A High Capacity Gray Code Based Security Scheme for Non-Redundant Data Embedding

This paper proposes a double layer technique, used to improve the level of security by deploying both cryptography and steganography. The Blowfish algorithm was chosen for the cryptography layer, while an enhanced steganography technique was used for the steganography layer. Embedding is done accord...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:2020 International Conference on Innovative Trends in Communication and Computer Engineering (ITCE) s. 130 - 136
Hlavní autoři: Seif, Ahmed, Alexan, Wassim
Médium: Konferenční příspěvek
Jazyk:angličtina
Vydáno: IEEE 01.02.2020
Témata:
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Popis
Shrnutí:This paper proposes a double layer technique, used to improve the level of security by deploying both cryptography and steganography. The Blowfish algorithm was chosen for the cryptography layer, while an enhanced steganography technique was used for the steganography layer. Embedding is done according to a flag that avoids embedding a redundant bit by highlighting whether one or two bits are embedded per pixel, depending on the redundancy. If the bit to be embedded is similar to the already existing bit, the next bit is embedded in the 7th significant bit position and the flag is modified. The flag position varies depending on whether the pixel is odd or even and its values vary for each color plane. In the steganography layer, a Gray code sequence is used to scramble the order of the pixels in which data will be embedded. This is utilized to make it insurmountable for a third party to detect. 13 different performance measurements are computed and evaluated, to ensure that the image quality remains preserved. The proposed scheme is compared with its counterparts in the literature, in terms of mean square error (MSE), structure similarity index (SSIM), peak signal to noise ratio (PSNR), structural content (SC), maximum embedding capacity, extraction time and maximum Difference. Outstanding numerical results are achieved, showing superiority of the proposed schemes in terms of performance, capacity, and security.
DOI:10.1109/ITCE48509.2020.9047755