Abstract
Background: To transmit the secret data are in a secure manner or to prevent the intruder/ third party activities while transmitting secret data’s through the public networks are challenging task now. In order to deal with these situations, this paper presents an encryption/encoding technique of MSI (Modified Steganography for Image) for secret data before transmitting over the network.
Methods: The MSI technique is classified into two phases, one is stegano image creation by encode process and another one is reconstructing the secret data from the stegano image by decode process. In encode process, the grayscale cover and secret images are considering as an input. In addition, segregation, 8-bit binary conversion, substitution and decimal conversion processes are doing a vital role in hiding the secret image into a cover image. The MSI encoded stegno image is almost equal to the cover image and it's not an easy to identify by the Human Visual Attack (HVA).
Results & Conclusion: To evaluate the proposed MSI encoding process the time, signal to noise ratio, complexity and strength are considering as the parameters. In result, the MSI encode technique is providing good reconstruction image quality, strong against the pixel attack and HVA, less execution time than the conventional schemes.
Keywords: Secret image, cover image, image hiding, pixel substitution, pixel conversion, electro encephalogram.
Graphical Abstract
[http://dx.doi.org/10.1016/j.compbiomed.2015.10.011] [PMID: 26555746]
[http://dx.doi.org/10.1016/j.optlaseng.2014.09.003]
[http://dx.doi.org/10.1016/j.ijleo.2016.11.059]
[http://dx.doi.org/10.1016/j.sigpro.2013.03.036]
[http://dx.doi.org/10.1016/j.ijleo.2015.12.055]
[http://dx.doi.org/10.1179/174313108X299525]
[http://dx.doi.org/10.1109/42.310885] [PMID: 18218529]
[http://dx.doi.org/10.1016/j.patcog.2008.11.015]
[http://dx.doi.org/10.1016/j.ipl.2015.08.003]
[http://dx.doi.org/10.1016/j.ins.2014.05.035]
[http://dx.doi.org/10.1016/j.jvcir.2016.05.008]
[http://dx.doi.org/10.1166/jmihi.2017.2212]
[http://dx.doi.org/10.21833/ijaas.2017.02.010]
[http://dx.doi.org/10.4018/IJDCF.2015010102]
[http://dx.doi.org/10.1179/1743131X14Y.0000000078]