Skip to main content

Optimal Wavelet Coefficients Based Steganography for Image Security with Secret Sharing Cryptography Model

  • Chapter
  • First Online:
Cybersecurity and Secure Information Systems

Abstract

Image security on web exchanges is the major concern of the hour as the breaching attacks into the image databases are rising every year. Numerous researchers are investigated the image security with Steganography, cryptography, encryption, watermarking et cetera, our proposed model image Steganography with Secret Share cryptography (SSC) is considered to upgrade the security level, here Medical images are considered for stego image creation process. In the wake of inserting of secret data with cover image Optimal Discrete Wavelet Transform (DWT) used to transform the area, here Daubechies (db2) coefficients are utilized, in addition upgrading the PSNR Continues Harmony Search (CHS) used to enhance those coefficients. At last, SS are made for lower band stego images with high security process. Visual Cryptography is utilized to encrypt a secret image into redid adaptations of the first image which prompts computational unpredictability and furthermore create share. In view of above process the secret data or image hided and anchored, finally apply converse procedure to recover the first image. From the execution results, PSNR, hiding capacity, error rate is computed, its contrasted with existing Techniques.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 159.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Gupta S, Dhanda N (2015) Audio steganography using discrete wavelet transformation (DWT) & discrete cosine transformation (DCT). J Comput Eng 17(2):32–44

    Google Scholar 

  2. Bhardwaj R, Khanna D (2015, Dec) Enhanced the security of image steganography through image encryption. In: India conference (INDICON), 2015 annual IEEE, pp 1–4. IEEE

    Google Scholar 

  3. Subhedar MS, Mankar VH (2016) Image steganography using redundant discrete wavelet transform and QR factorization. Comput Electr Eng 54:406–422

    Article  Google Scholar 

  4. Nivedhitha R, Meyyappan T (2012) Image security using steganography and cryptographic techniques. Journal of Engineering Trends and Technology 3(3):366–371

    Google Scholar 

  5. Hussain M, Wahab AWA, Idris YIB, Ho AT, Jung KH (2018) Image steganography in spatial domain: a survey. Sig Process Image Commun 65:46–66

    Article  Google Scholar 

  6. Gupta R, Jain A, Singh G (2012) Combine use of steganography and visual cryptography for secured data hiding in computer forensics. Int J Comput Sci Inf Technol 3(3):4366–4370

    Google Scholar 

  7. Hassanien AE (2006) A copyright protection using watermarking algorithm. Informatica 17(2):187–198

    MathSciNet  MATH  Google Scholar 

  8. Mutt SK, Kumar S (2009, Dec) Secure image steganography based on slantlet transform. In: Proceeding of international conference on methods and models in computer science, 2009. ICM2CS 2009, pp 1–7. IEEE

    Google Scholar 

  9. Hassanien AE (2006) Hiding iris data for authentication of digital images using wavelet theory. Pattern Recog Image Anal 16(4):637–643

    Article  Google Scholar 

  10. Lin GS, Chang YT, Lie WN (2010) A framework of enhancing image steganography with picture quality optimization and anti-steganalysis based on simulated annealing algorithm. IEEE Trans Multimedia 12(5):345–357

    Article  Google Scholar 

  11. Thakur RK, Saravanan C (2016, Mar) Analysis of steganography with various bits of LSB for color images. In: International conference on electrical, electronics, and optimization techniques (ICEEOT), pp 2154–2158. IEEE

    Google Scholar 

  12. Yang H, Wang S, Li G, Mao T (2018) A new hybrid model based on fruit fly optimization algorithm and wavelet neural network and its application to underwater acoustic signal prediction. In: Mathematical problems in engineering

    Google Scholar 

  13. Zhang Y, Qin C, Zhang W, Liu F, Luo X (2018) On the fault-tolerant performance for a class of robust image steganography. Sig Process 146:99–111

