Survey on Reversible Texture Synthesis Techniques

  • Authors

    • Ruth Ramya.K
    • Karthik. M
    • Yamini Priyanka.M
    • Vinutna BH
    2018-05-31
    https://doi.org/10.14419/ijet.v7i2.32.15698
  • ASCII Integer, Cover Image, FiboSum, Pixel Mapping, Stego-image.
  • Encryption is the technique by which we can encode the expected snippet of In Advanced Image Steganography the message is covered up in a picture such that the spectators can't figure that it is not an ordinary picture. These days security is an essential issue while transmitting a message. To start with we have scrambled the message to a picture which needs a secret key to be unscrambled. At that point we have shrouded that picture inside another picture by steganography approach. By this two level concealing we can guarantee more grounded security. We propose a novel approach for steganography using a reversible surface union. A surface union process resample's a more diminutive surface picture, which joins another surface picture with an equivalent close-by appearance and a subjective size. We work the surface union process into steganography to cover puzzle messages. Instead of using a present cover picture to cover messages, our figuring covers the source surface picture and embeds riddle messages through the method of surface mix. This empowers us to isolate the puzzle messages and source surface from a stego designed surface. Our approach offers three specific positive conditions. To begin with, our arrangement offers the embedding’s furthest reaches that is in respect to the measure of the stego surface picture. Second, a steganalytic figuring isn't presumably going to vanquish our steganographic approach. Third, the reversible limit gained from our arrangement gives convenience, which grants recovery of the source surface. Trial comes to fruition have affirmed that our proposed estimation can give distinctive amounts of embedding’s limits, make an apparently possible surface pictures, and recover the source surface.

     

     

     

  • References

    1. [1] Nadeem Akhtar, Pragti Johri, Shabaaz Khan, “Enhancing the Security and Quality of LSB based Image Steganographyâ€, IEEE International Conference on Computer Intelligence and Computer Networks (CICN), pp.385-389, 2013.

      [2] Jasril, Ismail Marzuki, Faisal Rahmat “Capacity enhancement of messages concealment in image and audio steganography†Interna-tional journal on smart sensing and intelligent system vol. 6, no. 5, December 2013.

      [3] Wu, C., Tsai, W.H., A Steganographic method for images by pixel-value differencing, Pattern Recognition Letters, vol.24, pp.1613-1626, 2003.

      [4] Wang, R. Z. and Chen, Y. S., High-payload image Steganogra-phy using two-way block matching, IEEE Signal Processing Letters, vol.13, no.3, pp.161-164, 2006.

      [5] MamtaJuneja and Parvinder Singh Sandhu, (2013) “A New Approach for Information security using an Improved Steganogra-phy Techniqueâ€, Journal of Info.Pro.Systems, Vol 9, No:3, pp.405-424.

      [6] P.Thiyagarajan, V.Natarajan, G.Aghila, V.PrannaVenkatesan, R.Anitha, (2013) “Pattern Based 3D Image Steganographyâ€, 3D Research center, Kwangwoon University and Springer 2013, 3DR Express., pp.1-8.

      [7] Shamim Ahmed Laskar and KattamanchiHemachandran, (2013) “Steganography Based On Random Pixel Selection For Efficient Data Hidingâ€, International Journal of Computer Engineering and Technology, Vol.4, Issue 2, pp.31-44.

      [8] FahimIrfanet. Al. ‘s (2011) “An Investigation into Encrypted Message Hiding through Images Using LSB â€, International Jour-nal of EST,

      [9] WeiqiLuo, Member, IEEE, Fangjun Huang, Member, IEEE, and Jiwu Huang, Senior Member, IEEE, (2010) “Edge Adaptive Image Steganography Based on LSB Matching Revisitedâ€, IEEE Transac-tions on Information Forensics and Security, Vol.5.No.2, pp.201-214.

      [10] Sreeparnachakrabati, DebabrataSamanta, “A Novel Approach to Digital Image Steganography of Key-Based Encrypted Text†Dec 2014.

      [11] Birgit P tzmann, Information hiding terminology-results of an informal plenary meeting and additional proposals, Proc. Of the First International Workshop on Information Hiding, vol. 1174, pp. 347-350.Springer, 1996.

      [12] Saikat Mondal, Rameswar Debnath, Borun Kumar Mondal “An Improved Colour Image Steganography Technique in Spatial Domain†9th International Conference on Electrical and Computer Engineering, pp.20-22,2016.

