Abstract
Image security on web exchanges is the major concern of the hour as the breaching attacks into the image databases are rising every year. Numerous researchers are investigated the image security with Steganography, cryptography, encryption, watermarking et cetera, our proposed model image Steganography with Secret Share cryptography (SSC) is considered to upgrade the security level, here Medical images are considered for stego image creation process. In the wake of inserting of secret data with cover image Optimal Discrete Wavelet Transform (DWT) used to transform the area, here Daubechies (db2) coefficients are utilized, in addition upgrading the PSNR Continues Harmony Search (CHS) used to enhance those coefficients. At last, SS are made for lower band stego images with high security process. Visual Cryptography is utilized to encrypt a secret image into redid adaptations of the first image which prompts computational unpredictability and furthermore create share. In view of above process the secret data or image hided and anchored, finally apply converse procedure to recover the first image. From the execution results, PSNR, hiding capacity, error rate is computed, its contrasted with existing Techniques.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Gupta S, Dhanda N (2015) Audio steganography using discrete wavelet transformation (DWT) & discrete cosine transformation (DCT). J Comput Eng 17(2):32–44
Bhardwaj R, Khanna D (2015, Dec) Enhanced the security of image steganography through image encryption. In: India conference (INDICON), 2015 annual IEEE, pp 1–4. IEEE
Subhedar MS, Mankar VH (2016) Image steganography using redundant discrete wavelet transform and QR factorization. Comput Electr Eng 54:406–422
Nivedhitha R, Meyyappan T (2012) Image security using steganography and cryptographic techniques. Journal of Engineering Trends and Technology 3(3):366–371
Hussain M, Wahab AWA, Idris YIB, Ho AT, Jung KH (2018) Image steganography in spatial domain: a survey. Sig Process Image Commun 65:46–66
Gupta R, Jain A, Singh G (2012) Combine use of steganography and visual cryptography for secured data hiding in computer forensics. Int J Comput Sci Inf Technol 3(3):4366–4370
Hassanien AE (2006) A copyright protection using watermarking algorithm. Informatica 17(2):187–198
Mutt SK, Kumar S (2009, Dec) Secure image steganography based on slantlet transform. In: Proceeding of international conference on methods and models in computer science, 2009. ICM2CS 2009, pp 1–7. IEEE
Hassanien AE (2006) Hiding iris data for authentication of digital images using wavelet theory. Pattern Recog Image Anal 16(4):637–643
Lin GS, Chang YT, Lie WN (2010) A framework of enhancing image steganography with picture quality optimization and anti-steganalysis based on simulated annealing algorithm. IEEE Trans Multimedia 12(5):345–357
Thakur RK, Saravanan C (2016, Mar) Analysis of steganography with various bits of LSB for color images. In: International conference on electrical, electronics, and optimization techniques (ICEEOT), pp 2154–2158. IEEE
Yang H, Wang S, Li G, Mao T (2018) A new hybrid model based on fruit fly optimization algorithm and wavelet neural network and its application to underwater acoustic signal prediction. In: Mathematical problems in engineering
Zhang Y, Qin C, Zhang W, Liu F, Luo X (2018) On the fault-tolerant performance for a class of robust image steganography. Sig Process 146:99–111
Ghosal SK, Mandal JK (2018) On the use of the stirling transform in image steganography. J Inf Secur Appl
Elhoseny M, Shankar K, Lakshmanaprabu SK, Maseleno A, Arunkumar N (2018) Hybrid optimization with cryptography encryption for medical image security in Internet of Things. Neural Comput Appl, 1–15
Shankar K, Eswaran P (2016) RGB-based secure share creation in visual cryptography using optimal elliptic curve cryptography technique. J Circ Syst Comput 25(11):1650138
Shankar K, Elhoseny M, Kumar RS, Lakshmanaprabu SK, Yuan X (2018) Secret image sharing scheme with encrypted shadow images using optimal homomorphic encryption technique. J Ambient Intell Humanized Comput, 1–13
Shankar K, Eswaran P (2017) RGB based multiple share creation in visual cryptography with aid of elliptic curve cryptography. China Commun 14(2):118–130
Shankar K, Eswaran P (2016) A new k out of n secret image sharing scheme in visual cryptography. In: 2016 10th international conference on intelligent systems and control (ISCO), IEEE, pp 369–374
Liao X, Yin J, Guo S, Li X, Sangaiah AK (2018) Medical JPEG image steganography based on preserving inter-block dependencies. Comput Electr Eng 67:320–329
Sethi P, Kapoor V (2016) A proposed novel architecture for information hiding in image steganography by using genetic algorithm and cryptography. Procedia Comput Sci 87:61–66
Thanki R, Borra S (2018) A color image steganography in hybrid FRT–DWT domain. J Inf Secur Appl 40:92–102
Sharma P, Sharma A (2018, Jan) Robust technique for steganography on Red component using 3-DWT-DCT transform. In: 2018 2nd international conference on inventive systems and control (ICISC), pp 1049–1054. IEEE
Vasoya DL, Vekariya VM, Kotak PP (2018, Jan) Novel approach for image steganography using classification algorithm. In: 2018 2nd international conference on inventive systems and control (ICISC), pp 1079–1082. IEEE
Geetha P, Jayanthi VS, Jayanthi AN (2018) Optimal visual cryptographic scheme with multiple share creation for multimedia applications. Comput Secur 78:301–320
El_Rahman SA (2016) A comparative analysis of image steganography based on DCT algorithm and steganography tool to hide nuclear reactors confidential information. Comput Electr Eng 70:380–399
Meghrajani YK, Mazumdar HS (2015) Hiding secret message using visual cryptography in steganography. In: India conference (INDICON), 2015 annual IEEE, pp 1–5. IEEE
Shankar K, Lakshmanaprabu SK (2018) Optimal key based homomorphic encryption for color image security aid of ant lion optimization algorithm. Int J Eng Technol 7(9):22–27
Avudaiappan T, Balasubramanian R, Pandiyan SS, Saravanan M, Lakshmanaprabu SK, Shankar K (2018) Medical image security using dual encryption with oppositional based optimization algorithm. J Med Syst 42(11):208
Ramya Princess Mary I, Eswaran P, Shankar K (2018) Multi secret image sharing scheme based on DNA cryptography with XOR. Int J Pure Appl Math 118(7):393–398
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Sivasankari, A., Krishnaveni, S. (2019). Optimal Wavelet Coefficients Based Steganography for Image Security with Secret Sharing Cryptography Model. In: Hassanien, A., Elhoseny, M. (eds) Cybersecurity and Secure Information Systems. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-030-16837-7_5
Download citation
DOI: https://doi.org/10.1007/978-3-030-16837-7_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-16836-0
Online ISBN: 978-3-030-16837-7
eBook Packages: Computer ScienceComputer Science (R0)