Abstract

In the proposed paper an approach for image transmission with security and also improvement of the gray-scale (8-bit image) image flexible stenographic system using LSB approach. In this process a secret key of 80 bits is applied while embedding the message into the cover image. To provide high security and also confidentiality of the data a key stego-key is applied. The proposed method the information bits are embedded adaptively into the cover-image pixels. With this method a high embedding capacity in terms of hiding the data is provided and also better imperceptibility is also achieved. The major advantage of this method verifies by the Security method of Digital Signature. It is to be verified whether the attacker has made a trials to change the Secret information in the present inside the stego-image which is intended to be kept secret throughout the communication process. In this technique the embedding process to hide the message data present in the transformed spatial domain of the cover image and makes use of a simple Exclusive-OR operation based on Security checking method of verifying the signature digitally by using key size value of 140 bits is used to check the integrity from the stego-image. The confidential data which is embedded can be retrieved from stego-images. The security level is enhanced by using the stego key and by adaptive steganography data inconspicuousness is improved.

Highlights

  • Information security, authentication, confidentiality and data integrity are the major requirements in network security and data communications so as to shield the data against illegal user access in the process of various wireless and multimedia applications [6],[7] of digital information

  • If the cover image of a particular size of digital image which is considered to be concealed with secret information, this representation is identified as stego-image

  • Comparative Results From the table 2 and the Figure drawn for the tabulated values of the three methods it is observed that the proposed method is good in terms of capacity with the appreciable value of PSNR for the images taken as inputs for experimental investigation purpose.The Matlab simulation screenshots in Figure denotes the Elapsed time of the message insertion of 220.016842 Sec, Figure denotes Original image and stego image shown in the form of subplot, figure denotes Message Extraction at the receiver of value 189.761071 Sec, Figure denotes the Extraction of the original image

Read more

Summary

Introduction

Information security, authentication, confidentiality and data integrity are the major requirements in network security and data communications so as to shield the data against illegal user access in the process of various wireless and multimedia applications [6],[7] of digital information. This has initiated for rapid growth in the field of data hiding. Existing literature of information protection the data hiding techniques are used comprehensively to list a few in areas like defense, medical, digital forensic, health care applications. In the steganography the basic terms like cover image, stego-key, explains the original information message, data, audio, still video modes of input data.

Methods
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.