Enhancing data transfer architecture using LSB steganography combined with reed solomon code

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    In this paper, new steganographic systems employing least significant bit technique and wavelet transform for embedding are proposed. These systems incorporate threshold level technique to enhance the performance of embedding scheme. Further, Forward error correcting code is used to improve the system performance. In the proposed system, the cover image is a gray image and the wavelet transform is applied directly. The secret image is coded using Reed Solomon code for preparing to embedding process. The locations of embedding are randomly selected according to pseudorandom number sequence. The combination between the ciphering process and steganography gives the system high level of security. This idea makes unauthorized retrieval is difficult. The simulation results show that the stego image is visually similar to the original one and does not have any suspension about embedded image. The extracted secret image is similar to the original secret image. The results indicate that using one-level Haar wavelet transform increases the capacity of the secret image that can be embedded. Hence, the steganographic goals are achieved in these systems. The proposed systems are simulated using MATLAB® software package.

     

     


  • Keywords


    Cryptography; Steganography; Reed Salomon code.

  • References


      [1] R. Gupta and T. P. Singh. New proposed practice for secure image combing cryptography stegnography and watermarking based on various parameters. Proceeding of the International Conference Contemporary Computing and Informatics, (2014), Nov. 27-29; United States

      [2] B. Mehboob and R. A. Faruqui. A stegnography implementation. International Symposium on Biometrics and Security Technologies, (2008) April 23-24; Islamabad, Pakistan

      [3] V. Ashok, T. Balakumaran, C. Gowrishankar, I. Vennila and A. N. kumar. The Fast Haar Wavelet Transform for Signal & Image Processing. International Journal of Computer Science and Information Security. 7, 1 (2010)

      [4] I. Márquez-corbella and J. Tillich. Using Reed-Solomon codes in the ( U | U + V ) construction and an application to cryptography. IEEE International Symposium on Information Theory, (2016) July 10-15; Barcelona, Spain

      [5] C. Lai and C. Tsai, Digital Image Watermarking Using Discrete Wavelet Transform and Singular Value Decomposition. IEEE Transactions on Instrumentation and Measurement. 59, 11 (2010)

      [6] MIT-DB, The MIT-BIH Arrhythmia database - third edition. Massachusetts institute of technology, United States (1997)

      [7] A. Nag, S. Biswas, D. Sarkar and P. P. Sarkar, A novel technique for image steganography based on Block-DCT and Huffman Encoding. International Journal of Computer Science and Information Technology. 2, 3 (2010)

      [8] S. K. Bandyopadhyay and I. K. Maitra, An Alternative Approach of Steganography using Reference Image. International Journal of Advancements in Technology. 1, 1 (2010)


 

View

Download

Article ID: 13119
 
DOI: 10.14419/ijet.v7i2.29.13119




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.