Generic placeholder image

Recent Advances in Electrical & Electronic Engineering

Editor-in-Chief

ISSN (Print): 2352-0965
ISSN (Online): 2352-0973

Research Article

Matrix Inverse-based Highly Payload Novel Approach for Covert Transmission

Author(s): Ravi Saini*, Kamaldeep Joshi, Rainu Nandal, Rajkumar Yadav and Deepika Kumari

Volume 16, Issue 8, 2023

Published on: 08 June, 2023

Page: [836 - 850] Pages: 15

DOI: 10.2174/2352096516666230502145422

Price: $65

Abstract

Background: The necessity for data security is demanding in the digital age. The main technique for achieving data security is Steganography. The technique of camouflaging the secret object behind another cover object is known as Steganography. A novel, robust, high payload, and imperceptible image steganography approach using matrix inverse in the spatial domain are proposed in this manuscript. The basic idea is to devise a robust novel approach against various image processing attacks, like cropping, compression, filters, and noise.

Objectives: The study's objective is to develop a novel data-hiding approach that increases imperceptibility and payload capacity and is robust against various image processing attacks, like filters, compression, cropping, and noise.

Methods: The matrix inverse procedure is used for the insertion and extraction of data. The symmetry feature of the matrix inverse makes the task of insertion of data simple and efficient. It also increases the hiding capacity while maintaining a finer level of imperceptibility and robustness. MATLAB is used for the implementation of the new technique and results analysis.

Results: The proposed method's robustness has been analyzed against image processing assaults such as the inclusion of various noises, cropping, a variety of filters, and compression assaults. The imperceptibility of the approach has been tested successfully using PSNR, BER, and NCC metrics. The proposed method has been compared with the other two techniques. The experimental and comparison results depict that the proposed approach provides high hiding capacity, finer robustness, and imperceptibility.

Conclusion: A novel, robust and imperceptible approach has been developed in this manuscript. The proposed method has been compared with the methods developed by Jung & Yoo and Joshi & Gill. The experimental findings show that the proposed technique offers better resilience, payload capacity, and finer imperceptibility.

