Open Access   Article Go Back

High Security Text and Image Message for Steganography and Watermarking Through Modified Least Significant Bits Technique

Bhawna Ahirwar1 , Sanjay K. Sharma2

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-11 , Page no. 381-385, Nov-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i11.381385

Online published on Nov 30, 2018

Copyright © Bhawna Ahirwar, Sanjay K. Sharma . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Bhawna Ahirwar, Sanjay K. Sharma, “High Security Text and Image Message for Steganography and Watermarking Through Modified Least Significant Bits Technique,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.381-385, 2018.

MLA Style Citation: Bhawna Ahirwar, Sanjay K. Sharma "High Security Text and Image Message for Steganography and Watermarking Through Modified Least Significant Bits Technique." International Journal of Computer Sciences and Engineering 6.11 (2018): 381-385.

APA Style Citation: Bhawna Ahirwar, Sanjay K. Sharma, (2018). High Security Text and Image Message for Steganography and Watermarking Through Modified Least Significant Bits Technique. International Journal of Computer Sciences and Engineering, 6(11), 381-385.

BibTex Style Citation:
@article{Ahirwar_2018,
author = {Bhawna Ahirwar, Sanjay K. Sharma},
title = {High Security Text and Image Message for Steganography and Watermarking Through Modified Least Significant Bits Technique},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {11 2018},
volume = {6},
Issue = {11},
month = {11},
year = {2018},
issn = {2347-2693},
pages = {381-385},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3173},
doi = {https://doi.org/10.26438/ijcse/v6i11.381385}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i11.381385}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3173
TI - High Security Text and Image Message for Steganography and Watermarking Through Modified Least Significant Bits Technique
T2 - International Journal of Computer Sciences and Engineering
AU - Bhawna Ahirwar, Sanjay K. Sharma
PY - 2018
DA - 2018/11/30
PB - IJCSE, Indore, INDIA
SP - 381-385
IS - 11
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
618 441 downloads 239 downloads
  
  
           

Abstract

“Steganography” is a technique that thwarts unauthorized users to have access to the crucial data, to invisibility and payload capacity using the different technique like discrete cosine transform (DCT) and discrete shearlet transform (DST).The available methods till date result in good robustness but they are not independent of file format. The aim of this research work is to develop a independent of file format and secure hiding data scheme. The independent of file format and secure hiding data scheme is increased by combining DST and least significant bits (LSB) technique. Accordingly an efficient scheme is developed here that are having better MSE and PSNR against different characters.

Key-Words / Index Term

Discrete Shearlet Transform, SVD, PSNR, MSE

References

[1] Nazir A. Loan, Nasir N. Hurrah, Shabir A. Parah, Jong Weon Lee, Javaid A. Sheikh, and G. Mohiuddin Bhat, “Secure and Robust Digital Image Watermarking Using Coefficient Differencing and Chaotic Encryption”, Received January 4, 2018, accepted February 7, 2018, date of publication March 16, 2018, date of current version April 25, 2018.
[2] N. Senthil Kumaran, and S. Abinaya, “Comparison Analysis of Digital Image Watermarking using DWT and LSB Technique”, International Conference on Communication and Signal Processing, April 6-8, 2016, India.
[3] Aase, S.O., Husoy, J.H. and Waldemar, P. (2014) A Critique of SVD-Based Image Coding Systems, IEEE International Symposium on Circuits and Systems VLSI, Orlando, FL, Vol. 4, Pp. 13-16.
[4] Ahmed, F. and Moskowitz, I.S. (2014) Composite Signature Based Watermarking for Fingerprint Authentication, ACM Multimedia and Security Workshop, New York, Pp.1-8.
[5] Akhaee, M.A., Sahraeian, S.M.E. and Jin, C. (2013) Blind Image Watermarking Using a Sample Projection Approach, IEEE Transactions on Information Forensics and Security, Vol. 6, Issue 3, Pp.883-893.
[6] Ali, J.M.H. and Hassanien, A.E. (2012) An Iris Recognition System to Enhance E-security Environment Based on Wavelet Theory, Advanced Modeling and Optimization, Vol. 5, No. 2, Pp. 93-104.
[7] Al-Otum, H.M. and Samara, N.A. (2009) A robust blind color image watermarking based on wavelet-tree bit host difference selection, Signal Processing, Vol. 90, Issue 8, Pp. 2498-2512.
[8] Ateniese, G., Blundo, C., De Santis, A. and Stinson, D.R. (1996) Visual cryptography for general access structures, Information Computation, Vol. 129, Pp. 86-106.
[9] Baaziz, N., Zheng, D. and Wang, D. (2011) Image quality assessment based on multiple watermarking approach, IEEE 13th International Workshop on Multimedia Signal Processing (MMSP), Hangzhou, Pp.1-5.
[10] Bao, F., Deng, R., Deing, X. and Yang, Y. (2008) Private Query on Encrypted Data in Multi-User Settings, Proceedings of 4th International Conference on Information Security Practice and Experience (ISPEC 2008), Pp. 71-85, 2008.
[11] Barni, M. and Bartolini, F. (2004) Watermarking systems engineering: Enabling digital assets security and other application, Signal processing and communications series, Marcel Dekker Inc., New York.
[12] Barni, M., Bartolini, F. and Piva, A. (2001) Improved Wavelet based Watermarking Through Pixel-Wise Masking, IEEE Transactions on Image Processing, Vol. 10, Pp. 783-791.