Abstract

Abstract In a digital communication environment, information security is mandatory. Three essential parameters used in the design process of a steganography algorithm are Payload, security, and fidelity. However, several methods are implemented in information hiding, such as Least Significant Bit (LBS), Discrete Wavelet Transform, Masking, and Discrete Cosine Transform. The paper aims to investigate novel steganography techniques based on agent technology. It proposes a Framework of Steganography based on agent for secret communication using LSB. The most common image steganography databases are explored for training and testing. The methodology in this work is based on the statistical properties of the developed agent software using Matlab. The experiment design is based on six statistical feature measures, including Histogram, Mean, Standard deviation, Entropy, Variance and Energy. For steganography, an Ensemble classifier is used to test two scenarios: embedding a single language message and inserting bilingual messages. ROC Curve represents the evaluation metrics. The result shows that the designed agent-based system with 50% training/testing sample set and 0.2 Payload can pick out the best cover image for the provided hidden message size to avoid visual artifact.

Highlights

  • Information security is an essential factor required for exchanging messages or information communication via the internet

  • Three essential parameters used in the design process of a steganography algorithm are Payload, security, and fidelity

  • Security is the inability of the steganalysis system to discover the embedded secret messages

Read more

Summary

Introduction

Information security is an essential factor required for exchanging messages or information communication via the internet. Sometimes keeping the secrecy of messages’ content is not enough, and it may be safer to conceal the existence of the message, which is known as steganography. Cryptography can protect an encoded message, its visible presence exposes the message to decryption attacks which a message invisible to an eavesdropper avoids. Both can be applied, and steganography becomes more secure if its Payload message is encrypted with a key known only to the intended recipient [4,5].

Objectives
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call