A Grayscale Image Hiding Encode Scheme for Secure Transmission

Author(s): C. Narmatha*, P. Manimegalai, S. Manimurugan.

Journal Name: Current Signal Transduction Therapy

Volume 14 , Issue 2 , 2019

Become EABM
Become Reviewer

Graphical Abstract:


Abstract:

Background: To transmit the secret data are in a secure manner or to prevent the intruder/ third party activities while transmitting secret data’s through the public networks are challenging task now. In order to deal with these situations, this paper presents an encryption/encoding technique of MSI (Modified Steganography for Image) for secret data before transmitting over the network.

Methods: The MSI technique is classified into two phases, one is stegano image creation by encode process and another one is reconstructing the secret data from the stegano image by decode process. In encode process, the grayscale cover and secret images are considering as an input. In addition, segregation, 8-bit binary conversion, substitution and decimal conversion processes are doing a vital role in hiding the secret image into a cover image. The MSI encoded stegno image is almost equal to the cover image and it's not an easy to identify by the Human Visual Attack (HVA).

Results & Conclusion: To evaluate the proposed MSI encoding process the time, signal to noise ratio, complexity and strength are considering as the parameters. In result, the MSI encode technique is providing good reconstruction image quality, strong against the pixel attack and HVA, less execution time than the conventional schemes.

Keywords: Secret image, cover image, image hiding, pixel substitution, pixel conversion, electro encephalogram.

[1]
Karakış R, Güler I, Çapraz I, Bilir E. A novel fuzzy logic-based image steganography method to ensure medical data security. Comput Biol Med 2015; 67: 172-83.
[http://dx.doi.org/10.1016/j.compbiomed.2015.10.011] [PMID: 26555746]
[2]
Chen H, Du X, Liu Z, Yang C. Optical color image hiding scheme by using Gerchberg–Saxton algorithm in fractional Fourier domain. Opt Lasers Eng 2015; 66: 144-51.
[http://dx.doi.org/10.1016/j.optlaseng.2014.09.003]
[3]
Agrawal S, Kumar M. Mean value based reversible data hiding in encrypted images. Optik (Stuttg) 2017; 130: 922-34.
[http://dx.doi.org/10.1016/j.ijleo.2016.11.059]
[4]
Qin C, Chang C-C. Yen-Chang Chen. Efficient reversible data hiding for VQ-compressed images based on index mapping mechanism. Signal Processing 2013; 93: 2687-95.
[http://dx.doi.org/10.1016/j.sigpro.2013.03.036]
[5]
Jana B. High payload reversible data hiding scheme using weighted matrix. Optik (Stuttg) 2016; 127: 3347-58.
[http://dx.doi.org/10.1016/j.ijleo.2015.12.055]
[6]
Chang Y-F, Feng J-B, Tsai C-S, Chu Y-P, Syu HC. New data hiding scheme using pixel swapping for halftone images. Imaging Sci J 2008; 56: 279-90.
[http://dx.doi.org/10.1179/174313108X299525]
[7]
Chen K, Ramabadran TV. Near-lossless compression of medical images through entropy-coded DPCM. IEEE Trans Med Imaging 1994; 13(3): 538-48.
[http://dx.doi.org/10.1109/42.310885] [PMID: 18218529]
[8]
Chen TH, Tsao KH. Visual secret sharing by random grids revisited. Pattern Recognit 2009; 42: 2203-17.
[http://dx.doi.org/10.1016/j.patcog.2008.11.015]
[9]
Chun-ChengWang. Hong-ChingHou. Signed digit data hiding scheme. Inf Process Lett 2016; 116: 183-91.
[http://dx.doi.org/10.1016/j.ipl.2015.08.003]
[10]
Jung S-W. Adaptive post-filtering of JPEG compressed images considering compressed domain lossless data hiding. Inf Sci 2014; 281: 355-64.
[http://dx.doi.org/10.1016/j.ins.2014.05.035]
[11]
Liu Y, Qu X, Xin G. A ROI-based reversible data hiding scheme in encrypted medical images. J Vis Commun Image R 2016; 39: 51-7.
[http://dx.doi.org/10.1016/j.jvcir.2016.05.008]
[12]
Narmatha C, Manimegalai P, Manimurugan S. A Lossless Compression Scheme for Grayscale Medical Images Using a P2-Bit Short Technique. J Med Imaging Health Inform 2017; 7(6): 1196-204.
[http://dx.doi.org/10.1166/jmihi.2017.2212]
[13]
Narmatha C, Manimegalai P, Manimurugan S. The Secure Lossless Compression Scheme for Grayscale Medical Images Using PBT and Modified Steganography. J of Advanced Research in Dynamical and Control Systems 2017; 3: 96-103.
[14]
Saad Al-Mutairi S. Manimurugan. The clandestine image transmission scheme to prevent from the intruders. International J of Advanced and Applied Sciences 2017; 4(2): 52-60.
[http://dx.doi.org/10.21833/ijaas.2017.02.010]
[15]
Manimurugan S. Saad Al- Mutari. A Novel Secret Image Hiding Technique for Secure Transmission. J of Theoretical and Applied Information Technology 2017; 95(1): 166-76.
[16]
Saad Al-Mutairi S. Manimurugan. An Efficient Secret Image Transmission Scheme Using Dho-Encryption Technique. Int J Comput Sci Inf Secur 2016; 14(10): 446-60.
[17]
Manimurugan S, Narmatha C. Secure and Efficient Medical Image Transmission by New Tailored Visual Cryptography Scheme with LS Compressions. Int J Digit Crime Forensics 2015; 7(1): 26-50 [IJDCF].
[http://dx.doi.org/10.4018/IJDCF.2015010102]
[18]
Manimurugan SK. Porkumaran., C.Narmatha. The New Block Pixel Sort Algorithm for TVC Encrypted Medical Image. Imaging Sci J 2014; 62(8): 403-14.
[http://dx.doi.org/10.1179/1743131X14Y.0000000078]


Rights & PermissionsPrintExport Cite as

Article Details

VOLUME: 14
ISSUE: 2
Year: 2019
Page: [146 - 151]
Pages: 6
DOI: 10.2174/1574362413666180802124040

Article Metrics

PDF: 9
HTML: 4

Special-new-year-discount