    Article  Google Scholar 

  14. Ghosal SK, Mandal JK (2018) On the use of the stirling transform in image steganography. J Inf Secur Appl

    Google Scholar 

  15. Elhoseny M, Shankar K, Lakshmanaprabu SK, Maseleno A, Arunkumar N (2018) Hybrid optimization with cryptography encryption for medical image security in Internet of Things. Neural Comput Appl, 1–15

    Google Scholar 

  16. Shankar K, Eswaran P (2016) RGB-based secure share creation in visual cryptography using optimal elliptic curve cryptography technique. J Circ Syst Comput 25(11):1650138

    Article  Google Scholar 

  17. Shankar K, Elhoseny M, Kumar RS, Lakshmanaprabu SK, Yuan X (2018) Secret image sharing scheme with encrypted shadow images using optimal homomorphic encryption technique. J Ambient Intell Humanized Comput, 1–13

    Google Scholar 

  18. Shankar K, Eswaran P (2017) RGB based multiple share creation in visual cryptography with aid of elliptic curve cryptography. China Commun 14(2):118–130

    Article  Google Scholar 

  19. Shankar K, Eswaran P (2016) A new k out of n secret image sharing scheme in visual cryptography. In: 2016 10th international conference on intelligent systems and control (ISCO), IEEE, pp 369–374

    Google Scholar 

  20. Liao X, Yin J, Guo S, Li X, Sangaiah AK (2018) Medical JPEG image steganography based on preserving inter-block dependencies. Comput Electr Eng 67:320–329

    Article  Google Scholar 

  21. Sethi P, Kapoor V (2016) A proposed novel architecture for information hiding in image steganography by using genetic algorithm and cryptography. Procedia Comput Sci 87:61–66

    Article  Google Scholar 

  22. Thanki R, Borra S (2018) A color image steganography in hybrid FRT–DWT domain. J Inf Secur Appl 40:92–102

    Google Scholar 

  23. Sharma P, Sharma A (2018, Jan) Robust technique for steganography on Red component using 3-DWT-DCT transform. In: 2018 2nd international conference on inventive systems and control (ICISC), pp 1049–1054. IEEE

    Google Scholar 

  24. Vasoya DL, Vekariya VM, Kotak PP (2018, Jan) Novel approach for image steganography using classification algorithm. In: 2018 2nd international conference on inventive systems and control (ICISC), pp 1079–1082. IEEE

    Google Scholar 

  25. Geetha P, Jayanthi VS, Jayanthi AN (2018) Optimal visual cryptographic scheme with multiple share creation for multimedia applications. Comput Secur 78:301–320

    Article  Google Scholar 

  26. El_Rahman SA (2016) A comparative analysis of image steganography based on DCT algorithm and steganography tool to hide nuclear reactors confidential information. Comput Electr Eng 70:380–399

    Article  Google Scholar 

  27. Meghrajani YK, Mazumdar HS (2015) Hiding secret message using visual cryptography in steganography. In: India conference (INDICON), 2015 annual IEEE, pp 1–5. IEEE

    Google Scholar 

  28. Shankar K, Lakshmanaprabu SK (2018) Optimal key based homomorphic encryption for color image security aid of ant lion optimization algorithm. Int J Eng Technol 7(9):22–27

    Google Scholar 

  29. Avudaiappan T, Balasubramanian R, Pandiyan SS, Saravanan M, Lakshmanaprabu SK, Shankar K (2018) Medical image security using dual encryption with oppositional based optimization algorithm. J Med Syst 42(11):208

    Article  Google Scholar 

  30. Ramya Princess Mary I, Eswaran P, Shankar K (2018) Multi secret image sharing scheme based on DNA cryptography with XOR. Int J Pure Appl Math 118(7):393–398

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. Krishnaveni .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Sivasankari, A., Krishnaveni, S. (2019). Optimal Wavelet Coefficients Based Steganography for Image Security with Secret Sharing Cryptography Model. In: Hassanien, A., Elhoseny, M. (eds) Cybersecurity and Secure Information Systems. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-030-16837-7_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-16837-7_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-16836-0

  • Online ISBN: 978-3-030-16837-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics