A NOVEL ALGORITHM FOR INFORMATION HIDING

Mahimn Bhupendrabhai Pandya, Ashish N Jani

Abstract


This research paper introduces a novel algorithm can be applied either, in the area of digital watermarking and steganography, separately or together. This amalgamated algorithm, MP_2, is evolved for enhancement of secrecy level of a confidential message communication and imperceptibility of a watermark in the digital steganography and watermarking domain. The research work has employed matrix transformation technique to evolve embedment and encryption algorithm. This algorithm is classified in the reversible algorithm in the area of digital watermarking technique steganography.

Keywords


Steganography, Digital Watermarking, MP_2, Information Hiding, Secret Communication, Authentication, Watermark, Security.

Full Text:

PDF

References


VII. REFERENCES

C. Cruz, J. A. Mendoza, M. N. Miyatake, H. P. Meana, and B. Kurkoski, “Semi-fragile watermarking based image authentication with recovery capability,” Proc. - 2009 Int. Conf. Inf. Eng. Comput. Sci. ICIECS 2009, pp. 0–3, 2009.

A. Najafi, A. Siahkoohi, and M. B. Shamsollahi, A content-based digital image watermarking algorithm robust against JPEG compression. IEEE, 2011, pp. 432–437.

S. Alam, V. Kumar, W. a. Siddiqui, and M. Ahmad, “Key Dependent Image Steganography Using Edge Detection Shahzad,” 2014 Fourth Int. Conf. Adv. Comput. Commun. Technol. IEEE, pp. 85–88, 2014.

X. Li, Y. Chen, F. Wang, and T. Qinqin, “The Secret Image Sharing Scheme Based On Improved LSB Algorithm,” ICCCNT - 2014 IEEE, 2014.

K. Mahanta, D. J. Das, H. M. K. R. Bhuyan, A. Dutta, and M. Gogoi, “Design and implementation of an MSI number based image watermarking architecture in the transform domain,2014 IEEE,” Int. Conf. Signal Process. Integr. Networks Des. IEEE, pp. 157–163, 2014.

M. T. Mirza, Q. Ahmed, S. Munib, A. Khan, and R. K. Khalil, “A New Hybrid Domain Based Print-Scan Resilient Image Watermarking Technique,” Proc. - 12th Int. Conf. Front. Inf. Technol. FIT 2014 IEEE, pp. 170–175, 2014.

A. Noel and J. Raj, “Comparison of LSB Based and HS Based Reversible Data Hiding Techniques,” Devices, Circuits Syst. IEEE, no. 978–1–4799–1356–5/14, pp. 5–8, 2014.

N. Sruthi, A. V. Sheetal, and V. Elamaran, “Spatial and spectral digital watermarking with robustness evaluation,” 2014 Int. Conf. Comput. Power, Energy, Inf. Commun. ICCPEIC 2014 IEEE, pp. 500–505, 2014.

E. Dagar and S. Dagar, “LSB based image steganography using X-Box mapping,” Proc. 2014 Int. Conf. Adv. Comput. Commun. Informatics, ICACCI 2014, IEEE, pp. 351–355, 2014.

D. Rawat, M. Dc, V. Bhandari, and A. Professor, “A Steganography Technique for Hiding Image in an Image using LSB Method for 24 Bit Color Image,” Int. J. Comput. Appl., vol. 64, no. 20, pp. 975–8887, 2013.

A. Babu, “A Reversible Crypto-Watermarking System for Secure Medical Image Transmission,” 978-1-4673-6540-6/15 IEEE, pp. 1–6, 2015.

E. Bash, “A Lossless Data Hiding Method Based On Inverted LSB Technique,” Image Infonnation Process. A -IEEE, vol. 1, pp. 1–18, 2015.

S. Bhatt, A. Ray, A. Ghosh, and A. Ray, “Image steganography and visible watermarking using LSB extraction technique,” Proc. 2015 IEEE 9th Int. Conf. Intell. Syst. Control. ISCO 2015, 2015.

H. T. Chan, W. J. Hwang, and C. J. Cheng, “Digital hologram authentication using a Hadamard-based reversible fragile watermarking algorithm,” IEEE/OSA J. Disp. Technol., vol. 11, no. 2, pp. 193–203, 2015.

G. S. Charan, S. S. V Nithin Kumar, B. Karthikeyan, V. Vaithiyanathan, and K. Divya Lakshmi, “A novel LSB based image steganography with multi-level encryption,” International Conf. Innov. Information, Embed. Commun. Syst. , IEEE, pp. 1–5, 2015.

M. Pandya and A. Jani, “A Hybrid Approach for Secure Message Communication and Color Image Watermarking,” Elixir Int. J. Digit. Process., vol. 1, no. 114, p. 4, 2018.

A. Singh and H. Singh, “An improved LSB based image steganography technique for RGB images,” Proc. 2015 IEEE Int. Conf. Electr. Comput. Commun. Technol. ICECCT , IEEE, pp. 1–4, 2015.

K. W. K. Wu, W. Y. W. Yan, and J. D. J. Du, A Robust Dual Digital-Image Watermarking Technique. 2007.

Weisstein, Eric W. "Transpose." From MathWorld -- A Wolfram http://mathworld.wolfram.com/Transpose.html




DOI: https://doi.org/10.26483/ijarcs.v9i2.5489

Refbacks

  • There are currently no refbacks.




Copyright (c) 2018 International Journal of Advanced Research in Computer Science