Open Access Open Access  Restricted Access Subscription Access

Steganography Based on Human Perception


Affiliations
1 Techno India University, India
 

Today internet has become a trusted factotum of everyone. Almost all payments like tax, insurance, bank transaction, healthcare payment, payment in e-commerce are done digitally through debit or credit card or through e-wallet. People share their personal information through social media like Facebook. Twitter, WhatsApp etc. The government of every developing country is going to embrace e-Governance system to interact with people more promptly. The information shares through these applications are the burning target to intruders. This paper utilized the imperceptibility as well as the robustness of steganography techniques which are increased by embedding multiple bits in a particular region selected either based on some image attributes or by Human Visual Perception.

Keywords

Security, Hiding Data, Steganography and Human Perception.
User
Notifications
Font Size

  • X. Shu, J. Zhang, D. D. Yao and W. C. Feng, “Fast Detection of Transformed Data Leaks”, IEEE Transactions on Information Forensics and Security, vol. 11, 2016, pp. 528-542.
  • M. Bergman, “It’s Hard to Get Good (Security) Help These Days”, IEEE Consumer Electronics Magazine, Vol. 5, No. 3, 2016, pp. 132- 133.
  • T. Jamil, “Steganography: The art of hiding information is plain sight”, IEEE Potentials, Vol. 18, No. 01, 1999, pp. 10-12.
  • A. Martin, G. Sapiro and G. Seroussi, “Is image steganography natural?”, IEEE Transactions on Image Processing, Vol. 14, No. 12, 2005, pp. 2040 – 2050.
  • H. B. Kekre, A. Athawale, S. Rao and U. Athawale, “Information Hiding in Audio Signals”, International Journal of Computer Applications, Vol. 7, No. 9, 2010, pp. 14-19.
  • P. N. Basu and T. Bhowmik, “On Embedding of Text in Audio – A case of Steganography”, in proc. of IEEE International Conference on Recent Trends in Information, Telecommunication and Computing, 2010.
  • T. Pevny, T. Filler and P. Bas, “Using High-Dimensional Image Models to Perform Highly Undetectable Steganography”, Information Hiding, Springer, LNCS, Chapter 20, Vol. 6387, 2010, pp. 161-177.
  • B B. C. Nguyen, S. M. Yoon and H. K. Lee, “Multi Bit Plane Image Steganography”, International Workshop on Digital Watermarking (IWDW 2006), Lecture Notes in Computer Science, Vol. 4283, 2006, pp. 61–70.
  • W. C. Kuo, S. H. Kuo and L. C. Wu, “Multi-Bit Data Hiding Scheme for Compressing Secret Messages”, Applied Sciences Journal, Vol. 5, No. 4, 2015, pp. 1033-1049.

Abstract Views: 268

PDF Views: 0




  • Steganography Based on Human Perception

Abstract Views: 268  |  PDF Views: 0

Authors

Suman Chakraborty
Techno India University, India
Anil Bikash Chowdhury
Techno India University, India

Abstract


Today internet has become a trusted factotum of everyone. Almost all payments like tax, insurance, bank transaction, healthcare payment, payment in e-commerce are done digitally through debit or credit card or through e-wallet. People share their personal information through social media like Facebook. Twitter, WhatsApp etc. The government of every developing country is going to embrace e-Governance system to interact with people more promptly. The information shares through these applications are the burning target to intruders. This paper utilized the imperceptibility as well as the robustness of steganography techniques which are increased by embedding multiple bits in a particular region selected either based on some image attributes or by Human Visual Perception.

Keywords


Security, Hiding Data, Steganography and Human Perception.

References





DOI: https://doi.org/10.13005/ojcst%2F10.04.17