A Competent Medical Image Steganography using Improved Optimization Algorithm with Huffman Encoding Techniques
Steganography is considered a reliable solution for avoiding third-party attacks. It is the process of embedding confidential information in another image. So that, they can be sent to the user's end with full security. When it comes to data privacy and authentication, steganography techniques...
Saved in:
| Published in: | 2023 7th International Conference on Computing Methodologies and Communication (ICCMC) pp. 1065 - 1073 |
|---|---|
| Main Authors: | , |
| Format: | Conference Proceeding |
| Language: | English |
| Published: |
IEEE
23.02.2023
|
| Subjects: | |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Abstract | Steganography is considered a reliable solution for avoiding third-party attacks. It is the process of embedding confidential information in another image. So that, they can be sent to the user's end with full security. When it comes to data privacy and authentication, steganography techniques are essential. This proposed medical image steganography procedure by exploiting Dual Tree-Complex Wavelet Transform based transform and image encryption procedure were proposed in this proposed work. Then an improved SSOA optimization algorithm is engaged to detect smooth edge blocks. As a result, the selection of pixels for embedding is facilitated. Embedding the Secret data into the cover image is then done using a double matrix XOR encoding. After the embedding process, the stego image is produced. The Stego output image is further compressed with Huffman Coding which produces the stego Compressed image. The stego image is compressed for fast transmission of secret data via the wireless network. Thus, the proposed method shows the best results with high payz load capacity, security, and image quality than the existing methods. Testing was performed on PSNR, MSE, IF, and SSIM metrics to verify the performance of proposed methodologies. |
|---|---|
| AbstractList | Steganography is considered a reliable solution for avoiding third-party attacks. It is the process of embedding confidential information in another image. So that, they can be sent to the user's end with full security. When it comes to data privacy and authentication, steganography techniques are essential. This proposed medical image steganography procedure by exploiting Dual Tree-Complex Wavelet Transform based transform and image encryption procedure were proposed in this proposed work. Then an improved SSOA optimization algorithm is engaged to detect smooth edge blocks. As a result, the selection of pixels for embedding is facilitated. Embedding the Secret data into the cover image is then done using a double matrix XOR encoding. After the embedding process, the stego image is produced. The Stego output image is further compressed with Huffman Coding which produces the stego Compressed image. The stego image is compressed for fast transmission of secret data via the wireless network. Thus, the proposed method shows the best results with high payz load capacity, security, and image quality than the existing methods. Testing was performed on PSNR, MSE, IF, and SSIM metrics to verify the performance of proposed methodologies. |
| Author | Kalpana, Y. Ramapriya, B. |
| Author_xml | – sequence: 1 givenname: B. surname: Ramapriya fullname: Ramapriya, B. email: ramapriya14sept@gmail.com organization: School of Computing Science,Department of Information Technology VISTAS,Chennai – sequence: 2 givenname: Y. surname: Kalpana fullname: Kalpana, Y. email: kalpana.scs@velsuniv.ac.in organization: School of Computing Science,Department of Information Technology VISTAS,Chennai |
