Skip to main content
Erschienen in: Microsystem Technologies 10/2020

31.03.2018 | Technical Paper

Secured hand sacking based two phase data concealing architecture in spectral domain

verfasst von: Sujit Das, J. K. Mandal

Erschienen in: Microsystem Technologies | Ausgabe 10/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The requirement of information confidentiality in digital world emanates different approaches to the criticality of secrecy. Steganographic methods hide the secret information into cover media. In this paper the carrier medium is checked for vulnerabilities before the actual information transfer can be made. If the medium is sensed safe to transfer then a suitable cover image is selected and is transformed using four point Daubechies DWT to one low frequency band and three high frequency bands. Three sub images are constructed from the cover image as keeping one high frequency band intact and setting other high frequency band to zero. The secret image is spread over the three images and transferred to the receiver. At receiver end images are added and secret image is extracted from it using DWT.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Al-Dmour H, Al-Ani A (2015) A steganography embedding method based on edge identification and XOR coding. Expert Syst Appl 46:293–306CrossRef Al-Dmour H, Al-Ani A (2015) A steganography embedding method based on edge identification and XOR coding. Expert Syst Appl 46:293–306CrossRef
Zurück zum Zitat Crandall R (1998) Some notes on steganography. Posted on steganography mailing list Crandall R (1998) Some notes on steganography. Posted on steganography mailing list
Zurück zum Zitat Fan L, Gao T, Yang Q, Cao Y (2011) An extended matrix encoding algorithm for steganography of high embedding efficiency. Comput Electr Eng 37:973–981CrossRef Fan L, Gao T, Yang Q, Cao Y (2011) An extended matrix encoding algorithm for steganography of high embedding efficiency. Comput Electr Eng 37:973–981CrossRef
Zurück zum Zitat Ghebleh M, Kanso A (2014) A robust chaotic algorithm for digital image steganography. Commun Nonlinear Sci Numer Simul 19:1898–1907CrossRef Ghebleh M, Kanso A (2014) A robust chaotic algorithm for digital image steganography. Commun Nonlinear Sci Numer Simul 19:1898–1907CrossRef
Zurück zum Zitat Ker AD (2007) A capacity result for batch steganography. IEEE Signal Process Lett 14:525–528CrossRef Ker AD (2007) A capacity result for batch steganography. IEEE Signal Process Lett 14:525–528CrossRef
Zurück zum Zitat Ker AD (2008) Perturbation hiding and the batch steganography problem. In: Proceedings of the 10th information hiding, vol 5284, pp 45–59 Ker AD (2008) Perturbation hiding and the batch steganography problem. In: Proceedings of the 10th information hiding, vol 5284, pp 45–59
Zurück zum Zitat Provos N, Honeyman P (2003) Hide and seek: an introduction to steganography. IEEE Secur Priv 1:32–44CrossRef Provos N, Honeyman P (2003) Hide and seek: an introduction to steganography. IEEE Secur Priv 1:32–44CrossRef
Zurück zum Zitat Strang G, Nguyen T (1996) Wavelet and filter banks. Cambridge Press, WesleyMATH Strang G, Nguyen T (1996) Wavelet and filter banks. Cambridge Press, WesleyMATH
Zurück zum Zitat Tang M et al (2014) A high capacity image steganography using multi-layer embedding. Optik Int J Light Electron Opt 125:3972–3976CrossRef Tang M et al (2014) A high capacity image steganography using multi-layer embedding. Optik Int J Light Electron Opt 125:3972–3976CrossRef
Zurück zum Zitat Valandar MY et al (2017) A new transform domain steganography based on modified logistic chaotic map for color images. J Inf Secur Appl 34:142–151 Valandar MY et al (2017) A new transform domain steganography based on modified logistic chaotic map for color images. J Inf Secur Appl 34:142–151
Zurück zum Zitat Walker JS (2008) A primer on wavelets and their scientific application. ISBN-978-1-58488-745-4 Walker JS (2008) A primer on wavelets and their scientific application. ISBN-978-1-58488-745-4
Zurück zum Zitat Westfeld A (2001) F5—a steganographic algorithm: high capacity despite better steganalysis. Lect Notes Comput Sci 2137:289–302CrossRef Westfeld A (2001) F5—a steganographic algorithm: high capacity despite better steganalysis. Lect Notes Comput Sci 2137:289–302CrossRef
Zurück zum Zitat Wu CC, Kao SJ, Hwang MS (2011) A high quality image sharing with steganography and adaptive authentication scheme. J Syst Softw 84:2196–2207CrossRef Wu CC, Kao SJ, Hwang MS (2011) A high quality image sharing with steganography and adaptive authentication scheme. J Syst Softw 84:2196–2207CrossRef
Zurück zum Zitat Zhang Y, Qin C, Zhang W, Liu F, Luo X (2018) On the fault-tolerant performance for a class of robust image steganography. Signal Process (Elsevier) 146:99–111CrossRef Zhang Y, Qin C, Zhang W, Liu F, Luo X (2018) On the fault-tolerant performance for a class of robust image steganography. Signal Process (Elsevier) 146:99–111CrossRef
Metadaten
Titel
Secured hand sacking based two phase data concealing architecture in spectral domain
verfasst von
Sujit Das
J. K. Mandal
Publikationsdatum
31.03.2018
Verlag
Springer Berlin Heidelberg
Erschienen in
Microsystem Technologies / Ausgabe 10/2020
Print ISSN: 0946-7076
Elektronische ISSN: 1432-1858
DOI
https://doi.org/10.1007/s00542-018-3843-0

Weitere Artikel der Ausgabe 10/2020

Microsystem Technologies 10/2020 Zur Ausgabe

Neuer Inhalt