Graphical Abstract

[1]
J. Silman, Steganography and Steganalysis: An Overview., SANS Institute: Bethesda, MD, USA, 2001.
[2]
T. Jamil, "Steganography: The art of hiding information is plain sight", IEEE Proceedings, vol. 18, no. 1, pp. 10-12, 1999.
[3]
A. Kumar, "Steganography: A data hiding technique", Int. J. Comput. Appl., vol. 9, no. 7, pp. 19-23, 2010.
[4]
N.F. Johnson, Z. Duric, and S. Jajodia, Information hiding: Steganography and watermarking attacks and countermeasures., Norwell, MA: Kluwer, 2001, p. 20.
[http://dx.doi.org/10.1007/978-1-4615-4375-6]
[5]
R. Poornima, and R.J. Iswarya, "An overview of digital image steganography", Int. J.Comput. Sci. Engin. Survey., vol. 4, no. 1, pp. 23-31, 2013.
[http://dx.doi.org/10.5121/ijcses.2013.4102]
[6]
M. Garg, and A.P. Jangra, "An overview of different types of data hiding scheme in image using steganographic techniques", Int. J. Adv. Res. Comput. Sci. Softw. Eng., vol. 4, no. 1, pp. 78-89, 2014.
[7]
N. Johnson, and S. Jajodia, "Exploring steganography: Seeing the unseen", Computer, vol. 31, no. 2, pp. 26-34, 1998.
[http://dx.doi.org/10.1109/MC.1998.4655281]
[8]
S. Gupta, J. Gujral, and N. Aggarwal, "Enhanced least significant bit algorithm for image steganography", Int. J. Computat. Engine. Management, vol. 15, no. 4, pp. 2230-2243, 2012.
[9]
S.A. Kayode, and O. Ayotunde, "Efficient data hiding system using cryptography and steganography", Int. J. Appl. Inf. Syst. (IJAIS), vol. 4, pp. 6-11, 2012.
[10]
K.H. Jung, and K.Y. Yoo, "Steganographic method based on interpolation and LSB substitution of digital images", Multimedia Tools Appl., vol. 74, pp. 2143-2155, 2014.
[11]
J. Tian, "Reversible data embedding using a difference expansion", IEEE Trans. Circ. Syst. Video Tech., vol. 13, no. 8, pp. 890-896, 2003.
[http://dx.doi.org/10.1109/TCSVT.2003.815962]
[12]
Z. Ni, Y. Shi, N. Ansari, and W. Su, "Reversible data hiding", IEEE Trans. Circ. Syst. Video Tech., vol. 16, no. 3, pp. 354-362, 2006.
[http://dx.doi.org/10.1109/TCSVT.2006.869964]
[13]
V. Sachnev, S. Jeho Nam, S. Suresh, and Y.Q. Shi, "Reversible watermarking algorithm using sorting and prediction”", IEEE Trans. Circ. Syst. Video Tech., vol. 19, no. 7, pp. 989-999, 2009.
[http://dx.doi.org/10.1109/TCSVT.2009.2020257]
[14]
K.S. Kim, M.J. Lee, and H.Y. Lee, "Reversible data hiding exploiting the spatial correlation between subsampled images", Pattern Recognit., vol. 42, no. 11, pp. 3083-3096, 2009.
[15]
W. Hong, and T.S. Chen, "A local variance-controlled reversible data hiding method using prediction and histogram-shifting", J. Syst. Softw., vol. 83, no. 12, pp. 2653-2663, 2010.
[http://dx.doi.org/10.1016/j.jss.2010.08.047]
[16]
H. Luo, F.X. Yu, H. Chen, Z.L. Huang, H. Li, and P.H. Wang, "Reversible data hiding based on block median preservation", Inf. Sci., vol. 181, no. 2, pp. 308-328, 2011.
[http://dx.doi.org/10.1016/j.ins.2010.09.022]
[17]
K. Joshi, and R. Yadav, "CA new LSB-S image steganography method blend with cryptography for secret communication", In Third International Conference on Image Information Processing (ICIIP), Waknaghat, India, 2015, pp. 86-90
[18]
K. Joshi, P. Dhankhar, and R. Yadav, "A new image steganography method in spatial domain using XOR", In 2015 Annual IEEE India Conference (INDICON), New Delhi, India, 2015, pp. 1-6
[http://dx.doi.org/10.1109/INDICON.2015.7443400]
[19]
K. Joshi, and R. Yadav, "New approach toward data hiding using XOR for image steganography", In 2016 Ninth International Conference on Contemporary Computing (IC3), Noida, India, 2016, pp. 1-6
[http://dx.doi.org/10.1109/IC3.2016.7880204]
[20]
K. Joshi, S. Gill, and R. Yadav, "A new method of image steganography using 7th bit of a pixel as indicator by introducing the successive temporary pixel in the gray scale image", J. Comput. Netw. Commun., vol. 2018, p. 9475142, 2018.
[21]
L. Liu, T. Chen, S. Zhu, W. Hong, and X. Si, "A reversible data hiding method using improved neighbour mean interpolation and random-block division", Inf. Technol. J., vol. 13, no. 15, pp. 2374-2384, 2014.
[http://dx.doi.org/10.3923/itj.2014.2374.2384]
[22]
K. Joshi, R. Yadav, and S. Allwadhi, "PSNR and MSE based investigation of LSB", In 2016 International Conference on Computational Techniques in Information and Communication Technologies (ICCTICT), New Delhi, India, 2016, pp. 280-285
[http://dx.doi.org/10.1109/ICCTICT.2016.7514593]
[23]
S. Rahman, J. Uddin, H.U. Khan, H. Hussain, A.A. Khan, and M. Zakarya, "A novel steganography technique for digital images using the least significant bit substitution method", IEEE Access, vol. 10, pp. 124053-124075, 2022.
[http://dx.doi.org/10.1109/ACCESS.2022.3224745]
[24]
R. Sonar, and G. Swain, "A hybrid steganography technique based on RR, AQVD, and QVC", Information security journal : A global perspective., vol. 31, pp. 479-498, 2022.
[25]
N.I.R. Yassin, and E.M.F. El Houby, "Image steganography technique based on integer wavelet transform using most significant bit categories", Int. J. Intelligent Eng. Syst., vol. 15, pp. 499-508, 2022.

Rights & Permissions Print Cite
© 2024 Bentham Science Publishers | Privacy Policy