Open Access
Subscription Access
Steganography Based on Human Perception
Today internet has become a trusted factotum of everyone. Almost all payments like tax, insurance, bank transaction, healthcare payment, payment in e-commerce are done digitally through debit or credit card or through e-wallet. People share their personal information through social media like Facebook. Twitter, WhatsApp etc. The government of every developing country is going to embrace e-Governance system to interact with people more promptly. The information shares through these applications are the burning target to intruders. This paper utilized the imperceptibility as well as the robustness of steganography techniques which are increased by embedding multiple bits in a particular region selected either based on some image attributes or by Human Visual Perception.
Keywords
Security, Hiding Data, Steganography and Human Perception.
User
Font Size
Information
- X. Shu, J. Zhang, D. D. Yao and W. C. Feng, “Fast Detection of Transformed Data Leaks”, IEEE Transactions on Information Forensics and Security, vol. 11, 2016, pp. 528-542.
- M. Bergman, “It’s Hard to Get Good (Security) Help These Days”, IEEE Consumer Electronics Magazine, Vol. 5, No. 3, 2016, pp. 132- 133.
- T. Jamil, “Steganography: The art of hiding information is plain sight”, IEEE Potentials, Vol. 18, No. 01, 1999, pp. 10-12.
- A. Martin, G. Sapiro and G. Seroussi, “Is image steganography natural?”, IEEE Transactions on Image Processing, Vol. 14, No. 12, 2005, pp. 2040 – 2050.
- H. B. Kekre, A. Athawale, S. Rao and U. Athawale, “Information Hiding in Audio Signals”, International Journal of Computer Applications, Vol. 7, No. 9, 2010, pp. 14-19.
- P. N. Basu and T. Bhowmik, “On Embedding of Text in Audio – A case of Steganography”, in proc. of IEEE International Conference on Recent Trends in Information, Telecommunication and Computing, 2010.
- T. Pevny, T. Filler and P. Bas, “Using High-Dimensional Image Models to Perform Highly Undetectable Steganography”, Information Hiding, Springer, LNCS, Chapter 20, Vol. 6387, 2010, pp. 161-177.
- B B. C. Nguyen, S. M. Yoon and H. K. Lee, “Multi Bit Plane Image Steganography”, International Workshop on Digital Watermarking (IWDW 2006), Lecture Notes in Computer Science, Vol. 4283, 2006, pp. 61–70.
- W. C. Kuo, S. H. Kuo and L. C. Wu, “Multi-Bit Data Hiding Scheme for Compressing Secret Messages”, Applied Sciences Journal, Vol. 5, No. 4, 2015, pp. 1033-1049.
Abstract Views: 267
PDF Views: 0