Robust and secured data hiding schemes using digital image steganography

Transmitting data over a public network such as the Internet necessitates increasing the security of data communications; especially with the highly sensitive document transfer. Steganography techniques have been introduced and developed to provide security to these applications. Fundamentally, t...

Full description

Saved in:
Bibliographic Details
Main Author: Nagham Hamid, Abdul-Mahdi
Format: Thesis
Language:English
Subjects:
Online Access:http://dspace.unimap.edu.my:80/xmlui/bitstream/123456789/32368/1/Page%201-24.pdf
http://dspace.unimap.edu.my:80/xmlui/bitstream/123456789/32368/2/Full%20text.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
id my-unimap-32368
record_format uketd_dc
spelling my-unimap-323682014-03-05T08:03:09Z Robust and secured data hiding schemes using digital image steganography Nagham Hamid, Abdul-Mahdi Transmitting data over a public network such as the Internet necessitates increasing the security of data communications; especially with the highly sensitive document transfer. Steganography techniques have been introduced and developed to provide security to these applications. Fundamentally, the steganography goal is not only to hinder the adversary from decoding a hidden message, but also to prevent an adversary from suspecting the existence of covert communications. It does not replace cryptography but rather improves the security using its obscurity features. If one's suspicious is raised while using a steganography technique, the goal of the latter will be defeated regardless whether or not a plaintext is revealed. In this research, two steganography techniques for digital images were developed. The first algorithm provides a new and efficient steganographic system, called Characteristic Region-Based Image Steganography (CR-BIS). It combines both the robustness of Speeded-Up Robust Features technique (SURF) and Discrete Wavelet Transform (DWT) to achieve characteristic region steganography synchronization. It avoids hiding data in the whole image by dynamically selecting characteristic regions for the process of embedding. Such a dynamic manner of region selection increases the security of embedded data. The experimental results showed that CR-BIS provided stego-images with a good perceptual quality; this was indicated by the obtained high Peak Signal to Noise Ratio (PSNR) values, up to 48.30 dB. The second algorithm, namely, an Improved Robust and Secured Steganography (IRSS), is an improvement of Mali et al.’s algorithm, which has a reliability defect as some data cannot be retrieved at the extraction phase. IRSS has overcome the problem of information loss via adopting the concept of the embedding map. Besides, it has been proved experimentally that IRSS outperformed the original one in terms of stego-image quality; this was demonstrated by the achieved PSNR values, which were between (37.28-39.74) dB. In the two proposed algorithms, the embedded secret information can be correctly recovered without referring to the original cover-image. In addition, improving the robustness of the stego-system by Error Correcting Codes (ECC) insertion and adding redundancy bits to the secret embedded message is defined and evaluated, in order to suggest an appropriate robustness enhancing method for the proposed algorithms. As a popular ECC, Reed- Solomon Code (RS-Code) was used to produce correction bits equal to the number of bits produced by a specific redundancy factor. It has been concluded from the experimental results that RS-code improved the robustness of CR-BIS algorithm more than the addition of redundancy does. On the other hand, adding redundancy bits to the message has a much better effect on the robustness of IRSS algorithm. Universiti Malaysia Perlis (UniMAP) 2013 Thesis en http://dspace.unimap.edu.my:80/dspace/handle/123456789/32368 http://dspace.unimap.edu.my:80/xmlui/bitstream/123456789/32368/1/Page%201-24.pdf 46f81f92ac90effc7eeb84f748f94ff8 http://dspace.unimap.edu.my:80/xmlui/bitstream/123456789/32368/2/Full%20text.pdf 3c70972ab24091aa7707e2722037f35e http://dspace.unimap.edu.my:80/xmlui/bitstream/123456789/32368/3/license.txt 8a4605be74aa9ea9d79846c1fba20a33 Image Steganography Robustness Information hiding Security of data Steganography School of Computer and Communication Engineering
institution Universiti Malaysia Perlis
collection UniMAP Institutional Repository
language English
topic Image Steganography
Robustness
Information hiding
Security of data
Steganography
spellingShingle Image Steganography
Robustness
Information hiding
Security of data
Steganography
Nagham Hamid, Abdul-Mahdi
Robust and secured data hiding schemes using digital image steganography
description Transmitting data over a public network such as the Internet necessitates increasing the security of data communications; especially with the highly sensitive document transfer. Steganography techniques have been introduced and developed to provide security to these applications. Fundamentally, the steganography goal is not only to hinder the adversary from decoding a hidden message, but also to prevent an adversary from suspecting the existence of covert communications. It does not replace cryptography but rather improves the security using its obscurity features. If one's suspicious is raised while using a steganography technique, the goal of the latter will be defeated regardless whether or not a plaintext is revealed. In this research, two steganography techniques for digital images were developed. The first algorithm provides a new and efficient steganographic system, called Characteristic Region-Based Image Steganography (CR-BIS). It combines both the robustness of Speeded-Up Robust Features technique (SURF) and Discrete Wavelet Transform (DWT) to achieve characteristic region steganography synchronization. It avoids hiding data in the whole image by dynamically selecting characteristic regions for the process of embedding. Such a dynamic manner of region selection increases the security of embedded data. The experimental results showed that CR-BIS provided stego-images with a good perceptual quality; this was indicated by the obtained high Peak Signal to Noise Ratio (PSNR) values, up to 48.30 dB. The second algorithm, namely, an Improved Robust and Secured Steganography (IRSS), is an improvement of Mali et al.’s algorithm, which has a reliability defect as some data cannot be retrieved at the extraction phase. IRSS has overcome the problem of information loss via adopting the concept of the embedding map. Besides, it has been proved experimentally that IRSS outperformed the original one in terms of stego-image quality; this was demonstrated by the achieved PSNR values, which were between (37.28-39.74) dB. In the two proposed algorithms, the embedded secret information can be correctly recovered without referring to the original cover-image. In addition, improving the robustness of the stego-system by Error Correcting Codes (ECC) insertion and adding redundancy bits to the secret embedded message is defined and evaluated, in order to suggest an appropriate robustness enhancing method for the proposed algorithms. As a popular ECC, Reed- Solomon Code (RS-Code) was used to produce correction bits equal to the number of bits produced by a specific redundancy factor. It has been concluded from the experimental results that RS-code improved the robustness of CR-BIS algorithm more than the addition of redundancy does. On the other hand, adding redundancy bits to the message has a much better effect on the robustness of IRSS algorithm.
format Thesis
author Nagham Hamid, Abdul-Mahdi
author_facet Nagham Hamid, Abdul-Mahdi
author_sort Nagham Hamid, Abdul-Mahdi
title Robust and secured data hiding schemes using digital image steganography
title_short Robust and secured data hiding schemes using digital image steganography
title_full Robust and secured data hiding schemes using digital image steganography
title_fullStr Robust and secured data hiding schemes using digital image steganography
title_full_unstemmed Robust and secured data hiding schemes using digital image steganography
title_sort robust and secured data hiding schemes using digital image steganography
granting_institution Universiti Malaysia Perlis (UniMAP)
granting_department School of Computer and Communication Engineering
url http://dspace.unimap.edu.my:80/xmlui/bitstream/123456789/32368/1/Page%201-24.pdf
http://dspace.unimap.edu.my:80/xmlui/bitstream/123456789/32368/2/Full%20text.pdf
_version_ 1747836798367694848