A Competent Medical Image Steganography using Improved Optimization Algorithm with Huffman Encoding Techniques

Steganography is considered a reliable solution for avoiding third-party attacks. It is the process of embedding confidential information in another image. So that, they can be sent to the user's end with full security. When it comes to data privacy and authentication, steganography techniques...

Full description

Saved in:
Bibliographic Details
Published in:2023 7th International Conference on Computing Methodologies and Communication (ICCMC) pp. 1065 - 1073
Main Authors: Ramapriya, B., Kalpana, Y.
Format: Conference Proceeding
Language:English
Published: IEEE 23.02.2023
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract Steganography is considered a reliable solution for avoiding third-party attacks. It is the process of embedding confidential information in another image. So that, they can be sent to the user's end with full security. When it comes to data privacy and authentication, steganography techniques are essential. This proposed medical image steganography procedure by exploiting Dual Tree-Complex Wavelet Transform based transform and image encryption procedure were proposed in this proposed work. Then an improved SSOA optimization algorithm is engaged to detect smooth edge blocks. As a result, the selection of pixels for embedding is facilitated. Embedding the Secret data into the cover image is then done using a double matrix XOR encoding. After the embedding process, the stego image is produced. The Stego output image is further compressed with Huffman Coding which produces the stego Compressed image. The stego image is compressed for fast transmission of secret data via the wireless network. Thus, the proposed method shows the best results with high payz load capacity, security, and image quality than the existing methods. Testing was performed on PSNR, MSE, IF, and SSIM metrics to verify the performance of proposed methodologies.
AbstractList Steganography is considered a reliable solution for avoiding third-party attacks. It is the process of embedding confidential information in another image. So that, they can be sent to the user's end with full security. When it comes to data privacy and authentication, steganography techniques are essential. This proposed medical image steganography procedure by exploiting Dual Tree-Complex Wavelet Transform based transform and image encryption procedure were proposed in this proposed work. Then an improved SSOA optimization algorithm is engaged to detect smooth edge blocks. As a result, the selection of pixels for embedding is facilitated. Embedding the Secret data into the cover image is then done using a double matrix XOR encoding. After the embedding process, the stego image is produced. The Stego output image is further compressed with Huffman Coding which produces the stego Compressed image. The stego image is compressed for fast transmission of secret data via the wireless network. Thus, the proposed method shows the best results with high payz load capacity, security, and image quality than the existing methods. Testing was performed on PSNR, MSE, IF, and SSIM metrics to verify the performance of proposed methodologies.
Author Kalpana, Y.
Ramapriya, B.
Author_xml – sequence: 1
  givenname: B.
  surname: Ramapriya
  fullname: Ramapriya, B.
  email: ramapriya14sept@gmail.com
  organization: School of Computing Science,Department of Information Technology VISTAS,Chennai
– sequence: 2
  givenname: Y.
  surname: Kalpana
  fullname: Kalpana, Y.
  email: kalpana.scs@velsuniv.ac.in
