Affiliation:
1. UIET (University Institute of Engg. & Technology), Maharshi Dayanand University Rohtak, Haryana, India
Abstract
Background:
Steganography is the approach of camouflaging the covert object within
another cover object. This manuscript suggested a novel steganography approach to conceal the
covert data presence. The basic idea behind this is to generate an information-hiding approach that
increases the payload capacity and good PSNR value without sacrificing much distortion of the image.
Objectives:
To develop a novel data-hiding approach that increases imperceptibility, robustness, and
payload capacity.
Methods:
The Neighbour Mean Interpolation technique is used to scale up the original image to
generate Interpolated pixels of the given image. An even-odd scheme on the interpolated stego pixel
is used to camouflage the obscure code. MATLAB is used for the implementation of the new approach
and results calculation.
Results:
The Experimental analysis reveals that our suggested approach has a finer embedding capacity
for camouflaging the secret data as the original image of size (MxN) is scaled up to size (2M-
1 x2N-1) and also manages the good visuality of the cover or graven image. The proposed method is
compared with Jung and Yoo, and Selvrani's method. The result of this comparison shows that the
proposed method has finer imperceptibility than these two previously existing techniques.
Conclusion:
A novel approach towards image steganography using neighbor mean interpolation has
been proposed and implemented. A new steganography method is used for camouflaging the confidential
code into the cover object using NMI without producing any major differences in the input
image. The new approach provides better imperceptibility, robustness, and payload capacity.
Publisher
Bentham Science Publishers Ltd.
Subject
Electrical and Electronic Engineering,Electronic, Optical and Magnetic Materials
Reference36 articles.
1. Petitcolas F.A.P.; Anderson R.J.; Ross J.; Kuhn M.G.; Information hiding -A survey Proceedings of the IEEE (USA), special issue on protection of multimedia content 1999,87,1062-1078
2. Johnson N.F.; Jajodia S.; Exploring steganography: Seeing the unseen. Computer 1998,31(2),26-34
3. Wu H.C.; Wang H.C.; Wang C.M.; Tsai C-S.; Coloured visual cryptography using fixed size meaningful share. Int J Comput Math 2011,88(6),1239-1255
4. Desoky A.; Innocipher: A novel innocent-cipher-based cryptography paradigm-High level of security for fooling the enemy. Inf Secur J 2013,22,83-97
5. Provos N.; Honeyman P.; Hide and seek: an introduction to steganography. IEEE Secur Priv 2003,1(3),32-44