Abstract

The dual-image information hiding method has received considerable research attention on account of its high hiding capacity and favorable stego-image quality. The dual-image hiding technology encodes secret data across two images, requiring both stego-images to recover the correct secret data. Many factors affect the embedding capacity and image quality of the dual-image hiding method, including the nature of the hidden data, the block size, and the method by which pixels are modified. This study analyzes and encodes secret data, while controlling the degree of pixel distortion using two parameters - NC and MXD to improve the image quality. The NC parameter controls how many codes are used to re-encode a secret symbol, which is used to control the number of code combinations. MXD specifies the maximum distortion of each code combination and is used to limit image distortion. To improve the effectiveness of the encoding, a pair of digital combinations was assigned according to the frequency of the secret numeric messages. A highly uniform secret message was encoded using a small distortion code. Subsequently, the code was concealed within the cover image, generating two stego-images. The experimental results indicate that the proposed method achieved not only a better embedding rate but also a greater image quality compared with previous methods. In particular, with regard to the smooth image, the image quality of the stego-image was higher than 64.27dB when the proposed scheme was applied. Furthermore, this study utilized many steganalytic technologies to validate the security of the proposed scheme.

Highlights

  • In this era of rapid growth of information technology, our preferred method of exchanging information has changed from handwritten letters to electronic means via the open Internet

  • We extended the concept of encoding, proposed by Lu et al, to create a new encoding method

  • NC represents the number of codes in the code combination and MXD is the maximum distortion caused by the code combination

Read more

Summary

Introduction

In this era of rapid growth of information technology, our preferred method of exchanging information has changed from handwritten letters to electronic means via the open Internet. Any information sent via the Internet is at risk of being destroyed or intercepted by malicious third parties. The safe transmission of information between users has become a crucial concern and is the focus of research into information hiding technology. The nature of the transmitted content has changed from raw text to a diverse range of digital media, such as images, videos, and audio. Digital media is in use everywhere, with images. Accounting for 35% of the digital media in use. Images are often used as a vector for transmitting hidden information

Methods
Results
Conclusion

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.