scholarly journals Enhancing Quality of the Stego Image by Using Histogram Partition and Prediction Error

2021 ◽  
Vol 14 (2) ◽  
pp. 511-520
Author(s):  
Chaidir Islamy ◽  
◽  
Tohari Ahmad ◽  
2020 ◽  
Author(s):  
Xinyang Ying ◽  
Guobing Zhou

Abstract The reversible data hiding allows original image to be completely recovered from the stego image when the secret data has been extracted, it is has drawn a lot of attentions from researchers. In this paper, a novel Taylor Expansion (TE) based stereo image reversible data hiding method is presented. Since the prediction accuracy is essential to the data hiding performance, a novel TE based predictor using correlations of two views of the stereo image is proposed. TE can fully exploit strong relationships between matched pixels in the stereo image so that the accuracy of the prediction can be improved. Then, histogram shifting is utilized to embed data to decrease distortion of stereo images, and multi-level hiding can increase embedding capacity. Experimental results show that the proposed method is superior to some existing data hiding methods considering embedding capacity and the quality of the stego stereo images.


Author(s):  
SOFIA SAIDAH ◽  
NUR IBRAHIM ◽  
MOCHAMMAD HALDI WIDIANTO

ABSTRAKPada studi ini, dilakukan penggabungan metode - metode untuk memperkuat dan meningkatkan sisi keamanan proses pertukaran informasi atau pesan digital. Metode yang digunakan diantaranya adalah metode kriptografi dan metode steganografi. Implementasi pada sistem yang dibangun dilakukan dengan menyandikan pesan pada penerapan metode steganografi citra dalam menyembunyikan pesan tersandi yang dihasilkan ke dalam sebuah citra warna (RGB) dalam domain Discrete Cosine Transform dengan teknik penyisipan Spread Spectrum. Hasil penelitian menunjukan bahwa kualitas dari stego image sangat mirip dengan cover citra yang digunakan, berdasarkan perolehan nilai performansi objektif PSNR diatas 30 db dan subjektif MOS di atas nilai 4.Kata kunci: Steganografi, Discrete Cosine Transform, Spread Spectrum, PSNR, SNR ABSTRACTIn this study, a combination of methods was used to strengthen and enhance the security side of the process of exchanging information or digital messages. The methods used include cryptographic methods and steganography methods. The implementation of the system built is done by encoding the message on the application of the image steganography method in hiding the encrypted message generated into a color image (RGB) in the Discrete Cosine Transform domain with the Spread Spectrum insertion technique. The results of the study show that the quality of the stego image is very similar to the cover image used, based on the acquisition of an objective performance value of PSNR above 30 db and subjective MOS above a value of 4.Keywords: Steganografi, Discrete Cosine Transform, Spread Spectrum, PSNR, SNR


2013 ◽  
Vol 7 (3) ◽  
pp. 1-15 ◽  
Author(s):  
Omar Banimelhem ◽  
Lo’ai Tawalbeh ◽  
Moad Mowafi ◽  
Mohammed Al-Batati

This paper proposes a more secure image hiding scheme using Optimal Pixel Adjustment Process (OPAP) and Genetic Algorithm (GA). The security issues of key selection that is used in image hiding are addressed. Thus, a more secure scheme is proposed in order to improve the security as well as the quality of the stego-image. Since GA is a semi-blind algorithm, it may select a key that affects the security. Therefore, the authores improve the security by applying image transformation not only using the GA key, but also using a user key. The user key is used to disarrange the pixel locations of the secret image. Then, the GA, using OPAP, selects the key that maximizes the quality as well as the security of the stego-image. From implementation point of view, the scheme uses a simple and fast transformation method that increases the difference between the secret image and its transformed version. The results showed that the resultant disarranged image cannot be detected, and at the same time the stego-image quality is still high.


2021 ◽  
pp. 2250007
Author(s):  
Nirmala Krishnamoorthi ◽  
Vinoth Kumar Chinnababu

In reversible watermarking (RW), the original cover image and the watermarked information are restored without any distortion. A secure RW technique using hybrid prediction and difference pair mapping along with the hashing algorithm is proposed in this paper. The four-stage imperceptible watermarking employed in this technique enlarges the payload capacity with low distortion in stego-image. The data authentication is used for protection of message integrity and validation of originator identification. Mean square error and peak signal-to-noise ratio are used for analyzing the robustness of the watermarked image. The simulation result shows that this method performs better than the other existing state-of-the-art methods.