      [13] Shohana, M. and Manikandan, R., Efficient method for data hiding by pixel intensity, International Journal of Engineering and Technology (IJET), vol 5 no 1 Feb-Mar 2013.

      [14] Kaur, B., Kaur, A., Singh, J., Steganographic approach for hiding Image in DCT domain, International Journal of Advances in Engineering & Technology, July 2011.

      [15] Kumar, V. and Kumar, D., Performance evaluation of DWT based image steganography, Advance computing conference (IACC), IEEE 2nd International, 2010.

      [16] H.Wang,†cyber warfare: Steganography vs steganalysisâ€, communication of the ACM, vol 47, no.10, 2004.

      [17] Lin, E.T. and Delp, E.J.: A Review of Data Hiding in Digital Images. Retrieved on 1.Dec.2006 from Computer Forensics, Cy-bercrime and Steganography Resources, Digital Watermarking Links and Whitepapers, Apr 1999.

      [18] E.J.Candes,M.B.Wakin, “An Introduction to Compressive Sampling,†IEEE Signal Processing Magazine, 2008.

      [19] Zhang, T., Li, W., Zhang, Y. and Ping, X.; “Detection of LSB Matching Steganography Based on Distribution of Pixel Difference in Natural Imagesâ€. International Conference on Image Analysis and Signal Processing (IASP), Pp.629-632, 2010.

      [20] AsishAich, AloSen, SatyaRanjan Dash and SatchidanandaDehuri, “Deoxyribonucleic Acid (DNA) for a Shared Secret Key Cryptosystem with Diffie Hellman Key sharing techniqueâ€,IEEE,2015.

      [21] Najan, K., Raghava, P., Sawant, A., &Madchane, S. (2016). Image Steganography, Compression and Image Morphing for Banking Website.International Journal for Innovative Research in Science and Technology, 2(10), 56-58.

      [22] T. Gautam,A. Jain,“Analysis of Brute Force Attack using TG – Dataset†in SAI Intelligent Systems Conference, London, UK, Nov.2015, pp. 984-988.

      [23] S. Katzenbeisser and F. Petitcolas, Informa-tion Hiding Tech-niques for Steganography and Digital Watermarking, Artech House, 2000.

      [24] G.Sahoo& Rajesh Kumar Tiwari (2009) “Hiding Secret Infor-mation in Movie Clip: A Steganographic Approachâ€, International Journal of Computing and Applications, Vol. 4, No.1, pp 103-110.

      [25] C.-H. Yang and M.-H. Tsai, (2010) “Improving Histogram-based Reversible Data Hiding by Interleaving Predictionsâ€, IET Image Processing, Vol.4. Iss.4 pp. 223-234.

      [26] Hemalatha.S, U.DineshAcharya and Renuka.A, (2013) “Com-parison of Secure and High Capacity Color Image Steganography Techniques in RGB and YCBCR domainsâ€, International Journal of Advanced Information Technology, Vol.3, No.3, pp.1-9.

      [27] Hemalatha.S, U.DineshAcharya and Renuka.A, Pri-ya.RKamnath, (2013) “A Secure and High Capacity Image Ste-ganography Techniqueâ€, Signal & Image Processing – An Interna-tional Journal, Vol.4, No.1, pp.83-89.

      [28] J. Tian, “Reversible data embedding using a difference expan-sion, â€IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 8, pp. 890–896,2003.

      [29] C.E. Shannon “A mathematical theory of communication†Bell System Technical Journal. Vol. 27(3).pp. 379- 423.1948.

      [30] B. Dzaja, N. Antisic and M. Bonkovic, Local colour statistics for edge definition, IEEE Symposium on Computers and Communications (ISCC),vol.00,pp.0,2013,doi:10.1109/ISCC.2013.6755054.

      [31] A Abbas Cheddad, Joan Condell, Kevin Curran, Paul McKevitt, Digital image steganography: Survey and analysis of current methods, Signal Processing, Volume 90, Issue3,March 2010, Pages 727-752

      [32] M. Ramachandran and V. Chang “Towards performance evaluation of cloud service providers for cloud data security,†International Journal of Information Management, Vol. 36, Issue 4, pp. 618-625, August2016

  • Downloads

  • How to Cite

    Ramya.K, R., M, K., Priyanka.M, Y., & BH, V. (2018). Survey on Reversible Texture Synthesis Techniques. International Journal of Engineering & Technology, 7(2.32), 286-292. https://doi.org/10.14419/ijet.v7i2.32.15698