Enhancing the Security and Quality Image Steganography using Hiding Algorithm based on Minimizing the Distortion

α
V R Sasikumar
V R Sasikumar
σ
Capt. Dr S Santhosh Baboo
Capt. Dr S Santhosh Baboo
α Manonmaniam Sundaranar University

Send Message

To: Author

Enhancing the Security and Quality Image Steganography using Hiding Algorithm based on Minimizing the Distortion

Article Fingerprint

ReserarchID

CSTITL7Y4F

Enhancing the Security and Quality Image Steganography using Hiding Algorithm based on Minimizing the Distortion Banner

AI TAKEAWAY

Connecting with the Eternal Ground
  • English
  • Afrikaans
  • Albanian
  • Amharic
  • Arabic
  • Armenian
  • Azerbaijani
  • Basque
  • Belarusian
  • Bengali
  • Bosnian
  • Bulgarian
  • Catalan
  • Cebuano
  • Chichewa
  • Chinese (Simplified)
  • Chinese (Traditional)
  • Corsican
  • Croatian
  • Czech
  • Danish
  • Dutch
  • Esperanto
  • Estonian
  • Filipino
  • Finnish
  • French
  • Frisian
  • Galician
  • Georgian
  • German
  • Greek
  • Gujarati
  • Haitian Creole
  • Hausa
  • Hawaiian
  • Hebrew
  • Hindi
  • Hmong
  • Hungarian
  • Icelandic
  • Igbo
  • Indonesian
  • Irish
  • Italian
  • Japanese
  • Javanese
  • Kannada
  • Kazakh
  • Khmer
  • Korean
  • Kurdish (Kurmanji)
  • Kyrgyz
  • Lao
  • Latin
  • Latvian
  • Lithuanian
  • Luxembourgish
  • Macedonian
  • Malagasy
  • Malay
  • Malayalam
  • Maltese
  • Maori
  • Marathi
  • Mongolian
  • Myanmar (Burmese)
  • Nepali
  • Norwegian
  • Pashto
  • Persian
  • Polish
  • Portuguese
  • Punjabi
  • Romanian
  • Russian
  • Samoan
  • Scots Gaelic
  • Serbian
  • Sesotho
  • Shona
  • Sindhi
  • Sinhala
  • Slovak
  • Slovenian
  • Somali
  • Spanish
  • Sundanese
  • Swahili
  • Swedish
  • Tajik
  • Tamil
  • Telugu
  • Thai
  • Turkish
  • Ukrainian
  • Urdu
  • Uzbek
  • Vietnamese
  • Welsh
  • Xhosa
  • Yiddish
  • Yoruba
  • Zulu

Abstract

In this paper, highest state-of-the-art binary image Steganographic approach considers the spinning misinterpretation according to the personal visual structure, which will be not secure when they are attacked by Steganalyzers. In this paper, a binary image Steganographic scheme that aims to reduce the hiding misinterpretation on the balance is presented. We excerpt the complement, turn, and following-invariant local balance arrangement from the binary image first. The weighted sum of Complement, Turn, And Following-Invariant Local Balance changes when spinning one pixel is then employed to allot the spinning misinterpretation corresponding to that pixel. By examining on both simple binary images and the composed image constructed message set, we show that the advanced appraisal can well describe the misinterpretations on both visual aspect and statistics. Based on the proposed measurement, a practical Steganographic scheme is developed.