2018 ◽  
Vol 8 (11) ◽  
pp. 2199 ◽  
Author(s):  
Abdul Zakaria ◽  
Mehdi Hussain ◽  
Ainuddin Wahab ◽  
Mohd Idris ◽  
Norli Abdullah ◽  
...  

Steganography is the art and practice of communication using hidden messages. The least significant bits (LSB) based method is the well-known type of steganography in the spatial domain. Usually, achieving the larger embedding capacity in LSB-based methods requires a large number of LSB bits modification which indirectly reduces the visual quality of stego-image and increases the risk of steganalysis detection attacks. In this study, we propose a novel steganography method with data mapping strategy which can reduce the number of bits modification per pixel. In the proposed method, four secret data bits are mapped with the four most significant bits of a cover pixel. Furthermore, the only two LSBs of a pixel are modified to indicate the mapping strategy. Experimental results show that the proposed method is able to achieve 3.48% larger embedding capacity while enhancing the visual quality (i.e., peak signal to noise ratio (PSNR) 3.73 dB) and reducing the modification of 0.76 bits per pixel. Moreover, the proposed method provides security against basic Regular and Singular groups (RS) steganalysis and histogram steganalysis detection attacks.


2014 ◽  
Vol 989-994 ◽  
pp. 2368-2372
Author(s):  
Yong Xing ◽  
Dao Shun Wang

Some existing methods for estimating image watermarking capacity may degenerate the quality of stego-image when the estimated capacity is achieved. In this paper, based on the Region of Interest (ROI) model, we discuss on the capacity problem and the quality of stego-images using PSNR. Considering the trade-off between capacity and quality, our method estimates the allowable distortion for each pixel in spatial domain in terms of the specific PSNR of stego-image. Experimental results show our method ensures a good control over the capacity without introducing artifacts.


Author(s):  
Huda Najeeb

The goal of encryption voice is to ensure the preservation of the conversation details and not to allow anyone to tamper with or see it. This conversation is either secret or very private; no one can understand the substance of that information or messages only authorized persons who have own secret key. The best method to protect the voice message from unauthorized persons is to use both cryptography and steganography. This paper reviews the Advanced Encryption Standard (AES) algorithm used for encrypting voice message and  the Least Signification Bit steganography (LSB) used for embedding encrypted voice message with related key in color image without impacting the content and quality of it. After hiding a secret voice in an image, Stego image is created then is sent to the recipient. The mean square error (MSE) and the signal-to-noise ratio (PSNR) is calculated to measure the quality of the sent image. The findings of the research are that the stego image cannot be distinguished by the naked eye from the original cover image when the bit value is 1 or 2 and thus we reach the goal to cover the presence of a hidden sound inside.


2021 ◽  
Vol 38 (4) ◽  
pp. 1113-1121
Author(s):  
Shikha Chaudhary ◽  
Saroj Hiranwal ◽  
Chandra Prakash Gupta

Steganography is the process of concealing sensitive information within cover medium. This study offers an efficient and safe innovative image steganography approach based on graph signal processing (GSP). To scramble the secret image, Arnold cat map transform is used, then Spectral graph wavelet is used to change the cover and scrambled secret image, followed by singular vector decomposition (SVD) of the modified cover image. To create the stego image, an alpha blending process is used. To produce the stego image, GSP-based synthesis is used. By maintaining the inter-pixel correlation, GSP improves the visual quality of the produced stego image. The effects of image processing attacks on the suggested approach are examined. The investigational results and assessment indicate that the proposed steganography scheme is more efficient and robust in terms of quality measures. The quality of stego image is evaluated in respect of PSNR, NCC, SC and AD performance metrics.


2021 ◽  
Vol 21 (3) ◽  
pp. 97-107
Author(s):  
Nadia A. Mohsin ◽  
Huda A. Alameen

Abstract In this research a new method for increasing the embedding capacity in images based on the edge area is proposed. The new approach combines Canny and Prewitt edge detection techniques using OR binary operation. The secret message is concealed using the Least Significant Bit (LSB) method. Embedding capacity, PSNR, SSIM, and MSE values are used as evaluation metrics. Based on the resulted values, the proposed method showed higher embedding capacity while keeping the PSNR, SSIM, MSE values without major changes of other methods which means keeping the imperceptibility quality of the stego image.


Sign in / Sign up

Export Citation Format

Share Document