PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Achieving enhanced perceptual quality of stego-images for secure multimedia transmission

Wybrane pełne teksty z tego czasopisma
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
This paper discusses a new method of hiding ASCII characters into still cover image. It is based on finding match between the bit of the randomly selected image pixel and the data bits. Higher nibbles are used for data hiding at a position indicated in the lower nibble using a 2-bit code word. Simulation results on IEEE standard Lena image hiding 800 ASCII text characters are given. It is shown that the proposed technique achieves up to 44.7 dB PSNR as against minimum required value of 35 dB for acceptable perceptual quality along with the bounds of the change in the original pixel value in the range ۭ. Therefore the proposed method retains enhanced perceptual quality of the original cover image in spite of hiding large number of text characters and offers high robustness as compared to the LSB insertion technique [1, 2]. In addition it is less prone to attacks by eaves droppers and therefore it can be effectively used for secure multimedia transmissions.
Słowa kluczowe
Twórcy
autor
autor
autor
  • Department of Electronics Engineering, Institute of Technology, Banaras Hindu University, Varanasi-221005, India, harshvikram@gmail. com
Bibliografia
  • [1] R. Chandramouli, N Memon, Analysis of LSB Based Image Steganography Techniques, Proc. International Conf. of Image Processing, pp. 1019-1022, 2001.
  • [2] D. Artz, Digital Steganography: Hiding Data within Data, IEEE Internet Computing, Vol.5, pp. 75-80, 2001.
  • [3] Ross J. Anderson and Fabien A. P. Petitcolas, On the Limits of Steganography, IEEE Journal on Selected Areas in Communications, Vol. 16, pp. 474-481, 1998.
  • [4] N.F. Johnson and S. Jajodia, Exploring Steganography: Seeing the Unseen, Computer, Vol.31, pp. 26-34, 1998.
  • [5] W. Bender, D. Gruhl, N. Morimoto and A. Lu, Techniques for Data Hiding, IBM Systems Journals, Vol.35, NOS 3-4, pp. 313-336, 1996.
  • [6] M.M. Amin, M. Salleh, S. Ibrahim, M. R. Katmin, and M.Z.I. Shamsuddin, Information hiding using Steganography, Proc. 4th IEEE Conference on Telecommunication Technology, Shah Alam, Malaysia, pp. 21-25, 2003.
  • [7] Cox et al., A Secure, Robust Watermark for Multimedia, Lecture Notes in Computer Science Vol. 1, 174, Springer-Verlag, Berlin, pp. 185-206, 1996.
  • [8] F.A.P. Peticolas, R.J.Anderson and M.G.Kuhn, Inforamition Hiding- A survey, Proc. of IEEE, Vol. 87, Issue: 7, pp. 1062-1078, 1999.
  • [9] Harsh Vikram Singh, A. K. Singh, S.K. Balasubramanian and Anand Mohan, Minimizing Security Threats in Multimedia Systems, Proc. 2nd IEEE International Conf. on Distributed Framework for Multimedia Applications Penang, Malaysia, pp. 102-107, 2006.
  • [10] S. Venkatraman, A. Abraham, Significance of Steganography on Data Security, Proc. Information Technology: Coding and Computing, (ITCC 2004) Vol. 2, pp. 347 - 351, 2004.
  • [11] Giuseppe Mastronardi, Marcello Castellano, and Francescomaria Marino, Steganography Effects in Various Formats of Images A Preliminary Study, Proc. International workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2001.
  • [12] Hasien-Wen Tseng and Chin-Chen Chang, Steganography using Compressed Images, Proc. 4th IEEE International Conf. on Computer and Information Technology (CIT'04), pp. 12-17, 2004.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-article-BAT5-0017-0086
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.