Skip to main content

2017 | OriginalPaper | Buchkapitel

Comprehensive Data Hiding Technique for Discrete Wavelet Transform-Based Image Steganography Using Advance Encryption Standard

verfasst von : Vijay Kumar Sharma, Devesh Kumar Srivastava

Erschienen in: Computing and Network Sustainability

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The steganography is the discipline of trouncing data into innocuous media in a manner that reality of the hidden data remains invisible to an antagonist. Varieties of methods have been developed over time in the area of image steganography. Robust steganography technique increases data protection from an adversary even if an attacker clutches the knowledge about the embedding process. Modern information security system combines both cryptography and steganography techniques. This paper proposes an image steganography method, at the initial stage secret image is encrypted using advance encryption standard (AES) and afterwards hide the results of AES into the picture (i.e. cover media or cover image) with the assistance of Haar Discrete Wavelet Transform and alpha blending. These efforts ensure that the proposed data hiding mechanism gives higher imperceptibility and trustworthiness which is the essential requirements of any steganography technique. All practical implementation perform on MATLAB.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Marvel Lisa M, Boncelet Charles G, Retter Charles T (1999) Spread Spectrum Image Steganography. IEEE Trans Image Process 8:1075–1108CrossRef Marvel Lisa M, Boncelet Charles G, Retter Charles T (1999) Spread Spectrum Image Steganography. IEEE Trans Image Process 8:1075–1108CrossRef
2.
Zurück zum Zitat Prabakaran G, Bhavani R (2012) A modified secure digital image steganography based on discrete wavelet transform. In: International conference on computing, electronics and electrical technologies. pp 1096–1100 Prabakaran G, Bhavani R (2012) A modified secure digital image steganography based on discrete wavelet transform. In: International conference on computing, electronics and electrical technologies. pp 1096–1100
3.
Zurück zum Zitat Bassham L (2000) Efficiency testing of ANSI C implementations of round 2 candidate algorithms for the advanced encryption standard. In: The Third AES candidate conference, by the National Institute of Standards and Technology Gaithersburg. 136–148 Bassham L (2000) Efficiency testing of ANSI C implementations of round 2 candidate algorithms for the advanced encryption standard. In: The Third AES candidate conference, by the National Institute of Standards and Technology Gaithersburg. 136–148
4.
Zurück zum Zitat Manoharan S (2008) An empirical analysis of RS steganalysis. In: The third international conference on internet monitoring and protection. IEEE, pp 172–177 Manoharan S (2008) An empirical analysis of RS steganalysis. In: The third international conference on internet monitoring and protection. IEEE, pp 172–177
5.
Zurück zum Zitat Foster, Wang S, Yang B, Niu X (2010) A secure steganography method based on genetic algorithm. J Inf Hiding Multimed Signal Process. 1:2073-4212 Foster, Wang S, Yang B, Niu X (2010) A secure steganography method based on genetic algorithm. J Inf Hiding Multimed Signal Process. 1:2073-4212
6.
Zurück zum Zitat Pratap R (2013) Getting started with MATLAB. Oxford University Press Pratap R (2013) Getting started with MATLAB. Oxford University Press
7.
Zurück zum Zitat Sau K, Basak RK, Chanda A (2013) Image compression based on block truncation coding using Clifford Algebra. In: International conference on computational intelligence: modeling techniques and applications (CIMTA). pp 699–706 Sau K, Basak RK, Chanda A (2013) Image compression based on block truncation coding using Clifford Algebra. In: International conference on computational intelligence: modeling techniques and applications (CIMTA). pp 699–706
Metadaten
Titel
Comprehensive Data Hiding Technique for Discrete Wavelet Transform-Based Image Steganography Using Advance Encryption Standard
verfasst von
Vijay Kumar Sharma
Devesh Kumar Srivastava
Copyright-Jahr
2017
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-3935-5_36

Neuer Inhalt