Author:
Rahman Shahid,Uddin Jamal,Hussain Hameed,Ahmed Aftab,Khan Ayaz Ali,Zakarya Muhammad,Rahman Afzal,Haleem Muhammad
Abstract
AbstractIn the recent couple of years, due to the accelerated popularity of the internet, various organizations such as government offices, military, private companies, etc. use different transferring methods for exchanging their information. The Internet has various benefits and some demerits, but the primary bad mark is security of information transmission over an unreliable network, and widely uses of images. So, Steganography is the state of the art of implanting a message in the cover objects, that nobody can suspect or identify it. Therefore, in the field of cover steganography, it is very critical to track down a mechanism for concealing data by utilizing different blends of compression strategies. Amplifying the payload limit, and robustness, and working on the visual quality are the vital factors of this research to make a reliable mechanism. Different cover steganography research strategies have been recommended, and each adores its benefits and impediments but there is a need to foster some better cover steganography implements to accomplish dependability between the essential model of cover steganography. To handle these issues, in this paper we proposed a method in view of Huffman code, Least Significant Bits (LSB) based cover steganography utilizing Multi-Level Encryption (MLE) and colorless part (HC-LSBIS-MLE-AC) of the picture. It also used different substitution and flicking concepts, MLE, Magic matrix, and achromatic concepts for proving the proficiency, and significance of the method. The algorithm was also statistically investigated based on some Statistical Assessment Metrics (SAM) such as Mean Square Error (MSE), Peak Signal Noise Ratio (PSNR), Normalized Cross Correlation (NCC), Structural Similarity Index Metric (SSIM), etc. and different perspectives. The observational outcomes show the likelihood of the proposed algorithm and the capacity to give unwavering quality between security, payload, perception, computation, and temper protection.
Publisher
Springer Science and Business Media LLC
Reference71 articles.
1. Nabi, S. T., Kumar, M., Singh, P., Aggarwal, N. & Kumar, K. A comprehensive survey of image and video forgery techniques: Variants, challenges, and future directions. Multimed. Syst. 28(3), 939–992. https://doi.org/10.1007/s00530-021-00873-8 (2022).
2. LakshmiSirisha, B. & ChandraMohan, B. Review on spatial domain image steganography techniques. J. Discret. Math. Sci. Cryptogr. 24(6), 1873–1883. https://doi.org/10.1080/09720529.2021.1962025 (2021).
3. Dhawan, S. & Gupta, R. Analysis of various data security techniques of steganography: a survey. Inf. Secur. J. 30(2), 63–87 (2021).
4. Bansal, K., Agrawal, A., & Bansal, N. (2020). A survey on steganography using least significant bit (lsb) embedding approach. in2020 4th International Conference on Trends in Electronics and Informatics (ICOEI) (48184), 64–69. https://doi.org/10.1080/19393555.2020.1801911.IEEE.
5. Sahu, A. K. & Swain, G. A review on LSB substitution and PVD based image steganography techniques. Indon. J. Electr. Eng. Comput. Sci. 2(3), 712–719 (2016).
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献