Steganography Scheme Based on Reed-Muller Code with Improving Payload and Ability to Retrieval of Destroyed Data for Digital Images

نویسندگان

  • A. M. Molaei Department of Electrical Engineering, Sahand University of Technology, Tabriz, Iran
  • H. Ebrahimnezhad Department of Electrical Engineering, Sahand University of Technology, Tabriz, Iran
  • M. H. Sedaaghi Department of Electrical Engineering, Sahand University of Technology, Tabriz, Iran
چکیده مقاله:

In this paper, a new steganography scheme with high embedding payload and good visual quality is presented. Before embedding process, secret information is encoded as block using Reed-Muller error correction code. After data encoding and embedding into the low-order bits of host image, modulus function is used to increase visual quality of stego image. Since the proposed method is able to embed secret information into more significant bits of the image, it has improved embedding payload. The steps of extracting data from the host image are independent of the original image. Therefore, the proposed algorithm has a blind detection process which is more suitable for practical and online applications. The simulation results show that the proposed algorithm is also able to retrieve destroyed data by intentional or unintentional attacks such as addition of noise and filtering due to use of the error correction code. In addition, the payload is improved in comparison with the same techniques.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A New Signature Scheme Based on Punctured Reed-Muller Code With Random Insertion

In this paper, we propose a new signature scheme based on a punctured Reed–Muller (RM) code with random insertion, which improves the Goppa code-based signature scheme developed by Courtois, Finiasz, and Sendrier (CFS). The CFS signature scheme has certain drawbacks in terms of scaling of the parameters and a lack of existential unforgeability under adaptive chosen message attacks (EUF-CMA) sec...

متن کامل

Punctured Reed-Muller code-based McEliece cryptosystems

The authors propose new McEliece cryptosystems based on punctured Reed–Muller (RM) codes. They successfully show that the commonly known attacks, such as the Minder–Shokrollahi attack, the Chizhov–Borodin attack, and the square code attack, are ineffective against the proposed RM code-based McEliece cryptosystem. We developed an optimal puncturing scheme to prevent the above-mentioned attacks f...

متن کامل

Steganography Based on Payload Transformation

Steganography is meant for covert communication of confidential data through internet. In this paper, we propose Steganography based on Payload Transformation (SPT) which is non LSB and non transform domain technique where the cover image is segmented into 2*2 matrices and the matrix for payload embedding is considered based on the threshold value fixed by computing adjacent pixel intensity dif...

متن کامل

using c-test passages for improving reading comprehension ability and incidentally learned vocabulary of iranian efl learners

this study was an attempt to investigate the effect of using c-test passages on the reading comprehension and incidental vocabulary learning of iranian intermediate efl learners. the participants were 60 male efl learners at kish mehr institute in garmsar. in fact, there were two groups, an experimental group and a comparison group with 30 students in each. the participants were pretested throu...

15 صفحه اول

Image Based Steganography Methods With High Payload

There is a lot of research going on to find a stenography technique which is not only imperceptible but also has other two features, namely, high embedding capacity and robustness. Imperceptibility is the most important requirement of steganography followed by high capacity. In this paper we give an overview of high capacity image steganographic techniques and propose a novel imperceptible and ...

متن کامل

Wavelet based Secure Steganography with Scrambled Payload

The Steganography is used for secure communication of information by embedding information in a cover object. In this paper we propose Wavelet based Secure Steganography with Scrambled Payload (WSSSP). The Daubechies Lifting Wavelet Transform (LWT) is applied on cover image. The XD band is decomposed into upper and lower bands for payload embedding. The payload is segmented into four equal bloc...

متن کامل

منابع من

با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ذخیره در منابع من قبلا به منابع من ذحیره شده

{@ msg_add @}


عنوان ژورنال

دوره 49  شماره 1

صفحات  53- 62

تاریخ انتشار 2017-06-01

با دنبال کردن یک ژورنال هنگامی که شماره جدید این ژورنال منتشر می شود به شما از طریق ایمیل اطلاع داده می شود.

میزبانی شده توسط پلتفرم ابری doprax.com

copyright © 2015-2023