| BookMark | eNo1UEtOwzAUNBIsoPQGLHyBlOd8HHsZRYVGatUFZV258XNqqbZD6oDK6QkqbGZGms9iHsitDx4JoQwWjIF8bup6Uxe8gHKRQpotGIDIuBQ3ZC5LwTgvcp6D4PfEV7QOrseIPtINatuqE22c6pC-ReyUD92g-uOFjmfru8nph_CJmm77aJ39VtEGT6tTFwYbj45-TUhXozFOebr0bdC_rR22R28_Rjw_kjujTmec__GMvL8sd_UqWW9fm7paJ5YxGZODFiYXadoynhkp89K0aDQg05kC0PoARpdGqRxMKYtJTmEtWsSUQ8pQZTPydN21iLjvB-vUcNn_35D9ABb6Wss |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IL CBEJK RIE RIL |
| DOI | 10.1109/ICCMC56507.2023.10083698 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| EISBN | 9781665464086 1665464089 |
| EndPage | 1073 |
| ExternalDocumentID | 10083698 |
| Genre | orig-research |
| GroupedDBID | 6IE 6IL CBEJK RIE RIL |
| ID | FETCH-LOGICAL-i119t-bd8f4822c163f9947fcefd0e1d3a00ddb0fd7faa40f795d7f482d8cee26021ea3 |
| IEDL.DBID | RIE |
| IngestDate | Thu Jan 18 11:14:30 EST 2024 |
| IsPeerReviewed | false |
| IsScholarly | false |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-i119t-bd8f4822c163f9947fcefd0e1d3a00ddb0fd7faa40f795d7f482d8cee26021ea3 |
| PageCount | 9 |
| ParticipantIDs | ieee_primary_10083698 |
| PublicationCentury | 2000 |
| PublicationDate | 2023-Feb.-23 |
| PublicationDateYYYYMMDD | 2023-02-23 |
| PublicationDate_xml | – month: 02 year: 2023 text: 2023-Feb.-23 day: 23 |
| PublicationDecade | 2020 |
| PublicationTitle | 2023 7th International Conference on Computing Methodologies and Communication (ICCMC) |
| PublicationTitleAbbrev | ICCMC |
| PublicationYear | 2023 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| Score | 1.8233982 |
| Snippet | Steganography is considered a reliable solution for avoiding third-party attacks. It is the process of embedding confidential information in another image. So... |
| SourceID | ieee |
| SourceType | Publisher |
| StartPage | 1065 |
| SubjectTerms | Compression Double Matrix XOR encoding DT-CWT (Dual Tree Complex Wavelet Transform) Huffman Coding Image coding Medical Image Steganography Particle swarm optimization Reliability Security SSOA (Salp Swarm Optimization Algorithm) Steganography Wavelet transforms Wireless networks |
| Title | A Competent Medical Image Steganography using Improved Optimization Algorithm with Huffman Encoding Techniques |
| URI | https://ieeexplore.ieee.org/document/10083698 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3PS8MwFA5uePCk4sTf5OC1W5q0TXMcZWMDnQOn7DbS5mUObCtd599vkrWKBw_eHiEQkkC-917e9z2E7qOUchqC8LgBdy8ISOpJoKmJWiNQjMYhd5JCrw98NouXSzFvyOqOCwMArvgM-tZ0f_mqzHY2VTawQjQsEnEHdTiP9mSttjqHiME0SR4T46AQ3rdNwfvt9F-NUxxujI__ueIJ6v0w8PD8G1tO0QEUZ6gY4qRxc2vc_LDgaW5eBPxcw1oWjfw0tsXsa7zPF4DCT-ZZyBu-JR6-r8tqU7_l2KZg8WSndS4LPCqy0i6FF62o67aHXsajRTLxmn4J3sb3Re2lKtaBAfzM-FhaiIDrDLQi4CsmCVEqJVpxLWVANBehMc1kFZudmJiG-iDZOeoWZQEXCAeZH2TaQJcmYBBLSQohME2ZNm6ujvgl6tnDWn3sJTFW7Tld_TF-jY7slTguOLtB3brawS06zD7rzba6cxf5BfcNotM |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1NTwIxEG0UTfSkRozf9uB1ofvZ7ZFsIBABSUTDjXS3UyRhuwYWf79t2dV48OCtado07SR90-m8Nwg9RqlHvRCYQzW4O0FAUoeDl-pXawTC9-KQWkmhtyEdj-PZjE0qsrrlwgCATT6Dlmnav3xRZFsTKmsbIRo_YvE-OjClsyq6Vp2fQ1h7kCSjRLsohLZMWfBWPeFX6RSLHL2Tf655ipo_HDw8-UaXM7QH6hypDk4qR7fE1R8LHuT6TsAvJSy4qgSosUlnX-BdxAAEftYXQ14xLnFntSjWy_I9xyYIi_tbKXOucFdlhVkKT2tZ100Tvfa606TvVBUTnKXrstJJRSwDDfmZ9rIkYwGVGUhBwBU-J0SIlEhBJecBkZSFuqkHi1jvRL9qPBe4f4EaqlBwiXCQuUEmNXhJAhqzBPcgBF96vtSOrozoFWqaw5p_7EQx5vU5Xf_R_4CO-tPRcD4cjJ9u0LExj2WG-7eoUa63cIcOs89yuVnfW6N-AZxUphw |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2023+7th+International+Conference+on+Computing+Methodologies+and+Communication+%28ICCMC%29&rft.atitle=A+Competent+Medical+Image+Steganography+using+Improved+Optimization+Algorithm+with+Huffman+Encoding+Techniques&rft.au=Ramapriya%2C+B.&rft.au=Kalpana%2C+Y.&rft.date=2023-02-23&rft.pub=IEEE&rft.spage=1065&rft.epage=1073&rft_id=info:doi/10.1109%2FICCMC56507.2023.10083698&rft.externalDocID=10083698 |