  organization: School of Computing Science,Department of Information Technology VISTAS,Chennai
BookMark eNo1UEtOwzAUNBIsoPQGLHyBlOd8HHsZRYVGatUFZV258XNqqbZD6oDK6QkqbGZGms9iHsitDx4JoQwWjIF8bup6Uxe8gHKRQpotGIDIuBQ3ZC5LwTgvcp6D4PfEV7QOrseIPtINatuqE22c6pC-ReyUD92g-uOFjmfru8nph_CJmm77aJ39VtEGT6tTFwYbj45-TUhXozFOebr0bdC_rR22R28_Rjw_kjujTmec__GMvL8sd_UqWW9fm7paJ5YxGZODFiYXadoynhkp89K0aDQg05kC0PoARpdGqRxMKYtJTmEtWsSUQ8pQZTPydN21iLjvB-vUcNn_35D9ABb6Wss
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/ICCMC56507.2023.10083698
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 9781665464086
1665464089
EndPage 1073
ExternalDocumentID 10083698
Genre orig-research
GroupedDBID 6IE
6IL
CBEJK
RIE
RIL
ID FETCH-LOGICAL-i119t-bd8f4822c163f9947fcefd0e1d3a00ddb0fd7faa40f795d7f482d8cee26021ea3
IEDL.DBID RIE
IngestDate Thu Jan 18 11:14:30 EST 2024
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i119t-bd8f4822c163f9947fcefd0e1d3a00ddb0fd7faa40f795d7f482d8cee26021ea3
PageCount 9
ParticipantIDs ieee_primary_10083698
PublicationCentury 2000
PublicationDate 2023-Feb.-23
PublicationDateYYYYMMDD 2023-02-23
PublicationDate_xml – month: 02
  year: 2023
  text: 2023-Feb.-23
  day: 23
PublicationDecade 2020
PublicationTitle 2023 7th International Conference on Computing Methodologies and Communication (ICCMC)
PublicationTitleAbbrev ICCMC
PublicationYear 2023
Publisher IEEE
Publisher_xml – name: IEEE
Score 1.8233982
Snippet Steganography is considered a reliable solution for avoiding third-party attacks. It is the process of embedding confidential information in another image. So...
SourceID ieee
SourceType Publisher
StartPage 1065
SubjectTerms Compression
Double Matrix XOR encoding
DT-CWT (Dual Tree Complex Wavelet Transform)
Huffman Coding
Image coding
Medical Image Steganography
Particle swarm optimization
Reliability
Security
SSOA (Salp Swarm Optimization Algorithm)
Steganography
Wavelet transforms
Wireless networks
Title A Competent Medical Image Steganography using Improved Optimization Algorithm with Huffman Encoding Techniques
URI https://ieeexplore.ieee.org/document/10083698
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3PS8MwFA5uePCk4sTf5OC1W5q0TXMcZWMDnQOn7DbS5mUObCtd599vkrWKBw_eHiEQkkC-917e9z2E7qOUchqC8LgBdy8ISOpJoKmJWiNQjMYhd5JCrw98NouXSzFvyOqOCwMArvgM-tZ0f_mqzHY2VTawQjQsEnEHdTiP9mSttjqHiME0SR4T46AQ3rdNwfvt9F-NUxxujI__ueIJ6v0w8PD8G1tO0QEUZ6gY4qRxc2vc_LDgaW5eBPxcw1oWjfw0tsXsa7zPF4DCT-ZZyBu-JR6-r8tqU7_l2KZg8WSndS4LPCqy0i6FF62o67aHXsajRTLxmn4J3sb3Re2lKtaBAfzM-FhaiIDrDLQi4CsmCVEqJVpxLWVANBehMc1kFZudmJiG-iDZOeoWZQEXCAeZH2TaQJcmYBBLSQohME2ZNm6ujvgl6tnDWn3sJTFW7Tld_TF-jY7slTguOLtB3brawS06zD7rzba6cxf5BfcNotM
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1NTwIxEG0UTfSkRozf9uB1ofvZ7ZFsIBABSUTDjXS3UyRhuwYWf79t2dV48OCtado07SR90-m8Nwg9RqlHvRCYQzW4O0FAUoeDl-pXawTC9-KQWkmhtyEdj-PZjE0qsrrlwgCATT6Dlmnav3xRZFsTKmsbIRo_YvE-OjClsyq6Vp2fQ1h7kCSjRLsohLZMWfBWPeFX6RSLHL2Tf655ipo_HDw8-UaXM7QH6hypDk4qR7fE1R8LHuT6TsAvJSy4qgSosUlnX-BdxAAEftYXQ14xLnFntSjWy_I9xyYIi_tbKXOucFdlhVkKT2tZ100Tvfa606TvVBUTnKXrstJJRSwDDfmZ9rIkYwGVGUhBwBU-J0SIlEhBJecBkZSFuqkHi1jvRL9qPBe4f4EaqlBwiXCQuUEmNXhJAhqzBPcgBF96vtSOrozoFWqaw5p_7EQx5vU5Xf_R_4CO-tPRcD4cjJ9u0LExj2WG-7eoUa63cIcOs89yuVnfW6N-AZxUphw
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2023+7th+International+Conference+on+Computing+Methodologies+and+Communication+%28ICCMC%29&rft.atitle=A+Competent+Medical+Image+Steganography+using+Improved+Optimization+Algorithm+with+Huffman+Encoding+Techniques&rft.au=Ramapriya%2C+B.&rft.au=Kalpana%2C+Y.&rft.date=2023-02-23&rft.pub=IEEE&rft.spage=1065&rft.epage=1073&rft_id=info:doi/10.1109%2FICCMC56507.2023.10083698&rft.externalDocID=10083698