References

25 Cites in Article
  1. Qian Mei,Edward Wong,Nasir Memon (2001). <title>Data hiding in binary text documents</title>.
  2. Y.-C Tseng,Y.-Y Chen,H.-K Pan (2002). A secure message hiding scheme for binary images.
  3. M Wu,B Liu (2004). Message hiding in binary image for authentication and annotation.
  4. H Yang,A Kot (2007). Pattern-based message hiding for binary image authentication by connectivity-preserving.
  5. H Yang,A Kot,S Rahardja (2008). Orthogonal message hiding for binary images in morphological transform region-A high-capacity approach.
  6. M Guo,H Zhang (2010). High capacity message hiding for binary image authentication.
  7. Hong Cao,Alex Kot (2013). On Establishing Edge Adaptive Grid for Bilevel Image Data Hiding.
  8. T Filler,J Judas,J Fridrich (2011). Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes.
  9. T Pevný,T Filler,P Bas (2010). Using highdimensional image models to perform highly undetectable steganography.
  10. Vojtech Holub,Jessica Fridrich (2012). Designing steganographic distortion using directional filters.
  11. Fangjun Huang,Weiqi Luo,Jiwu Huang,Yun-Qing Shi (2013). Distortion function designing for JPEG steganography with uncompressed side-image.
  12. N Provos (2001). Defending against statistical steganalysis.
  13. P Sallee (2003). Model-based steganography.
  14. B Wang,X.-F Li,F Liu,F.-Q Hu (2005). Color text image binarization based on binary balance analysis.
  15. Di Huang,Caifeng Shan,Mohsen Ardabilian,Yunhong Wang,Liming Chen (2011). Local Binary Patterns and Its Application to Facial Image Analysis: A Survey.
  16. T Ojala,M Pietikainen,T Maenpaa (2002). Multiresolution gray-scale and rotation invariant texture classification with local binary patterns.
  17. Mihran Tuceryan,Anil Jain (1993). TEXTURE ANALYSIS.
  18. A Hadid,M Pietikainen,T Ahonen (2004). A discriminative feature space for detecting and recognizing faces.
  19. Yun Shi,Patchara Sutthiwan,Licong Chen (2013). Textural Features for Steganalysis.
  20. R Böhme (2005). Assessment of steganalytic approach using multiple regression models.
  21. H Lu,A Kot,Y Shi (2004). Distance-Reciprocal Distortion Measure for Binary Document Images.
  22. J Cheng,A Kot (2007). Objective misinterpretation allotment for binary text image based on edge line segment similarity.
  23. Huijuan Yang,Alex Kot (2006). Binary Image Authentication With Tampering Localization by Embedding Cryptographic Signature and Block Identifier.
  24. K Solanki,K Sullivan,U Madhow,B Manjunath,S Chandrasekaran (2006). Provably Secure Steganography: Achieving Zero K-L Divergence using Statistical Restoration.
  25. Jürgen Bierbrauer,Jessica Fridrich (2008). Constructing Good Covering Codes for Applications in Steganography.

Funding

No external funding was declared for this work.

Conflict of Interest

The authors declare no conflict of interest.

Ethical Approval

No ethics committee approval was required for this article type.

Data Availability

Not applicable for this article.

How to Cite This Article

V R Sasikumar. 2016. \u201cEnhancing the Security and Quality Image Steganography using Hiding Algorithm based on Minimizing the Distortion\u201d. Global Journal of Computer Science and Technology - H: Information & Technology GJCST-H Volume 15 (GJCST Volume 15 Issue H6): .

Download Citation

Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Keywords
Classification
H.2.8, I.3.3
Version of record

v1.2

Issue date

January 17, 2016

Language
en
Experiance in AR

Explore published articles in an immersive Augmented Reality environment. Our platform converts research papers into interactive 3D books, allowing readers to view and interact with content using AR and VR compatible devices.

Read in 3D

Your published article is automatically converted into a realistic 3D book. Flip through pages and read research papers in a more engaging and interactive format.

Article Matrices
Total Views: 7758
Total Downloads: 2083
2026 Trends
Related Research

Published Article

In this paper, highest state-of-the-art binary image Steganographic approach considers the spinning misinterpretation according to the personal visual structure, which will be not secure when they are attacked by Steganalyzers. In this paper, a binary image Steganographic scheme that aims to reduce the hiding misinterpretation on the balance is presented. We excerpt the complement, turn, and following-invariant local balance arrangement from the binary image first. The weighted sum of Complement, Turn, And Following-Invariant Local Balance changes when spinning one pixel is then employed to allot the spinning misinterpretation corresponding to that pixel. By examining on both simple binary images and the composed image constructed message set, we show that the advanced appraisal can well describe the misinterpretations on both visual aspect and statistics. Based on the proposed measurement, a practical Steganographic scheme is developed.

Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Enhancing the Security and Quality Image Steganography using Hiding Algorithm based on Minimizing the Distortion

V R Sasikumar
V R Sasikumar Manonmaniam Sundaranar University
Capt. Dr S Santhosh Baboo
Capt. Dr S Santhosh Baboo

Research Journals