Fused Distortion Measurement For Securing Rgb Steganography

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
  
© 2020 by IJETT Journal
Volume-68 Issue-3
Year of Publication : 2020
Authors : S.Jagadeesan, P.Jaisankar
DOI :  10.14445/22315381/IJETT-V68I3P211S

Citation 

MLA Style: S.Jagadeesan, P.Jaisankar "Fused Distortion Measurement For Securing Rgb Steganography" International Journal of Engineering Trends and Technology 68.3(2020):64-68.

APA Style:S.Jagadeesan, P.Jaisankar. Fused Distortion Measurement For Securing Rgb Steganography International Journal of Engineering Trends and Technology, 68(3),64-68.

Abstract
Binary image Steganographic strategies aim to generate stego pictures with sensible visual quality, whereas others focus more on the applied mathematics security of the anti-steganalysis. This paper proposes a binary steganographic theme that improves each of them by choosing additional applicable flipped pixels. First, a fused distortion activity is developed that mixes the advantages of flipping distortion activity (FDM) and 2 data-carrying picture element location strategies, together with the sting accommodative grid methodology (EAG) and therefore the “Connectivity Preserving” criterion (CPc). The FDM measures the distortion score by applied mathematics features and achieves high applied mathematics security, whereas the EAG and CPc choose pixels by analysing native texture structures supported visual quality. Then, to eliminate the interference brought by adjacent flipped pixels, a flipping position improvement strategy is proposed to seek out higher positions for flipping pixels to more improve the steganographic performance.

Reference

[1] Adrian Hernandez-Becerril, Mariko-Nakano-Miyatake, Marco Ramirez-Tachiquin, Hector Perez-Meana (2013), “A Parallel Implementation of Multiple Secrete Image Sharing Based on Cellular Automata with LSB Steganography”, 12th IEEE International Conference on Intelligent Software Methodologies, Tools and Techniques, pp. 25-26.
[2] S.Jagadeesan, “Steganography Using Genetic Algorithm Along with Visual Cryptography for Mobile Environment Applications”, CIIT Journal of Wireless Communications, Vol.7, No-9,pp-0974-9756,2015.
[3] Bingwen Feng, Wei Lu, Wei Sun (2013) “Secure Binary Image Steganography Based on Minimizing the Distortion on The Texture”, IEEE Transactions on Information Forensics and Security, pp.1-18.
[4] Christopher N. Gutierrez, Gautam Kakani, Ramesh C. Verma (2010), “Digital Watermarking of Medical Images for Mobile Devices”, IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, pp 56-58.
[5] Hossein Nezamabadi, Mohadeseh Soleimanpour,Malihe M. Farsangi, Maryam Mahyabadi (2012), “A more secure steganography method based on pair-wise LSB matching via a quantum gravitational search algorithm”, The 16th CSI International Symposium on Artificial Intelligence and Signal Processing, pp. 25-28.
[6] Pauline Puteaux and William Puech (2018) “An Efficient MSB Prediction-Based Method for High-Capacity Reversible Data Hiding in Encrypted Images”, IEEE Transactions on Information Forensics and Security, pp.5-7.
[7] Pooja Yadav, Nishchol Mishra, Sanjeev Sharma (2013) “A Secure Video Steganography with Encryption Based on LSB Technique”, International Conference on Computational Intelligence and Computing Research, 978- 1-4799-1597-2, pp. 25-29.
[8] Sharafat Hossain, Masud an Nur Islam Fahim (2017), “A Simple Way of Image Encryption Using Pixel Shuffling and Pixel Manipulation”, 20th International Conference of Computer and Information Technology (ICCIT), pp. 89-92.
[9] S. Thenmozhi, M. Chandrasekaran (2012), “Novel Approach for Image Stenography Based on Integer Wavelet Transform”, IEEE, pp.159-162.
[10] Volkan Kaya, Ersin Elbasi (2018) “Robust Medical Image Watermarking Using Frequency Domain and Least Significant Bits Algorithms”, IEEE, pp.125-128.
[11] Xiang Zhang, Fei Peng, and Min Long (2018) “Robust Coverless Image Steganography based on DCT and LDA Topic Classification”, IEEE Transactions on Multimedia, pp. 15-18.
[12] Yu-Chee Tseng, Yu-Yuan Chen, and Hsiang-Kuang Pan (2002), “A Secure Data Hiding Scheme for Binary Images”, IEEE Transactions on Communications, vol. 50, no. 8, pp. 22-25.
[13] https://en.wikipedia.org/wiki/Steganography

Keywords
steganography; cryptography time; MSE; cyptography; cryptography time; speedup; PSNR