A high-capacity Coverless Image Steganography Based on Rule based Machine Learning

Author:

KANZARIYA NITIN1,Jadhav Dhaval1

Affiliation:

1. Gujarat Technological University

Abstract

Abstract Securing private information during its transmission over the internet is of paramount importance, as it safeguards against unauthorized access and guarantees the integrity of data. Steganography serves as a technique for enhancing security by concealing sensitive information within digital content such as images, videos, audio, and textual carriers, thus thwarting unauthorized interception. Current methodologies involve manipulating pixels to create stego-images, effectively embedding confidential messages within the image structure. However, this approach has led to steganalysis experts uncovering these hidden messages. To address this issue, an innovative strategy for covert data concealment is proposed. This method involves integrating the secret message through the establishment of a cover file or secret message mapping. This approach ensures the confidentiality of sensitive data communicated over the internet. This research introduces a novel and highly-capable coverless image steganography technique utilizing RBML-based optical mark recognition. Notably, this approach surpasses previous alternatives in terms of embedding capacity, as substantiated by result analysis. Furthermore, it is adaptable for refinement as needed. Significantly, it exhibits remarkable resilience, safeguarding against a spectrum of attacks including scaling, color space conversion, JPEG compression, thresholding, "salt and pepper" noise, file format conversion, and steganalysis tools, among others.

Publisher

Research Square Platform LLC

Reference19 articles.

1. Kanzariya Nitin D, Jadhav G, Lakhani U, Chauchan (2022) and Lokesh Gagani. Coverless Information Hiding: A Review. In Proceedings of International Conference on Computational Intelligence: ICCI 2021, pp. 109–135. Singapore: Springer Nature Singapore,

2. Gagnani LP (2020) Multi Objective Association Rule Mining with Soft Computing Approach. In 2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184), pp. 968–971. IEEE,

3. Gagnani L (2020) and Kalpesh Wandra. Data Mining Task Optimization with Soft Computing Approach. In Proceedings of the Third International Conference on Computational Intelligence and Informatics: ICCII 2018, pp. 567–577. Springer Singapore,

4. Kanzariya Nitin K V Nimavat Ashish –Comparison of various images steganography techniques In 2013, International Journal of Computer Science

5. Kanzariya N, Nimavat A, Patel H (2013) Security of digital images using steganography techniques based on LSB, DCT and Huffman encoding. In Proceeding of international conference on advances in signal processing and communication-elsevier.

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3