SEGMENTATION BASED IMAGE STEGANOGRAPHY

PDF

Published: 2021-12-28

Page: 24-32


A. SIVA SAI KUMAR *

Departmentof ECE, Narayana Engineering College (JNTUA), Nellore, A.P, India.

J. SUNIL KUMAR

Departmentof ECE, Narayana Engineering College (JNTUA), Nellore, A.P, India.

K. PENCHALAIAH

Departmentof ECE, Narayana Engineering College (JNTUA), Nellore, A.P, India.

*Author to whom correspondence should be addressed.


Abstract

In recent years, the advancements in digital communications and information technology has become important for secured information transmission. For providing secured communication, steganography plays an important role. Different algorithms are utilized in steganography to conceal secret information in digital images. Imperceptibility is one of the major concerns in steganography. In the proposed method, segmentation and improved LSB algorithm has been used for embedding secret information in digital images. In order to maintain high imperceptibility in the proposed algorithm, the cover image is splited after which the secret data is embedded into any one of the segment of cover image by using a secret key.  The test results demonstrate that the stego image quality has been improved contrasted with other existing algorithms of data hiding. Various parameters like NCC, MSE and PSNR are determined to check the robustness of this method. Higher estimations of NCC and PSNR are obtained compared to existing methods.

Keywords: Digital image, imperceptibility, LSB algorithm, MSE, NCC, PSNR, steganography


How to Cite

KUMAR, A. S. S., KUMAR, J. S., & PENCHALAIAH, K. (2021). SEGMENTATION BASED IMAGE STEGANOGRAPHY. Asian Journal of Current Research, 6(4), 24–32. Retrieved from https://ikprress.org/index.php/AJOCR/article/view/7559

Downloads

Download data is not yet available.

References

Lalit Kumar Saini, Vishal Shrivastava. A survey of digital watermarking techniques and its applications. International Journal of Computer Science Trends and Technology. 2014;2(3).

Denslin Brabin DR, Jebamalar Tamilselvi J. Reversible data hiding: A survey. International Journal of Innovative Research in Computer and Communication Engineering. 2013;1(3).

Zhicheng Ni, Yun-Qing Shi, Nirwan Ansari, Wei Su. Reversible data hiding. IEEE Transactions On Circuits And Systems For Video Technology. 2006;16(3).

Shashikala Channalli, Ajay Jadhav. Steganography: An art of hiding data. International Journal on Computer Science and Engineering. 2009;1(3):137-141.

Manveer Kaur, Gagandeep Kaur. Review of various steganalysis techniques. International Journal of Computer Science and Information Technologies. 2014;5(2):1744-1747.

Jammi Ashok, Raju Y, Munishankaraiah S, Srinivas K. Steganography: An overview. International Journal of Engineering Science and Technology. 2010;2(10):5985-5992.

Kannan S, Vairaprakash Guruswamy G. Nalini. Review on image segmentation techinques.

Nida M. Zaitoun, Musbah J. Aqel. Survey on image segmentation techniques. Procedia Computer Science. 2015;65:797-806.

Praveen P, Rama B. A k-means clustering algorithm on numeric data. International Journal of Pure and Applied Mathematics. 2017;117(7):157-164.

Chih-Chiang Lee, Hsien-Chu Wu, Chwei-Shyong Tsai, Yen-Ping Chu. Adaptive lossless steganographic scheme with centralized difference expansion. Pattern Recognition. 2008;41(6):2097-2106.

Fahim Irfan Alam, et al. An investigation into encrypted message hiding through images using LSB. International Journal of Engineering Science and Technology (IJEST). 2011;3(2).

Jayasudha S. Integer wavelet transform based steganographic method using OPA algorithm. International Conference on Computing and Control Engineering (ICCCE); 2012.

Souvik Bhattacharyya, Gautam Sanyal. A robust image steganography using DWT difference modulation (DWTDM). I. J. Computer Network and Information Security. 2012;7:27-40.

Barnali Gupta Banik, Samir K. Bandyopadhyay. A DWT method for image steganography. International Journal of Advanced Research in Computer Science and Software Engineering. 2013;3(6).

Yambem Jina Chanu, Kh. Manglem Singh, Themrichon Tuithung. A robust steganographic method based on singular value decomposition. International Journal of Information & Computation Technology. 2014;4(7):717-726.