukherjee 1
& Goutam Sanyal
1
Received: 5 September 2019 / Revised: 30 July 2020 / Accepted: 4 August 2020 # Springer Science+Business Media, LLC, part of Springer Nature 2020
Abstract
Security, when referred to the context of data/information, is indeed a very vulnerable and necessary entity at present. Rigorous researches are cropping up for the betterment of the secured globe. Primarily, the term ‘Steganography’ has been in limelight to cater the extreme need of protection of sensitive and confidential data. This paper presents a two level steganographic approach of masking the secret data. This is done to facilitate data hiding and hence ensures a covert communication. On the whole, the targeted goal of this methodology is to maintain a trade-off between payload, imperceptibility and robustness. The first stage of the procedure imposes the Arnold transformation on the carrier image. The output of this stage is a scrambled image. This scrambling of pixel data bits disrupts the normal orientation of the resident pixels. Next, an N-puzzle based technique is applied on the scrambled image to promote a strategy of encryption. The concept of N-puzzle problem stands to be the base of this step. Post this stage, the output generated is a further encrypted image. Thereafter, the insertion technique of Mid Position Value (MPV) is applied to embed bits from the secret image within the above generated form of cover/carrier. After the procedure of insertion, the application of reverse N-puzzle encryption technique followed by the inverse Arnold transform fosters the final stego-image. This, on the whole, results in reverting back to the normal orientation of the original input image. All of the given experimental results highlight the outcome of the whole methodology. On this context, several of the quantitative as well as qualitative benchmark parameters have been analyzed. The results computed shows that the quality is well maintained. The generated stego is imperceptible. It also supports the nondetectability of secret data. The payload promoted in this procedure is quite high. Thus, the trade-off between the security parameters is maintained. Keywords Steganography . N-puzzleencryption . Midpositionvalue (MPV) . Peaksignalto noise ratio (PSNR) . Similarity measure
* Goutam Sanyal [email protected] Srilekha Mukherjee [email protected]
1
Department of CSE, National Institute of Technology, Durgapur, India
Multimedia Tools and Applications
1 Introduction Security, these days is an alarming issue for the modern world that is full of brilliant technologies. In this context, the task of securing the contents of sensitive data has attracted the public focus, which gradually gained a very high importance. Cryptography [38] was formulated to give protection to data via its encryption techniques. This provided security to the contents of any sensitive information to some extent. But many a times, just encrypting the data is not sufficient. Secrecy sta
Data Loading...